Skip to main content

Help us improve the Digital Marketplace - send your feedback

ICT Revolutions Ltd

REVAULT

REVAULT is an archiving solution for legacy systems and data with a configurable user interface, supporting access control, retention and purging for legacy data.

Features

  • Flexible replacement for legacy systems, internal- or cloud-hosted
  • Web based front end, offering record-level access control
  • Legacy data presented in a format familiar to end users
  • Supports identification, management and disposal of historic records
  • Provides access control to some or all data
  • Can support multiple data sources with discrete access control
  • Record access is fully auditable
  • Data is fully exportable

Benefits

  • Generates both infrastructure capacity and software licensing savings
  • Generates both infrastructure capacity and software licensing savings
  • Provides access to multiple legacy datasets in one place
  • Provides the ability to add additional data sources in future

Pricing

£35,000.00 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jon.goldie@ictrevolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 4 3 3 8 3 7 6 5 2 3 9 5 9 9

Contact

ICT Revolutions Ltd Jonathan Goldie
Telephone: 07762 630363
Email: jon.goldie@ictrevolutions.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
REVAULT is designed to support the decommissioning of legacy data sources, and can be used for any system and data type. Solutions currently exist for Mosaic, PARIS, CareFirst, Frameworki, Abacus, SWIFT and all document storage formats, though other systems can also be accommodated.
Cloud deployment model
Private cloud
Service constraints
REVAUlT requires a Windows Server & SQL Server licenses
System requirements
  • MS Windows Server 2012 onwards, any version currently in support
  • Virtual machine with SQL server database with Reporting services installed
  • MS SQL Server 2016 onwards, any version currently in support
  • Apache Tomcat version 10 & Java version 17 or later

User support

Email or online ticketing support
Email or online ticketing
Support response times
Normal support hours are between 9.00 am and 5.00 pm Monday to Friday on any day of a calendar year other than days which are bank holidays in England and Wales. Response time is based upon the severity of the incident, with a 2-hour target for critical issues, rising to 16 hours for minor issues.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
All customers are provided with the account manager and technical support engineer's details. The technical support engineer will be a person who is intimate with the product the customer is using and will attempt to provide resolve an incident within 2 hours of notification via the Service Desk.

Support for REVAULT is included in the annual licence charge.

All ICT Revolutions products contain an element of support and maintenance should something cease to work. Additional support can be purchased at the quoted day rates.

See the Service Definition for more information and the Pricing Document for details of support costs.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We offer a full installation guide and pre-requisites for each system. We can provide either onsite or eLearning training (at extra cost) and provide a full schema where possible. Our products come with implementation days which cover a full handover to the customer. End user testing forms a mandatory part of each and every implementation. As part of User Acceptance Testing, customer end users work through a series of workshops to familiarise and learn how to navigate the system. Where specific accessibility settings are desired, these are applied, and tested.
Service documentation
Yes
Documentation formats
  • ODF
  • PDF
  • Other
Other documentation formats
  • ELearning videos in .MP4 format (with captions)
  • SCORM-compliant eLearning content
End-of-contract data extraction
Data is always owned by the customer. Generally, Customer data does not leave their own site. For our products where we host customer data alongside the applications, and our application carries out processing of that data, we guarantee that the data is either deleted, or returned as CSV or similar files at the termination of the contract.
End-of-contract process
The service is withdrawn, in line with the Contract and the requirement of the customer, any data stored is destroyed or returned to the customer in CSV or similar format.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
REVAULT can be customised in a number of ways:

Configuration - This is completed by ICT Revolutions alongside the customer, and includes the customisation of the legacy data sources with REVAULT, their navigation and look and feel. It also includes the configuration of the local retention policy.
System Settings - for example whether a request to view a record is required for all cases, no cases, or just those that are restricted; or to control the length of time that records can be viewed for. These changes can be made by end users with the relevant system administration abilities.
Data Admin - users with the relevant profile rights can flag or unflag records as 'restricted', and can choose to purge individual records, or to retain those that have been flagged for purging.

Scaling

Independence of resources
We work with customers to identify their predicted usage and define server specifications that will meet these. We work with customers to review the ongoing performance of our products and make changes to infrastructure where required. This process includes an estimate of high usage, based on similar implementations in comparable Authorities, to ensure that server resources are scaled appropriately.

Analytics

Service usage metrics
Yes
Metrics types
We provide user access audit logs. Additional reports can be developed (at a cost).
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported in the standard MS SQL Server formats including CSV, DOCX and PDF. This is achieved through the standard REVAULT user interface
Data export formats
  • CSV
  • Other
Other data export formats
  • TIFF
  • XML
  • Any attached files in their original format
Data import formats
  • CSV
  • ODF
  • Other

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We guarantee a 99% availability within normal operating hours, as agreed with each customer. If we fail to meet this standard we offer service credits
Approach to resilience
Details available on Request - The critical system components that are required to maintain availability and recover service in the event of outage have been identified. Critical system components are backed up across multiple, isolated locations Each location is engineered to operate independently with high reliability. Locations ns that automatically fail-over without interruption. Highly resilient systems, and therefore service availability, is a function of the system design.
Outage reporting
Email Alerts to named customer representative(s)

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
REVAULT uses different security profiles to access management functions. Users with administrative access only can access these functions. Database access is dependent on customers own end-user access controls for SQL Server.
Access restriction testing frequency
At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials accredited.

Working towards ISO 27001
Information security policies and processes
We are Cyber Essentials accredited for our internal information management policies and incident management processes. When working with customer data, we operate a policy where it never leaves their infrastructure, and we are signatories to their security, data protection and data management policies, including incident management, on the basis that we must meet the requirements of their PSN certification.

Our own internal policies governing information security include:
- Access Control Policy
- Acceptable Use Policy
- Communication Policy
- Data Security & Confidentiality Policy

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Initial customer configuration is identified via a workshop, and tested and confirmed at each round of User Acceptance Testing. At each application release, new functionality and configuration options are communicated to each customer to enable them to make decisions to suit their business processes. Configuration options are visible to admin users via the application.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
ICT Revolutions identify work with customers to identify and resolve any vulnerabilities affecting our products. Where any vulnerabilities are identified, they are assessed and triaged for resolution. ICT Revolutions develop and test our applications to work with new releases of application and database server technologies, and work with customers to move to these were appropriate.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
ICT Revolutions has instituted a set of business processes, with support technology, to monitor and audit how our own and our customer's ICT systems are used and to assure user accountability. Protective Monitoring activities are limited to those associated with security controls: Inspecting firewall logs, investigating operating system security alerts and monitoring.

Protective Monitoring includes obtaining server and systems log information and securing for a set period ICT logs in order to provide an audit trail of security relevant events of interest.
We are Cyber Security complaint and certificated, and are in the process of registering our ISO 27001 standards.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We identify incidents and record them in our Incident Management Log, through automated monitoring systems or by a user contacting us.
Incident reporting and communication begin simultaneously so that as an incident is identified, we communicate clearly to the customer that a disruption is taking place and investigation is in progress.
Impact assessments guide the description of priority and severity - these are used to determine the level of support.
Diagnosis helps to isolate specific effects from the root causes and identify the synergy between the incident, changes to the technical environment and documented issues.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

ICT Revolutions is committed to achieving net zero by 2050 as per government aims.

In order to reduce our emissions year on year, we have introduced the following for office working: 

- Ensure LED Lighting is used in the office. 

- Motion sensors are in place throughout the office to ensure all lighting in unused rooms turns off automatically. 

- Employees are encouraged to work from home and to only travel to customer sites when absolutely necessary. This has and will reduce CO2e released as a result of unnecessary travel. 

- We have decommissioned our photocopier to decrease our paper usage.

As said above we fully support remote working for all staff. As part of this initiative, we have adapted work processes to enable fully home-based working, and provide the necessary equipment to enable staff to continue their work to the high standards that we achieve.

We are in the process of decommissioning our office so that commuting to the office will no longer be necessary. The office decommissioning process will be completed by the end of Q1 2024.

Within our contracts we specify when staff will travel and for what purposes: we have made significant progress in reducing business travel. Where attendance on site is necessary we strongly encourage staff to use trains when feasible (e.g. when not carrying heavy equipment) Staff currently produce very low levels of carbon emissions associated with their roles, given the prevalence of homeworking and the encouragement to use public transport for any unavoidable customer visits, this is something we will continue to work on to enable us to achieve our aims of becoming Carbon Net Zero by 2050. We also produce an annual Carbon Reduction Plan to support these aims.

Covid-19 recovery

Since the Covid-19 pandemic, ICT Revolutions has embraced remote working, ensuring that all staff are fully equipped and enabled to carry out their duties from home. This has also been welcomed by customers. We provide comprehensive technical and HR support for remote working, including multiple screens, ergonomic chairs, and accessibility aids where appropriate.

While Covid-19 restrictions were in place, full social distancing was carried out, with strict adherence to the guidance issued at the time. On those occasions where staff members needed or preferred to work from the office they were provided with screens to isolate them from neighbours, one-way routes in and out of the office were defined and office staffing was kept to a minimum. Staff mostly worked from home throughout lockdown periods. With the forthcoming office decommissioning, staff will be free to work remotely from any secure location.

We have supported one staff member experiencing long-term health issues due to Covid-19. This has been managed under our standard approach to staff wellbeing; we have worked in partnership with the individual to redesign aspects of his role to accommodate his specific needs and have built in processes to enable the individual to deal effectively with their health issues.

We have a regular ‘social keeping in touch’ via virtual offices, to offset the effects of remote working. This started during the pandemic and is continuing. This involves weekly meetings with an open agenda to enable colleagues to maintain social contacts despite working from home.

Staff are encouraged to test for Covid-19 if they experience symptoms and to isolate in the event of a positive test result. As with any illness, the company supports the health and wellbeing of staff and would expect the staff member to follow medical guidance and ensure that they are well before resuming duties.

Tackling economic inequality

ICT Revolutions proudly upholds its commitment as an Equal Opportunities Employer, dedicated to recruiting individuals based on their potential to contribute to the company's objectives. To promote inclusivity and tackle economic inequality, we offer free employment coaching to those facing barriers to employment, made possible through our partnership with Wildflower Fire Coaching. A particular success story of our training partnership involves a colleague with learning difficulties who, after participating in our traineeship program, transitioned to full-time employment in local government. The package provided encompassed coaching for work readiness, career planning, and comprehensive technical skills development.

Recognising the importance of continuous growth, we invest in training for our staff, focusing on key areas such as Project Management, Health & Safety, and Cyber Security Training. This approach ensures that the skills and qualifications acquired align closely with each individual's role and responsibilities. Examples of training include certified Microsoft training in Power BI and SQL, certified Oracle training, accredited 'practical migration' training (a leading data migration methodology), and Health & Safety training for our dedicated H&S officer, via Peninsula Training.

We actively engage in upskilling customer staff through knowledge transfer during collaborative projects. This not only enhances their proficiency but also opens avenues for career development in the Information Technology sector. Our commitment to knowledge sharing extends to organising both internal and external awaydays and 'lessons learned' sessions, fostering a culture of shared learning. We have developed an extensive suite of E-learning resources tailored to support our customers utilisation of industry-leading software applications.

Ensuring access to support and training is available for all, we collaborate with voluntary sector agencies. We recently worked with Age Concern, supporting their work on carers’ assessments by conducting training on technical skills in the use of case management systems.

Equal opportunity

ICT Revolutions is an equal opportunities employer, offering tailored support for individuals to succeed. Our policy ensures an effective and comfortable work environment, providing necessary aids based on individual needs.

Given the individualised nature of people’s needs, each case is dealt with differently. For example:

(i) One staff member has a health condition which means she is unable to drive. This is accommodated through public transport and colleagues driving her to events.

(ii) We supported a trainee analyst with a learning disability. We provided training, support, coaching and mentoring to help him to gain employment with a local authority.

(iii) One staff member has a visual impairment accommodated through a combination of accessibility software and specialist screens

We also provide support to customer personnel with additional needs, examples include a customer with a severe visual impairment where we shaped our service delivery extensively, including tailored support to adapt to his accessibility software.

We address individual needs by discussing specific requirements or challenges with each employee. These considerations are integrated into their contracts, and our processes are adapted for effective accommodation. Equal pay is provided based on skills and roles, ensuring fair opportunities for training and career advancement across the company.

ICT Revolutions is a Tier 2 Home Office registered visa authority, which gives us access to identity data and work history to ensure that a person is who they say they are.

(ii)there is no evidence that they originated other than from their stated country of origin and they are free to work in UK.

ICT Revolutions is committed to addressing the issue of modern slavery. We have established comprehensive processes to guarantee that every team member engaged in any contract, including those employed through supply chain partners, undergoes thorough verification of identity and eligibility to work in the UK.

Wellbeing

Staff’s Mental Health and Wellbeing is paramount at ICT Revolutions. We provide a Mental Health helpline service through our HR partner Peninsula. This provides mental health support around the clock. ICTR fully supports the 6 standards of the Mind Mental Health At Work commitment and is a signatory to this commitment. We believe that the professional, comprehensive, Mental Health support that our staff receive via Peninsula is effective at supporting our staff’s Mental Health and Wellbeing, although we of course, continue to review our mental health support annually to ensure we are providing the best possible service to our workforce.

Staff are supported through away-days, social-days which take place one a month. We have a reasonable working hours policy and conduct regular 1:1 sessions with supervisors & managers to discuss any matters of concern. We do have an open-door policy in which an employee is encouraged to discuss any issues they have work related or otherwise with a senior member of staff when they arise. We also offer a Cycle to Work scheme for all employees to increase physical wellbeing among the team.

Since 2020 we have provided most of our services remotely, enabling our staff and customer personnel to work from home and to minimise work-related travel and therefore the stress that comes with commuting.

Our implementation methodology prioritises user well-being through a range of user engagement strategies. We actively seek input from all stakeholders, promoting inclusivity through focus groups and practitioner engagement activities. Ensuring all voices are heard including those with any concerns. These sessions ensure open access for customer personnel. Weekly user engagement activities and carefully planned focus groups, spanning 1-2 weeks based on project complexity, embody our commitment to holistic well-being, creating a collaborative and enriching experience for all involved.

Pricing

Price
£35,000.00 a licence
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jon.goldie@ictrevolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.