Bull's Integris outsourcing arm has snatched a #10 million contract from ICL CFM to run Gloucestershire County Council's IT service activities.
The local authority put the existing 24-year contract out to tender after only six years with ICL CFM. Following an evaluation process, a five-year contract was awarded to Integris, which will provide all the council's IT support, including open systems, networks, application support and maintenance.
IBM's Data Sciences has also been sub-contracted to provide application and consultancy services.
The system comprises the management of a distributed data network (LAN and WAN) of 15 Unix servers, 46 PC servers and 16 PC-based applications with a total of 1,149 desktop connections.
In addition, Integris will manage the council's voice network which has over 2,000 connections.
Under the terms of the agreement, some ICL CFM employees may transfer over to Integris.
Richard Cockcroft, head of paid services at Gloucestershire County Council, said: "As part of the evaluation process, the council asked each company to put forward details of their service levels and quality guarantees, and the cost under separate cover. The service and quality proposals were considered before we looked at the cost figures - Integris came top of our list on both counts. The contract will give us an annual saving of approximately u1.5 million, which will benefit the local community."
Bob Guppy, general manager of the outsourcing division at Integris, added: "It's very unusual for a local government contract to be broken so early in the contract, let alone not be re-awarded to the incumbent. I believe it's the first time it has happened this year."
He claimed Integris now manages the IT solutions for 10 of the 45 councils which have outsourced their IT function.
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software