Yardi Bluepoint
Yardi Bluepoint, is a cloud-based visitor management solution that ensures a great visitor journey. GDPR compliant, multi-tenant ready, quick and easy to deploy. Yardi Bluepoint connects people seamlessly to your building.
Features
- Cloud based visitor management
- Real-time reporting on vistors
- Multi-tenant ready
- Downloadble evacuation reports
- Watch-list to prevent unwanted visitors
- Single-sign-on reduces password recovery
- Automatic host notification of visitor arrival email or sms
- Can integration with access control and tenant platforms
- Easy and quick to deploy, no additional hardware required
- Contactless check-in using QR codes or PIN
Benefits
- Awareness of visitors to your building or site
- Simple visitor invite process
- Quick check-in of visitors, less queuing in reception areas
- Facilitates pre-visit communication with your visitors
- Staff and visitor details stored securely in the cloud
- Easy data extraction to understand visitor flows and patterns
- Helps with building management resource and utilization planning
- Great visitor experience
- Health and safety benefits of contactless check-in
Pricing
£6,000 to £20,000 an instance a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 4 3 7 3 4 2 0 9 6 6 7 8 3
Contact
Yardi Systems Ltd
Neal Gemassmer
Telephone: 07736 073 145
Email: Neal.Gemassmer@Yardi.Com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
No constraint on number of users or visitors.
Access control integration with most but not all access control providers. - System requirements
- HTML 5 Compliant Browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Yardi shall have the right to prioritize application support requests according to the application support issue’s impact on Client in accordance with the following response times:
Priority 1: Business halted (total inability to perform normal operation) - response generally within 2 business hours.
Priority 2: Business impacted (severe restriction of Client’s Use of the Licensed Programs) - response generally within 4 business hours.
Priority 3: Non-critical service requests - Response generally within 1 business day. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide customer support via tickets, online via the portal and phone.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We provide an assisted on boarding service, From initial consultation to complete staff training and on boarding process. Services can be provided remotely or on site.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Users can request a complete database level extract.
- End-of-contract process
- At the end of any contract all data is hashed and wiped from all connected databases.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The Yardi platform uses responsive design to adapt efficiently to differently sized computer, tablet, and mobile screens for ease of use. All functionality is available through a standard web browser, no matter which mobile or desktop device is used for access.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Log-in to the Forge Bluepoint portal where they can set up their site configuration. Different levels of users have permissions to change settings for their site/building.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Tbc
- Accessibility testing
- Tbc
- API
- Yes
- What users can and can't do using the API
- Users can access through the API and create secure keys via the Forge Bluepoint Site once the have an admin account created.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Auto scaling is deployed against all services, from data, memory and compute requirements.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
CPU
Disk
HTTP request and response status
Memory
Network
Number of active instances - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can request a complete database level extract.
- Data export formats
- Other
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
- Our cloud instance is replicated in near real time to a geographically distinct location. Our uptime target is 99.9%
- Outage reporting
- Email alerts are sent following any current or expected down time.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access restricted through Active Directory groups and privileges.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 21/02/2024
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Yardi maintains a rigorous internal security program which is audited annually via a SOC2 Type 2 audit.
- Information security policies and processes
-
Comprehensive security features and procedures safeguard Yardi clients’ data. Site security at data centres includes on-premises security personnel, continuous video surveillance, screening of all people entering or exiting the premises, and 24-hour monitoring of server operations. We contract with security experts to perform penetration tests. Our security model includes the following layers:
• Transport Layer Security (TLS). Data sent over the internet is always encrypted.
• Intrusion Prevention Systems and Multiple Firewalls. These control the type of information servers transmit and receive. Web application firewalls and data loss prevention software enhance our service.
• Virus and Malware Protection. Real-time anti-virus and anti-malware software safeguards all servers.
• Active Directory Security. This ensures that all users can access only their organisation’s applications. Folder access is based on client-defined permissions.
• Database Authentication and Name Encryption. The system authenticates all login attempts.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Yardi maintains a rigorous change management program which is audited annually by external auditors.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Yardi monitors industry sources and patches per manufacturers' recommendations for all third party software and hardware utilized. Patches are tested prior to deployment to production environments.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
24‐hour monitoring of server operations and data centers via a follow the sun cloud support team.
Multiple firewalls and an intrusion prevention systems with real time alerts.
Anti‐virus, anti‐malware, and data loss prevention software with real time alerts. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incidents are managed by an appropriate support team within Yardi. Clients are notified of incidents that affect them and are kept up-to-date throughout the process. Where appropriate clients receive an final incident report following the resolution.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
This question is not applicable to the services offered by YardiCovid-19 recovery
This question is not applicable to the services offered by YardiTackling economic inequality
This question is not applicable to the services offered by YardiEqual opportunity
This question is not applicable to the services offered by YardiWellbeing
This question is not applicable to the services offered by Yardi
Pricing
- Price
- £6,000 to £20,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- No