Skip to main content

Help us improve the Digital Marketplace - send your feedback

Yardi Systems Ltd

Yardi Bluepoint

Yardi Bluepoint, is a cloud-based visitor management solution that ensures a great visitor journey. GDPR compliant, multi-tenant ready, quick and easy to deploy. Yardi Bluepoint connects people seamlessly to your building.

Features

  • Cloud based visitor management
  • Real-time reporting on vistors
  • Multi-tenant ready
  • Downloadble evacuation reports
  • Watch-list to prevent unwanted visitors
  • Single-sign-on reduces password recovery
  • Automatic host notification of visitor arrival email or sms
  • Can integration with access control and tenant platforms
  • Easy and quick to deploy, no additional hardware required
  • Contactless check-in using QR codes or PIN

Benefits

  • Awareness of visitors to your building or site
  • Simple visitor invite process
  • Quick check-in of visitors, less queuing in reception areas
  • Facilitates pre-visit communication with your visitors
  • Staff and visitor details stored securely in the cloud
  • Easy data extraction to understand visitor flows and patterns
  • Helps with building management resource and utilization planning
  • Great visitor experience
  • Health and safety benefits of contactless check-in

Pricing

£6,000 to £20,000 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Neal.Gemassmer@Yardi.Com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 4 4 3 7 3 4 2 0 9 6 6 7 8 3

Contact

Yardi Systems Ltd Neal Gemassmer
Telephone: 07736 073 145
Email: Neal.Gemassmer@Yardi.Com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No constraint on number of users or visitors.
Access control integration with most but not all access control providers.
System requirements
HTML 5 Compliant Browsers

User support

Email or online ticketing support
Email or online ticketing
Support response times
Yardi shall have the right to prioritize application support requests according to the application support issue’s impact on Client in accordance with the following response times:

Priority 1: Business halted (total inability to perform normal operation) - response generally within 2 business hours.

Priority 2: Business impacted (severe restriction of Client’s Use of the Licensed Programs) - response generally within 4 business hours.

Priority 3: Non-critical service requests - Response generally within 1 business day.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide customer support via tickets, online via the portal and phone.
Support available to third parties
No

Onboarding and offboarding

Getting started
We provide an assisted on boarding service, From initial consultation to complete staff training and on boarding process. Services can be provided remotely or on site.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Users can request a complete database level extract.
End-of-contract process
At the end of any contract all data is hashed and wiped from all connected databases.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The Yardi platform uses responsive design to adapt efficiently to differently sized computer, tablet, and mobile screens for ease of use. All functionality is available through a standard web browser, no matter which mobile or desktop device is used for access.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Log-in to the Forge Bluepoint portal where they can set up their site configuration. Different levels of users have permissions to change settings for their site/building.
Accessibility standards
None or don’t know
Description of accessibility
Tbc
Accessibility testing
Tbc
API
Yes
What users can and can't do using the API
Users can access through the API and create secure keys via the Forge Bluepoint Site once the have an admin account created.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Auto scaling is deployed against all services, from data, memory and compute requirements.

Analytics

Service usage metrics
Yes
Metrics types
CPU
Disk
HTTP request and response status
Memory
Network
Number of active instances
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can request a complete database level extract.
Data export formats
Other
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9%
Approach to resilience
Our cloud instance is replicated in near real time to a geographically distinct location. Our uptime target is 99.9%
Outage reporting
Email alerts are sent following any current or expected down time.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access restricted through Active Directory groups and privileges.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
21/02/2024
CSA STAR certification level
Level 2: CSA STAR Attestation
What the CSA STAR doesn’t cover
N/A
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Yardi maintains a rigorous internal security program which is audited annually via a SOC2 Type 2 audit.
Information security policies and processes
Comprehensive security features and procedures safeguard Yardi clients’ data. Site security at data centres includes on-premises security personnel, continuous video surveillance, screening of all people entering or exiting the premises, and 24-hour monitoring of server operations. We contract with security experts to perform penetration tests. Our security model includes the following layers:
• Transport Layer Security (TLS). Data sent over the internet is always encrypted.
• Intrusion Prevention Systems and Multiple Firewalls. These control the type of information servers transmit and receive. Web application firewalls and data loss prevention software enhance our service.
• Virus and Malware Protection. Real-time anti-virus and anti-malware software safeguards all servers.
• Active Directory Security. This ensures that all users can access only their organisation’s applications. Folder access is based on client-defined permissions.
• Database Authentication and Name Encryption. The system authenticates all login attempts.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Yardi maintains a rigorous change management program which is audited annually by external auditors.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Yardi monitors industry sources and patches per manufacturers' recommendations for all third party software and hardware utilized. Patches are tested prior to deployment to production environments.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
24‐hour monitoring of server operations and data centers via a follow the sun cloud support team.
Multiple firewalls and an intrusion prevention systems with real time alerts.
Anti‐virus, anti‐malware, and data loss prevention software with real time alerts.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incidents are managed by an appropriate support team within Yardi. Clients are notified of incidents that affect them and are kept up-to-date throughout the process. Where appropriate clients receive an final incident report following the resolution.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

This question is not applicable to the services offered by Yardi

Covid-19 recovery

This question is not applicable to the services offered by Yardi

Tackling economic inequality

This question is not applicable to the services offered by Yardi

Equal opportunity

This question is not applicable to the services offered by Yardi

Wellbeing

This question is not applicable to the services offered by Yardi

Pricing

Price
£6,000 to £20,000 an instance a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Neal.Gemassmer@Yardi.Com. Tell them what format you need. It will help if you say what assistive technology you use.