Infiniti Library Management System
Infiniti cloud-native LMS offers scalable, resilient, and cost-effective management of library resources, enabling real-time tracking of books, automated updates, and secure, multi-tenant access across devices without the need for local installations. The integrated discovery tool, LibPaths, centralises access to library resources, offering a single-search interface for streamlined academic research.
Features
- Accessible via any device, anywhere
- Seamless catalogue and user management
- Access to a wide range of external resources
- Advanced search tools for both librarians and users
- High Scalability
- Resilience and Fault Tolerance
Benefits
- Curate content for specific users quickly and easily
- Create bespoke information portals from any device
- Automate publish dates of information portals
- Automated communication to users for overdues, etc.
- Integrated stocktaking module
- Integrated label printing
Pricing
£650 to £3,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 6 1 0 7 8 6 2 7 1 3 0 0 7
Contact
PSP Asset Protection Ltd
Nick Hunt
Telephone: 01473745375
Email: info@psp-assetprotection.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Internet Connectivity
- Users should have access to modern web browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
90 minute initial response.
PSP's response time to technical support issues depends on the level of severity, the complexity of the inquiry and volume of support requests. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Upon emailing support, the customer will be required to provide their account username and/or assigned support ticket number and a full description of the problem including error messages, screenshots, and other troubleshooting information.
Most software support issues can be resolved with a short email advice, online chat, or short telephone discussion. The Product Support Department will determine the best method of response to resolve Software support issues, including advising the customer of the need to have further targeted Software training to resolve an issue.
PSP's response time to technical support issues depends on the level of severity, the complexity of the inquiry and volume of support requests. The Technical Support Department assigns the highest priority to customer inquiries related to service unavailability. These issues are addressed first upon notification from the customer. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Transitioning from the Legacy Library Management System (LLMS) to Infiniti is called onboarding. The PSP Team will manage your transition from your LLMS to Infiniti and communicate with the customer, as required, during this period.
The on-boarding process consists of four (4) sequential phases: Registration → Conversion (3 to 7 working days) → Staging (6 to 12 hours over a period of 5 to 10 school days) → Production.
Throughout the duration of the contract the customers received unlimited staff training and can be carried out online or onsite.
Access to help documents, blogs and forums are quickly available directly from the Infiniti Platform. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Following termination of contract PSP arranges for the transfer, in electronic format, the data in a standard format to the customer, at which point it is deleted.
- End-of-contract process
- PSP reserves the right to charge a Transfer Fee, which would not exceed 100% of the customer's annual fee, for the backup and transfer of the data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Infiniti is fully responsive to multiple devices and designed to ensure optimal viewing and interaction experience across a wide range of devices, from desktop computers to mobile phones. It automatically adjusts its layout, content, and functionality to accommodate different screen sizes, resolutions, and orientations. This adaptability is achieved through the use of fluid grids, flexible images, and CSS media queries, which allow the software to respond in real-time to the changing environment of the user's device. The goal is to provide a seamless and consistent user experience.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- It is possible to configure the platform to include branding, logos and colour to a limited degree.
Scaling
- Independence of resources
- Auto Scaling monitors applications and automatically adjusts capacity to maintain steady, predictable performance. This ensures that the service can handle increased loads without user experience degradation.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Resource circulation information
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Concord Infiniti
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
At the start of the project the customer is requested to deliver an up-to-date backup of their legacy LLMS database/s to our secure FTP site on the scheduled date and continues with our Team converting the data to Infiniti.
Once this is completed the customer is invited to take a quick (search only) of your new Infiniti on what we call our Staging Server. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- SQL
- MARC Export
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- SQL
- MARC Export
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We strive for at least 99.5% Web Server Availability. Web Server Availability is defined as the ability to retrieve the HTTP headers from the hosting server. We will not monitor availability of individual web sites but will monitor the server availability as a whole.
Denial of service attacks or other types of attacks or events directed toward Our network of servers resulting in or contributing to downtime are outside of Our control and are not part of the availability calculation.
We will use our commercially reasonable efforts to resolve Severity Code 1 System Error reports on a twenty-four (24) hour basis. When a Severity Code 1 System Error is reported, We will assign resources necessary to correct the System Error. We will take all reasonable measures to provide an initial response to Severity Code 1 issues within four (4) hours, provide a resolution within twenty-four (24) hours, and provide You with timely status reports. - Approach to resilience
- Available on request
- Outage reporting
-
To verify the application server availability, We will probe router port to which the server is connected every few minutes, with a 10-second failure threshold. If the probe is not successful, the port is considered non-operational and NOC personnel on duty are automatically notified.
Email alerts are sent.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- To restrict access in management interfaces and support channels, we implement role-based access control (RBAC) and two-factor authentication (2FA). RBAC ensures that access rights are granted according to roles defined by job functions, limiting access to sensitive information and operations based on necessity. 2FA adds an extra layer of security by requiring a second form of verification beyond just a password, significantly reducing the risk of unauthorised access. These methods are applied across all management interfaces and support channels, ensuring that only authorized personnel can access critical systems and data, thereby enhancing our overall security posture.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
Cyber Essentials
GDPR
Continual Risk Assessment and Management
Regular training and awareness programs - Information security policies and processes
- TBC
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The configuration and change management processes used are designed to ensure the integrity, security, and reliability of services:
All components are meticulously tracked through their lifetime, from initial deployment to any updates or modifications. This includes detailed logging of code changes, configuration updates, and system dependencies.
Rigorous impact assessments are conducted for any proposed changes, evaluating potential security implications, performance impacts, and compatibility issues. Only changes that pass these assessments are approved.
Robust version control, testing, and rollback procedures are in place to manage changes safely and mitigate risks. This allows for quick recovery in the event of any issues. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Our vulnerability management process, aligned with Cyber Essentials, involves regular patching of software within 14 days for critical updates, secure configuration of devices, controlled user access based on job requirements, and the use of malware protection. Firewalls and internet gateways are managed to prevent unauthorized access. For Cyber Essentials Plus, we also conduct internal and external vulnerability tests. This approach ensures basic cyber hygiene and protection against common cyber threats.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Our protective monitoring process, aligned with Cyber Essentials, involves continuous monitoring of our networks and systems to detect potential security issues. We collect and analyze logs to identify anomalies, manage and update devices to mitigate vulnerabilities, and employ incident handling protocols. Regular internal and external vulnerability tests are conducted. We also ensure secure configuration and access controls to prevent unauthorized access. This proactive approach helps us maintain a strong security posture and quickly respond to any threats
- Incident management type
- Undisclosed
- Incident management approach
- Our incident management process aligns with Cyber Essentials, focusing on preparation, identification, containment, eradication, recovery, and lessons learned. We prioritise establishing a robust cybersecurity posture to prevent incidents. Upon detection, we quickly contain and eradicate the threat, followed by recovery actions to restore services. Continuous improvement is integral, leveraging lessons learned to enhance our response capabilities. This structured approach ensures minimal impact and strengthens our resilience against cyber threats. Regular training and cyber incident exercises keep our team prepared and responsive to evolving cybersecurity challenges
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Wellbeing
Covid-19 recovery
Our cloud-based library system has been instrumental in supporting COVID-19 recovery efforts by providing resilient, flexible, and accessible services during a time when traditional library access has been challenged.
The cloud-based nature of our system allows both users and staff to access library resources and management tools from any location with an internet connection. This has been crucial during lockdowns and periods of restricted movement, ensuring continuous access to educational materials and library services.
Enhanced Collaboration: With the shift to remote work and learning, our system has facilitated collaboration among library staff, educators, and students. Cloud-based tools have enabled the sharing of resources and the coordination of services without the need for physical presence.
Cost Efficiency: By reducing the need for physical infrastructure and on-site maintenance, our system has helped libraries manage budget constraints exacerbated by the pandemic. The savings on operational costs have allowed libraries to reallocate funds to other critical areas, such as expanding digital collections or providing community support services.
Scalability and Flexibility: As the demand for digital resources surged during the pandemic, our cloud-based system could quickly scale up to meet the increased usage without the need for additional physical infrastructure. This flexibility ensured that libraries could respond rapidly to changing needs.
Support for Virtual Learning and Events: The system has supported the shift to online learning by integrating with educational platforms and resources. Libraries have been able to host virtual events, workshops, and classes, thereby continuing their educational mission despite physical closures.
Digital Inclusion: By offering a wide range of online services and resources, our cloud-based library system has helped bridge the digital divide, providing access to those who may not have physical books or resources at home, which has been particularly important during the pandemic when many people have been confined to their homes.Wellbeing
Our library system can contribute to improving health and wellbeing by providing access to a wide range of resources and tools that support mental, physical, and emotional health.
Access to Health and Wellbeing Resources: Our system can link to an extensive collection of digital resources, including eBooks, journals, and articles focused on health, nutrition, exercise, mental health, and stress management. This ensures that users have access to reliable information to make informed decisions about their health and wellbeing.
Personalised User Experience: The system allows for personalised recommendations based on users' interests. This means that users can receive suggestions for health and wellbeing resources that are most relevant to them, encouraging a more proactive approach to maintaining their health.
Organisational Support and Engagement: The system facilitates wider engagement through dedicated portals where users can access experiences, advice, and support on health and wellbeing topics. This sense of community can be particularly beneficial for mental health, providing a platform for connection and support.
Accessibility and Convenience: Being cloud-based, our library system is accessible anytime, anywhere, which is crucial for users who may have mobility issues or those who live in remote areas. This accessibility ensures that all users have the opportunity to access health and wellbeing resources without the barriers of physical location.
By integrating these features, our cloud-based library system plays a pivotal role in supporting the health and wellbeing of our users, providing them with the tools and resources they need to lead healthier and more balanced lives.
Pricing
- Price
- £650 to £3,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- The free trial version of our library management system offers full functionality for 10 days, allowing users to explore features such as auto-cataloging, customisation, and IT support. It's designed to manage both print and digital resources efficiently, with minimal disruption during setup and data migration