Skip to main content

Help us improve the Digital Marketplace - send your feedback

PSP Asset Protection Ltd

Infiniti Library Management System

Infiniti cloud-native LMS offers scalable, resilient, and cost-effective management of library resources, enabling real-time tracking of books, automated updates, and secure, multi-tenant access across devices without the need for local installations. The integrated discovery tool, LibPaths, centralises access to library resources, offering a single-search interface for streamlined academic research.

Features

  • Accessible via any device, anywhere
  • Seamless catalogue and user management
  • Access to a wide range of external resources
  • Advanced search tools for both librarians and users
  • High Scalability
  • Resilience and Fault Tolerance

Benefits

  • Curate content for specific users quickly and easily
  • Create bespoke information portals from any device
  • Automate publish dates of information portals
  • Automated communication to users for overdues, etc.
  • Integrated stocktaking module
  • Integrated label printing

Pricing

£650 to £3,000 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@psp-assetprotection.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 4 6 1 0 7 8 6 2 7 1 3 0 0 7

Contact

PSP Asset Protection Ltd Nick Hunt
Telephone: 01473745375
Email: info@psp-assetprotection.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Internet Connectivity
  • Users should have access to modern web browsers

User support

Email or online ticketing support
Email or online ticketing
Support response times
90 minute initial response.
PSP's response time to technical support issues depends on the level of severity, the complexity of the inquiry and volume of support requests.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Upon emailing support, the customer will be required to provide their account username and/or assigned support ticket number and a full description of the problem including error messages, screenshots, and other troubleshooting information.
Most software support issues can be resolved with a short email advice, online chat, or short telephone discussion. The Product Support Department will determine the best method of response to resolve Software support issues, including advising the customer of the need to have further targeted Software training to resolve an issue.
PSP's response time to technical support issues depends on the level of severity, the complexity of the inquiry and volume of support requests. The Technical Support Department assigns the highest priority to customer inquiries related to service unavailability. These issues are addressed first upon notification from the customer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Transitioning from the Legacy Library Management System (LLMS) to Infiniti is called onboarding. The PSP Team will manage your transition from your LLMS to Infiniti and communicate with the customer, as required, during this period.
The on-boarding process consists of four (4) sequential phases: Registration → Conversion (3 to 7 working days) → Staging (6 to 12 hours over a period of 5 to 10 school days) → Production.
Throughout the duration of the contract the customers received unlimited staff training and can be carried out online or onsite.
Access to help documents, blogs and forums are quickly available directly from the Infiniti Platform.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Following termination of contract PSP arranges for the transfer, in electronic format, the data in a standard format to the customer, at which point it is deleted.
End-of-contract process
PSP reserves the right to charge a Transfer Fee, which would not exceed 100% of the customer's annual fee, for the backup and transfer of the data.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Infiniti is fully responsive to multiple devices and designed to ensure optimal viewing and interaction experience across a wide range of devices, from desktop computers to mobile phones. It automatically adjusts its layout, content, and functionality to accommodate different screen sizes, resolutions, and orientations. This adaptability is achieved through the use of fluid grids, flexible images, and CSS media queries, which allow the software to respond in real-time to the changing environment of the user's device. The goal is to provide a seamless and consistent user experience.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
It is possible to configure the platform to include branding, logos and colour to a limited degree.

Scaling

Independence of resources
Auto Scaling monitors applications and automatically adjusts capacity to maintain steady, predictable performance. This ensures that the service can handle increased loads without user experience degradation.

Analytics

Service usage metrics
Yes
Metrics types
Resource circulation information
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Concord Infiniti

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
At the start of the project the customer is requested to deliver an up-to-date backup of their legacy LLMS database/s to our secure FTP site on the scheduled date and continues with our Team converting the data to Infiniti.
Once this is completed the customer is invited to take a quick (search only) of your new Infiniti on what we call our Staging Server.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • SQL
  • MARC Export
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • SQL
  • MARC Export

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We strive for at least 99.5% Web Server Availability. Web Server Availability is defined as the ability to retrieve the HTTP headers from the hosting server. We will not monitor availability of individual web sites but will monitor the server availability as a whole.
Denial of service attacks or other types of attacks or events directed toward Our network of servers resulting in or contributing to downtime are outside of Our control and are not part of the availability calculation.
We will use our commercially reasonable efforts to resolve Severity Code 1 System Error reports on a twenty-four (24) hour basis. When a Severity Code 1 System Error is reported, We will assign resources necessary to correct the System Error. We will take all reasonable measures to provide an initial response to Severity Code 1 issues within four (4) hours, provide a resolution within twenty-four (24) hours, and provide You with timely status reports.
Approach to resilience
Available on request
Outage reporting
To verify the application server availability, We will probe router port to which the server is connected every few minutes, with a 10-second failure threshold. If the probe is not successful, the port is considered non-operational and NOC personnel on duty are automatically notified.
Email alerts are sent.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
To restrict access in management interfaces and support channels, we implement role-based access control (RBAC) and two-factor authentication (2FA). RBAC ensures that access rights are granted according to roles defined by job functions, limiting access to sensitive information and operations based on necessity. 2FA adds an extra layer of security by requiring a second form of verification beyond just a password, significantly reducing the risk of unauthorised access. These methods are applied across all management interfaces and support channels, ensuring that only authorized personnel can access critical systems and data, thereby enhancing our overall security posture.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
GDPR
Continual Risk Assessment and Management
Regular training and awareness programs
Information security policies and processes
TBC

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The configuration and change management processes used are designed to ensure the integrity, security, and reliability of services:
All components are meticulously tracked through their lifetime, from initial deployment to any updates or modifications. This includes detailed logging of code changes, configuration updates, and system dependencies.
Rigorous impact assessments are conducted for any proposed changes, evaluating potential security implications, performance impacts, and compatibility issues. Only changes that pass these assessments are approved.
Robust version control, testing, and rollback procedures are in place to manage changes safely and mitigate risks. This allows for quick recovery in the event of any issues.
Vulnerability management type
Undisclosed
Vulnerability management approach
Our vulnerability management process, aligned with Cyber Essentials, involves regular patching of software within 14 days for critical updates, secure configuration of devices, controlled user access based on job requirements, and the use of malware protection. Firewalls and internet gateways are managed to prevent unauthorized access. For Cyber Essentials Plus, we also conduct internal and external vulnerability tests. This approach ensures basic cyber hygiene and protection against common cyber threats.
Protective monitoring type
Undisclosed
Protective monitoring approach
Our protective monitoring process, aligned with Cyber Essentials, involves continuous monitoring of our networks and systems to detect potential security issues. We collect and analyze logs to identify anomalies, manage and update devices to mitigate vulnerabilities, and employ incident handling protocols. Regular internal and external vulnerability tests are conducted. We also ensure secure configuration and access controls to prevent unauthorized access. This proactive approach helps us maintain a strong security posture and quickly respond to any threats
Incident management type
Undisclosed
Incident management approach
Our incident management process aligns with Cyber Essentials, focusing on preparation, identification, containment, eradication, recovery, and lessons learned. We prioritise establishing a robust cybersecurity posture to prevent incidents. Upon detection, we quickly contain and eradicate the threat, followed by recovery actions to restore services. Continuous improvement is integral, leveraging lessons learned to enhance our response capabilities. This structured approach ensures minimal impact and strengthens our resilience against cyber threats. Regular training and cyber incident exercises keep our team prepared and responsive to evolving cybersecurity challenges

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Covid-19 recovery
  • Wellbeing

Covid-19 recovery

Our cloud-based library system has been instrumental in supporting COVID-19 recovery efforts by providing resilient, flexible, and accessible services during a time when traditional library access has been challenged.
The cloud-based nature of our system allows both users and staff to access library resources and management tools from any location with an internet connection. This has been crucial during lockdowns and periods of restricted movement, ensuring continuous access to educational materials and library services.
Enhanced Collaboration: With the shift to remote work and learning, our system has facilitated collaboration among library staff, educators, and students. Cloud-based tools have enabled the sharing of resources and the coordination of services without the need for physical presence.
Cost Efficiency: By reducing the need for physical infrastructure and on-site maintenance, our system has helped libraries manage budget constraints exacerbated by the pandemic. The savings on operational costs have allowed libraries to reallocate funds to other critical areas, such as expanding digital collections or providing community support services.
Scalability and Flexibility: As the demand for digital resources surged during the pandemic, our cloud-based system could quickly scale up to meet the increased usage without the need for additional physical infrastructure. This flexibility ensured that libraries could respond rapidly to changing needs.
Support for Virtual Learning and Events: The system has supported the shift to online learning by integrating with educational platforms and resources. Libraries have been able to host virtual events, workshops, and classes, thereby continuing their educational mission despite physical closures.
Digital Inclusion: By offering a wide range of online services and resources, our cloud-based library system has helped bridge the digital divide, providing access to those who may not have physical books or resources at home, which has been particularly important during the pandemic when many people have been confined to their homes.

Wellbeing

Our library system can contribute to improving health and wellbeing by providing access to a wide range of resources and tools that support mental, physical, and emotional health.
Access to Health and Wellbeing Resources: Our system can link to an extensive collection of digital resources, including eBooks, journals, and articles focused on health, nutrition, exercise, mental health, and stress management. This ensures that users have access to reliable information to make informed decisions about their health and wellbeing.
Personalised User Experience: The system allows for personalised recommendations based on users' interests. This means that users can receive suggestions for health and wellbeing resources that are most relevant to them, encouraging a more proactive approach to maintaining their health.
Organisational Support and Engagement: The system facilitates wider engagement through dedicated portals where users can access experiences, advice, and support on health and wellbeing topics. This sense of community can be particularly beneficial for mental health, providing a platform for connection and support.
Accessibility and Convenience: Being cloud-based, our library system is accessible anytime, anywhere, which is crucial for users who may have mobility issues or those who live in remote areas. This accessibility ensures that all users have the opportunity to access health and wellbeing resources without the barriers of physical location.
By integrating these features, our cloud-based library system plays a pivotal role in supporting the health and wellbeing of our users, providing them with the tools and resources they need to lead healthier and more balanced lives.

Pricing

Price
£650 to £3,000 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
The free trial version of our library management system offers full functionality for 10 days, allowing users to explore features such as auto-cataloging, customisation, and IT support. It's designed to manage both print and digital resources efficiently, with minimal disruption during setup and data migration

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@psp-assetprotection.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.