AppyHive for Education
Full scalable native mobile app solutions for the education sector including publishing on App Store and Google Play. Supporting Apple & Android devices. Apps are uniquely customised with only the features required for each school and provide tools for effective communication and improved productivity between school and home.
Features
- School administration and staff management system
- Real-time attendance marking with absence alerts notification system
- Dynamic event calendar with push notification or SMS system
- Dynamic school timetable with real-time updates sent by push notification
- Real-time student grading and behaviour marking
- End-to-end encrypted 1:1 and group instant messaging
- School financial management
- Payment system for activities, clubs, fees, trips and uniform ordering
- Student report publishing with push notification or SMS system
- Comprehensive student attendance and behaviour analysis reporting
Benefits
- Remote access by mobile, desktop or tablet
- Fully comprehensive and user-friendly app management system
- API integration available, e.g. Microsoft Teams and Google Classroom
- End-to-end encryption and GDPR compliant instant messaging system
- Multimedia messaging and document upload features
- Events can be saved to mobile device calendar
- Unify existing services and manage communications/productivity in one place
- In-app payments are PCI DSS v4.0 compliant
- Push notifications can be automated or sent on-demand
- Choose only the services feature needed and pay monthly/yearly
Pricing
£250.00 a unit a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 7 6 8 4 0 4 4 2 8 7 2 2 5
Contact
APPYHIVE LTD.
Sarah Botez
Telephone: 03300438075
Email: team@appyhive.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- The core software is proprietarily distributed to the end-user, however, our API allows integration with external, open-source software. The cloud platform runs on our infrastructure, therefore it cannot be physically implemented outside our ecosystem. However, user data can be exported, downloaded and shared externally based on our service agreement.
- System requirements
-
- Desktop/tablet access requires internet access with minimum 5Mbps connection
- Desktop/tablet requires a minimum 1280x960px screen resolution
- Access to internal storage required where applicable
- App management system accessed by Firefox, Chrome, Safari, Opera, Edge
- JavaScript enabled
- Mobile app requires Android 10+ and iOS 12+ operating systems
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond within one hour of receiving an email request for support. Our office opening times are Monday to Friday 8am to 5pm BST, however, emergency email support is available at weekends, response time within one to three hours between 9am and 4pm.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- Not applicable at this stage
- Onsite support
- No
- Support levels
- Our support levels are included within our service fees, as follows: - Customer and technical support by email - Customer support by phone (within office hours) - Instant messaging support for customers
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide product and services help documents in PDF format and an online documentation library via our website or project management system. We are available for enquiries and support via email, video chat and phone Monday to Friday between 8am and 5pm BST and provide online training where required.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- Video
- End-of-contract data extraction
- By contacting us in writing via interactive form or email and we will extract their data in HTML, CSV or plain text format.
- End-of-contract process
- The client has the right to cancel an on-going service at any time unless otherwise specified in the contract. The cancellation of service must be provided in writing with 30 days notice via interactive form or email. Any refundable fees will be therefore processed and content and data provided free of charge.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Access for desktop/tablet is created for staff to manage and publish content in-app using our app management system (AMS). Adaptive, responsive, performance/resource optimised. Mobile application requires access to device resources where applicable.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Online interface accessed by web browser for the app managment system and mobile application interface on device.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Not as currently stands.
- API
- Yes
- What users can and can't do using the API
- REST API calls using provided credentials, e.g. secure key, token, password. Credentials cannot be used on more than one public instance (e.g. domain name, IP address).
- API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customisable user interface (e.g. certain design features). Granular module functionality where customers can add and remove features when required (subject to service agreement). Reporting.
Scaling
- Independence of resources
- Our platform architecture is fully scalable depending upon demand. As demand increases we can deploy the service across multiple servers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Performance related metrics (e.g. service uptime/downtime, access time, I/O reference etc): User related metrics (e.g. non-identifiable user data, location, demographics etc): Device related metrics (e.g. performance, security, device type, device make etc)
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- We will export our client's data in HTML, CSV or plain text format depending on their preference.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- HTML
- Plain text
- Data import formats
-
- CSV
- Other
- Other data import formats
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Our service platform data centre provider guarantees 99.8% uptime. We will not be liable if for any reason any of the services are unavailable at any time or for any period (e.g. outages or performance issues).
- Approach to resilience
- Our platform is designed to run on multiple DNS IP addresses with regular monitoring and data back up. More information is also available on request.
- Outage reporting
- Public dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Other user authentication
- Two-step verification process.
- Access restrictions in management interfaces and support channels
- User-level access permission management.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Description of management access authentication
- Two-step verification process.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Security Metrics
- PCI DSS accreditation date
- 20/02/2024
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- Other
- Other security governance standards
- PCI DSS v4.0 compliant company. Registered Data Controller with ICO (Information Commissioner's Office) registry number ZB518524.
- Information security policies and processes
- Strong password creation policy with a minimum eight characters, letters and symbols; Account passwords are SHA256 encrypted and stored securely into the database; 2FA available with automated SMS communication and push notifications (where applicable).
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- The server-side application is updated monthly following the server platform developer specifications: New application updates/features are tested under a separate environment before deploying onto the production environment: Automated data back-up carried out monthly and stored in a different secure environment.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our application platform runs on servers with a strong Security Policy setup (i.e. secure FTP over SSL/TSL, strong password generation): Server firewall (port monitoring with email/SMS alert): IP address monitoring (i.e. IP filtering, IP banning): Application Firewall (i.e. ModSecurity with audit logs): IP whitelisting: Geo-coding (if applicable/available).
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Traffic logs are collected at both application and server levels (e.g. user access/attempts, error logs, DDoS attacks, email vulnerabilities and spam): Email and SMS automated alerts used to mitigate and respond in case of any medium to severe incident: - Response time for medium incidents under 12 hours, major incidents under 4 hours and severe incidents under 1 hour.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Automated monitoring system running on both server and application levels providing real-time logs regarding traffic, server health, resources, network and cyber attacks: Email and SMS alerts sent in real-time: Atlassian StatusPage used to report real-time information about the service (up-time status, incident status).
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
By wisely investing in R&D and IT architecture, the core of our framework is fast, performant and secure, keeping our software platform footprint considerably low. All our products are affordable, ethical, PCI DSS v4.0 & GDPR compliant and versatile due to our modular architecture. Owning our platform allows us less dependencies on external software and libraries and due to its relatively small code base minimises maintenance time spent. The framework of the platform takes nearly as much space as ten hi-res photos.
Pricing
- Price
- £250.00 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 days free trial including all features agreed in the Service License Agreement once a mobile app is distributed and published on both Apple App Store and Google Play. A one-off onboarding and app customisation fee applies for native mobile applications prior to the free trial commencing.