YUDU Sentinel
Keep vital business communications running in a crisis, when all other systems fail.
Sentinel delivers mass notification, document hosting and collaboration tools to help manage an incident remotely from any device, to keep crisis response teams and key stakeholders updated throughout the life cycle of any critical event.
Features
- Hosted on single-tenant secure cloud servers, to protect against cyber-attacks
- Mass alerting & notification: email, SMS, chat, voice & in-app
- Deliver offline documentation to your crisis teams and organisation
- Two-way communication lets people respond to yes/no questions
- Communicate in real-time and share critical files
- Create instant conference calls to coordinate response efforts
- Text-to-voice Hotline software to keep stakeholders updated
- Offline contact directory, ring-fenced and GDPR compliant
- Web, app, & mobile access
- Audit logs for post-crisis analysis and compliance
Benefits
- Keep your people informed during a crisis
- Manage a crisis remotely from any device
- Always have offline access to the documents you need
- Easily contact your team with an offline contact directory
- Pre-scripted templates for fast crisis response
- Check that your people are safe and see real-time responses
- Backup system that works when your servers are down
- Access to training materials to help staff prepare for emergencies
- Improve decision making with post-incident analysis
- Simple to use and admin-light
Pricing
£5,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 5 8 6 8 6 6 6 1 4 6 8 1 1 1
Contact
YUDU Sentinel
Charlie Stephenson
Telephone: +44 7960252055
Email: enquiries@sentinelresilience.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- No.
- System requirements
-
- Access via Microsoft Edge browser and other modern browsers
- IOS 15 and/or Android 6 or higher (option apps)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are set out in the Sentinel Service Level Agreement and deals with critical responses with a 2 hr 24/7 response time and tiered for lower level responses. Automatic alerts are 24/7. General queries about the system and training plans are dealt with within the same working day. We currently do not offer support for training and general enquiries at weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Undertaken by Hubsopt
- Onsite support
- Yes, at extra cost
- Support levels
-
Response times are set out in the Sentinel Service Level Agreement and deals with critical responses with a 2 hr 24/7 response time and tiered for lower level responses. Automatic alerts are 24/7. (Full detail available)
All clients have an account manager who can help them with technical issues and a further support from the Technical Support Team. This customer support team is UK-based and highly knowledgeable. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The onboarding process will train any customer operatives and configure the system to suit each organisation. The system will be fully tested with the Client's environment before release. This is a fully developed process and is designed to get clients operational in the shortest possible time.
Sentinel is designed from the start to be intuitive and easy to use and the user interface kept as simple as possible. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- As a downloadable csv file or agreed secure digital media.
- End-of-contract process
- At the end of the contract all outstanding licence and usage fees due up to the termination date are settled by the customer. YUDU will accept instructions from the client at no cost to the customer for the return or destruction of any content, intellectual property and remove any apps installed on 3rd part sites that have been managed by YUDU.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- All the functions that are available on the desktop is able to be accessed on any mobile device. The Console is fully responsive are resizes to the mobile device. Incidents can be managed entirely from any remote location. The mobile app has a library of critical documents and contacts that can be accessed off-line when no signal is available. Access can be controlled with biometric authentication.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
The mobile app displays documents, downloads, contacts and messages in a simple user interface.
The backend dashboard offers that and more analytics, permissions control, contact/document groups etc through a simple to use platform. - Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- The app has been tested using the iOS and Android accessibility features.
- API
- Yes
- What users can and can't do using the API
-
Access to the API requires a full Sentinel system which will be available from a url provided to you by YUDU at the time of deployment.
Through our API, you can:
Requesting the App directory
Creating a user
Creating a contact
Creating a group
Assigning a user to a group
Getting a groups users
Assigning a contact to a group
Requesting a list of documents
Assigning a document to a user
Getting a users documents
Creating a broadcast
Sending a broadcast
Checking recipients and broadcast status
Checking system activity
Some API activities require an API token for access. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The platform can be white labelled with your organisation's branding. You also control which features are used by whom and have full control over permissions. Users fill in their own profiles with their information. The system can be customised to scale according to volume use for the different technology available on the platform.
SMS sender ID can be customised, along with email sender ID. For voice calls, the calls per minute can also be customised.
Who can customise what depends on what needs to be customised. Most system/service customisation occurs in the initial onboarding process.
Scaling
- Independence of resources
- Single-tenant server architecture means that each instance of Sentinel is entirely separate to other clients' and our own servers and therefore any disruption, outages, cyber attacks on other clients will not impact other clients. SMS messaging has dedicated sub-accounts containing a bank of numbers that are dedicated and not shared with other clients. Email we use dedicated IP addresses to ensure we are not impacted by slow delivery when queued behind other users on shared IP addresses. CPU monitoring and alerts on all systems to ensure server performance is adequate for each client.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
A full audit can be provided of:
- All messages/broadcasts sent (in-app, email, SMS)
- Telephony, minutes used, call made, files storage MB
- Optional voice recordings of conference calls.
- All actions taken by staff times-stamped.
- Responses to yes/no questions broadcasted and other inbound communications, including voicemails
-Chat users
No of user and contacts on the system - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- As a downloadable csv file. Users can also access their account through a login page, enter their own data and choose if they want to make it accessible to others in their organisation or just admins.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We can guarantee a 99.99% SLA for Sentinel .The SLA allows for financial reimbursement if the uptimes are not complying with the SLA terms.
- Approach to resilience
-
Our server architecture is single-tenant, making it as independent and secure as possible. Servers are mirrored with redundant servers in multiple zones with automatic fail-over. Data is backed daily. The database can be rolled back at 5 minute intervals.
By using multiple channels for mass notification (email, SMS, in-app and automated voice calls, The system maximises the chances of broadcasts reaching users in an incident. For app users, documents and action cards are available offline, making the system as reliable as resilient as possible. - Outage reporting
-
1. When downtime or service degradation that will negatively affect sentinel or publisher clients is detected, initial updates will be provided on the Sentinel status page and Sentinel operations twitter account. The operations team will update the hotline ticker-tape status through our internal sentinel system which will be embedded on the yudu status page webpage. Support@Sentinelresilience.com com email address should customers wish to raise a support ticket to discuss the issue further.
2. If system is affected for longer than 2 hours, we initiate an outward communication from the sentinel system to the affected group via email and SMS channels.
3. We keep communicating updates on system outage every couple of hours from then on with progress on remediation.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Sentinel is a cloud based service that has multiple levels of management access controlled by permissions and strong password policies. A restricted and named number of security cleared YUDU developers have admin access to maintain and fix issues on the system.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- Originally accredited on 6th September 2019, and renewed in 2020, 2021, 2022,2023
- What the ISO/IEC 27001 doesn’t cover
- A.10.1 Cryptographic controls: A.10.1.1: Policy on the use of cryptographic controls A.10.1.2: Key management A.11 Physical and environmental security: A.11.1.5: Working in secure areas A.11.1.6: Delivery and loading areas A.14.2 Security in development and support processes A.14.2.7: Outsourced development A.18.1 Compliance with legal and contractual requirements A.18.1.5: Regulation of cryptographic controls
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 01/01/2016
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- We are with AWS, who are CSA STAR accredited.
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Data privacy is managed by the Data Protection Office who reports directly to the CEO. Security Policies are reviewed quarterly by the Board and updated using version control system. All updated policies are available to employees in the company app. Penetration testing is conducted at least every 12 months.
The INFOSEC policies are created and enforced by the Yudu Information Management Security Group which forms part of our ISO 27001 audit. Quarterly Business Continuity Plan tests are conducted quarterly and reports generate with lessons learned. YUDU runs an online security incident reporting system and change management system which are reviews on a 6 month basis.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- The processes are set out in the Sentinel Secure Development Policy. Any change to the configuration of the system requires change management authorisation and any changes are logged on the online change management system. Software releases go through an automated test suite including DAST and SAST tools followed by manual interface test and peer review. Software releases are made every 2 months on average.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
AWS Guard Duty is deployed across the Sentinel server estate which monitors unusual activity. We use AWS Cloudtrail to monitor AWS access and usage with the requisite alerts.
Github's Dependabot tool is used to alert for any known vulnerabilities.
Patches are deployed with assessed critical patched are deployed immediately.
Laravel Enlightn which is used in the internal development environment.
Potential threats are also reviewed as part of the ISMS team. Cyber threats are assessed and advice from multiple sources including our cyber consultants network and the National Cyber Security Centre. Critical patches are deployed within 24hrs of notification or discovery. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our development team run network scans which may identify a potential compromise. The data is encrypted at rest and access is by 2 factor authentication: any unusual activity including data transfer is monitored. When a potential compromise is identified, the in-house YUDU Sentinel crisis management system is activated and used to immediately alert the incident team and set up a conference call with the response team. The next steps and responsibilities are decided on the call and the actions monitored on the system throughout the incident. Response times vary from minutes for a cyber attack to 4 hours.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The YUDU Incident Management Process document sets out the framework of the incident response. Our in-house YUDU Sentinel system is used to alert staff of a problem and check the status of all employees. The actions taken next will follow the protocols set out in the IMP document and Business Continuity Plan. Staff have off-line access to through our Sentinel App. The senior leadership team communicate next steps through Sentinel communication channels.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Sentinel uses data centres that will be using 100% renewable energy by 2025. It is a paperless system that saves trees and the energy used in the manufacture and distribution of paper-based products
Pricing
- Price
- £5,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 3 month money back for set up costs on full Sentinel installations