Presto Student Success with Attendance, Engagement, Case Management and Analytics
We deliver a proven holistic student engagement and retention solution. The service is provided through the cloud and facilitates attendance registration and engagement monitoring for both home and Tier 4 students. With effective workflow and analytics built-in to provide management information on student experience, retention, outcomes and effective space use.
Features
- Accurate and real-time attendance collection
- Powerful and flexible thresholds for attendance and engagement issues
- Workflow to support and reflect engagement policies and procedures
- Targetted interactive dashboards for staff involved in engagement and retention
- Real-time self-service for students, including registration and absences etc
- UKVI compliant for Tier4 international students
- Instant attendance and engagement visibilty for students
- (Rest) API integrations with key University systems
- Wide range of reports available to support processes and outcomes
- Device agnostic, and mobile friendly.
Benefits
- Attendance is collected using a range and mix of methods
- Flexible thresholds mean departments can have differing and targeted thresholds
- Workflow ensures that engagement issues should never be missed
- Interactive dashboards ensure users see the information they need
- Students can register for activities and absences on mobile devices
- Staff can easily track, make appointments and provide outcomes information
- Students access to their engagement information on their mobile devices
- Instant actual utilisation compared to planned, supports effective space planning
- Comprehensive reporting that makes it easy to share information
- Pro-active notifications for staff and students.
Pricing
£5.05 a user a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 9 8 2 4 2 4 2 6 7 3 3 8 7 8
Contact
Simac IDS UK
Tony Vicente
Telephone: 07301555673
Email: tony.vicente@Simac-IDS.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No, we don't have any constraints that buyers should know about.
- System requirements
- We do not have any specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We respond to email contact within 1 hour. We do not currently provide active support at weekends,
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide a high level of support to all of our customers. We do not charge additionally for our support, unless it is on-site or weekend/out of hours. These are priced according to the particular requirement. We have however found that University and Further Education institutions have rarely if ever required weekend support.
The Presto system is available 24/7 365 days a year (excluding any planned maintenance).
The system has an availability of 99,9%
Our SLA includes all of our response times and services etc.
We provide a technical consultant to provide support as required for our customers. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We always start by sitting down with our customer to get an understanding of their processes, goals and needs. Together with our customer, we will then draw-up or refine their requirements and then setup an implementation/adoption plan. This plan will consist of system setup and configuration, training, integration, process and procedures mapping, staff engagement and evaluation/testing. We provide comprehensive supporting documentation both on-line and in hard copy.
Throughout the whole implementation and startup-up phase each stage, we work closely together with our customers. From experience we know that configuring a system, tailored to our customers' needs, is an iterative process. That is why we use an agile approach, to handle advancing insights along the way. This ensures a flexible and effective implementation and greater acceptance from users, administrators and stakeholders.
We have a great deal of experience delivering our solution over the last 15 years, which ensures we deliver solutions that meet and exceed our customers' expectations. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
As part of the end-of-contract, data can be extracted in several ways:
1. By default, Presto already provides various data exports through the reporting menus.
2. We provide a "StorageDB" export interface that exports all Presto data to the customer's own data repository regularly.
3. On request, we will export all of the customer's data in a machine readable format and hand it over to the customer.
After the customer has signed off accepting the data extraction, Simac will delete all customer data from their systems, in compliance with GDPR.
We can provide for a new subscription fee, continued access to your historical data. - End-of-contract process
-
As described in the previous section "End-of-contract data extraction", the customer will be handed over the complete data set of Presto4, at no additional cost.
After the data has been handed over and the customer has signed off for this, we will delete all data in our systems, following our GDPR compliant data-destruction process. Once this is done, the customer is notified of the destruction being completed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- We use responsive design to support all web enabled devices and as such do not differentiate for end users.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Users of our system use either web browsers or apps to access our systems.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
Accessibility is an important part of the application and we test this regularly with our customers.
Presto can be used by screen reader software in line with WCAG specified standards. Alternative text and icons are also available throughout the application. Text, icons and alt-text are available and are configurable as required if specific additional needs or details are identified. - API
- Yes
- What users can and can't do using the API
-
We provide several REST API's for connecting third party systems with Presto. Our standard API's cover connections to most well known applications such as SRS's and timetabling systems etc. We also provide a standard API for direct, real-time exports to any external (customer) database.
We supply both "push" and "pull" type API's.
We always engage with our (new) customers to determine the best and most reliable connection and will tailor our API's to fit our customers' needs. - API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Our system has a high level of configuration/customisation. Users (dependant on their authorisation) can configure many parameters for every step in the attendance and analytics process. Some customisation examples are:
- Parameters regarding attendance data collection
- Absence types
- Authorised /unauthorised absences
- Fully configurable organisational structure
- Custom process workflows/forms/fields
- Configuration of reports
- Authorised users can create customisation through the Presto Manage Interface.
Customisation and configuration is done by authorised users with the right permissions (roles) and is done through the Presto Admin module.
We will always engage with our customers to guide them through the configuration/customisation of the system, so it will be adapted perfectly to their processes and procedures.
Scaling
- Independence of resources
-
Our systems are based on a "private cloud" configuration, with dedicated resources. This means that our customers' systems by default are not shared with or influenced by other customers.
Regarding the users of a customer, we design our solution to scale (with a substantial buffer) based on the planned requirements of each customer. As we monitor our customers' system performance and resources continuously, we are able to adapt quickly to changing resource demands.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We have a real-time dashboard that displays all monitored processes and their status. In case of an event, details of the event can be mailed to the customer in real-time.
Customers can receive service statistics on requests. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Presto provides several ways of exporting data.
In our reporting section, most reports and lists can be exported in CSV or Excel format. Additionally, we provide our StorageDB connector that can be configured to automatically export a pre-defined data set to the customer's own data repository.
Exports can be scheduled to any interval. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Microsoft SQL
- Oracle
- MySQL
- MariaDB
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Microsoft SQL
- Oracle
- MySQL
- MariaDB
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We have provided our SLA.
We guarantee 99.9% availability. - Approach to resilience
-
Our servers are hosted at a Dutch (UK hosting with same standards available also) hosting provider, that meets the highest standards. Among others, they are ISO27001, ISO9001, ISO14001, ISAE 3000 / SOC 2 type 2 and PCI-DSS certified.
We can guarantee a 99,9% availability. If higher levels are required, we can offer 99,95% availability at additional cost.
The data centers are physically guarded by security, 24/7/365.
The data centers have 3 separate power feeds and 3 separate connections to the Internet. - Outage reporting
-
We actively monitor our customers' systems processes and connections. In case of an occurrence of any type (defined with our customer), we can actively signal the customer by email, supplying details of the event.
During service hours, in case of an event that will impact the normal operation of the customer, we will immediately get in touch with the customer by phone.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Our own software systems as well as our third party tooling are fully role and permission based. Only authorised users have access to data specifically required for their operational role and duties.
All access to customer data is audited and is regularly assessed to ensure it meets our data and security policies. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- DEKRA
- ISO/IEC 27001 accreditation date
- 5/03/2021
- What the ISO/IEC 27001 doesn’t cover
- We cover all key aspects of our business operations.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SURF
- ISO 9001:2015
- ISO 27001:2013
- ISAE 3402 type II
- ISO 14001:2015
- ISO 50001:2018
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- We comply with the SURF-standard. SURF is a collaborative organisation for ICT in Dutch higher education and research (JISC equivalent). The SURF standard is a derivative of the ISO 27001.
- Information security policies and processes
-
As stated in the "Security governance" section, we comply with the SURF-standard, which is a derivative of ISO 27001.
To execute and meet this standard, we have a system in place where we store all information regarding policies, processes, impact analyses and audit results. Our security officer keeps track of changes and ensures there is focus on security awareness with our employees.
We fully comply with the GDPR standard.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Any change to the software or the configuration thereof, is handled by our issue management system.
Any request or question from the customer is initiated via our Service Portal. Cases follow a workflow that allows to track the status throughout it's lifetime. The issue management system is accessible by our customers.
When engaging in a change to a customers system, we:
- Describe, validate and authorise the change through a workflow
- Run automated tests on the software
- Manually test the changes on the customer's test environment, together with the customer
- Move the change to production - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Following the SURF standard (previously described, JISC equivalent), we perform risk assessments of new systems or changes to existing systems.
We test our systems automatically and manually and, where applicable, we perform additional "hack" and load tests.
Our fully automated, test driven development tooling ensures that we can deploy patches very quickly.
Our monitoring system and centrally managed virus & threat protection systems warn us in case of immediate threats. Additionally, we have a real-time anti-DDoS security system in place.
Subscriptions to several IT and tech news sites keep us informed of "trends".
We can provide additional documentation on request. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our real-time monitoring system monitors the processes and resources of all of our customers. In general, this allows us to react to events even before our customers notice anything.
We provide a 24/7/365 DDoS protection service on our cloud based service.
During working hours, we have support engineers on call. They will respond immediately to events from our own monitoring system, or to telephone or web portal service calls from the customer.
We record our response times in the SLA we have with our customers. During working hours, we normally respond to events within 15 minutes. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Our customers and our own service agents can report their incidents trough our web based service portal. Incidents follow pre-defined processes, based upon their nature and severity.
As all communication is done via the Service Portal, all information regarding incidents is accessible in real-time by the customer.
On request, we can provide our customers with aggregated reports.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
Equality, Diversity, and Inclusion:
We recognise that unconscious bias, discrimination, and harassment can hinder a truly inclusive workplace. To address these issues, we provide ongoing EDI training for our supervisory and management staff. This training covers:
Unconscious Bias: We educate our leaders on identifying and mitigating unconscious biases that can lead to unfair or inequitable treatment.
Discrimination and Harassment Prevention: We provide comprehensive training on recognising, preventing, and responding to discrimination and harassment in the workplace.
Inclusive Leadership: We empower our leaders to foster a culture of inclusion, where all employees feel valued, heard, and respected.
Through these EDI initiatives, we strive to create a workplace where everyone feels welcome, respected, and empowered to contribute their unique talents and perspectives. We believe that a diverse and inclusive workplace is not just the right thing to do, but it is also essential for our long-term success.Wellbeing
EDI: Creating a Fair, Equitable, and Inclusive Workplace
Simac is committed to fostering a workplace that embraces fairness, equity, and inclusion (EDI) for all employees, including contract workers. We recognise that a diverse and inclusive workforce is not only a moral imperative but also a key driver of innovation, creativity, and productivity. To achieve our EDI goals, we have implemented and are constantly expanding a range of initiatives:
1. In-work Development and Progression Opportunities:
We believe in empowering our employees to reach their full potential and advance their careers. We provide a variety of opportunities for professional growth, including:
Skill Development Training: We offer comprehensive training programs and workshops to enhance employees' skills and knowledge, aligning with their career aspirations and the evolving needs of our industry.
Mentorship Programmes: We pair experienced employees with mentees to provide guidance, support, and career development insights. These mentorship relationships foster a culture of learning and growth within our organisation.
Coaching Programmes: We provide access to personalised coaching services to help employees identify their strengths, set goals, and navigate career transitions effectively.
Pricing
- Price
- £5.05 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- No