Skip to main content

Help us improve the Digital Marketplace - send your feedback

Simac IDS UK

Presto Student Success with Attendance, Engagement, Case Management and Analytics

We deliver a proven holistic student engagement and retention solution. The service is provided through the cloud and facilitates attendance registration and engagement monitoring for both home and Tier 4 students. With effective workflow and analytics built-in to provide management information on student experience, retention, outcomes and effective space use.

Features

  • Accurate and real-time attendance collection
  • Powerful and flexible thresholds for attendance and engagement issues
  • Workflow to support and reflect engagement policies and procedures
  • Targetted interactive dashboards for staff involved in engagement and retention
  • Real-time self-service for students, including registration and absences etc
  • UKVI compliant for Tier4 international students
  • Instant attendance and engagement visibilty for students
  • (Rest) API integrations with key University systems
  • Wide range of reports available to support processes and outcomes
  • Device agnostic, and mobile friendly.

Benefits

  • Attendance is collected using a range and mix of methods
  • Flexible thresholds mean departments can have differing and targeted thresholds
  • Workflow ensures that engagement issues should never be missed
  • Interactive dashboards ensure users see the information they need
  • Students can register for activities and absences on mobile devices
  • Staff can easily track, make appointments and provide outcomes information
  • Students access to their engagement information on their mobile devices
  • Instant actual utilisation compared to planned, supports effective space planning
  • Comprehensive reporting that makes it easy to share information
  • Pro-active notifications for staff and students.

Pricing

£5.05 a user a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tony.vicente@Simac-IDS.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 9 8 2 4 2 4 2 6 7 3 3 8 7 8

Contact

Simac IDS UK Tony Vicente
Telephone: 07301555673
Email: tony.vicente@Simac-IDS.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No, we don't have any constraints that buyers should know about.
System requirements
We do not have any specific system requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
We respond to email contact within 1 hour. We do not currently provide active support at weekends,
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide a high level of support to all of our customers. We do not charge additionally for our support, unless it is on-site or weekend/out of hours. These are priced according to the particular requirement. We have however found that University and Further Education institutions have rarely if ever required weekend support.
The Presto system is available 24/7 365 days a year (excluding any planned maintenance).
The system has an availability of 99,9%
Our SLA includes all of our response times and services etc.
We provide a technical consultant to provide support as required for our customers.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We always start by sitting down with our customer to get an understanding of their processes, goals and needs. Together with our customer, we will then draw-up or refine their requirements and then setup an implementation/adoption plan. This plan will consist of system setup and configuration, training, integration, process and procedures mapping, staff engagement and evaluation/testing. We provide comprehensive supporting documentation both on-line and in hard copy.

Throughout the whole implementation and startup-up phase each stage, we work closely together with our customers. From experience we know that configuring a system, tailored to our customers' needs, is an iterative process. That is why we use an agile approach, to handle advancing insights along the way. This ensures a flexible and effective implementation and greater acceptance from users, administrators and stakeholders.

We have a great deal of experience delivering our solution over the last 15 years, which ensures we deliver solutions that meet and exceed our customers' expectations.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
As part of the end-of-contract, data can be extracted in several ways:

1. By default, Presto already provides various data exports through the reporting menus.
2. We provide a "StorageDB" export interface that exports all Presto data to the customer's own data repository regularly.
3. On request, we will export all of the customer's data in a machine readable format and hand it over to the customer.

After the customer has signed off accepting the data extraction, Simac will delete all customer data from their systems, in compliance with GDPR.

We can provide for a new subscription fee, continued access to your historical data.
End-of-contract process
As described in the previous section "End-of-contract data extraction", the customer will be handed over the complete data set of Presto4, at no additional cost.

After the data has been handed over and the customer has signed off for this, we will delete all data in our systems, following our GDPR compliant data-destruction process. Once this is done, the customer is notified of the destruction being completed.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
We use responsive design to support all web enabled devices and as such do not differentiate for end users.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Users of our system use either web browsers or apps to access our systems.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Accessibility is an important part of the application and we test this regularly with our customers.
Presto can be used by screen reader software in line with WCAG specified standards. Alternative text and icons are also available throughout the application. Text, icons and alt-text are available and are configurable as required if specific additional needs or details are identified.
API
Yes
What users can and can't do using the API
We provide several REST API's for connecting third party systems with Presto. Our standard API's cover connections to most well known applications such as SRS's and timetabling systems etc. We also provide a standard API for direct, real-time exports to any external (customer) database.
We supply both "push" and "pull" type API's.
We always engage with our (new) customers to determine the best and most reliable connection and will tailor our API's to fit our customers' needs.
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Our system has a high level of configuration/customisation. Users (dependant on their authorisation) can configure many parameters for every step in the attendance and analytics process. Some customisation examples are:
- Parameters regarding attendance data collection
- Absence types
- Authorised /unauthorised absences
- Fully configurable organisational structure
- Custom process workflows/forms/fields
- Configuration of reports
- Authorised users can create customisation through the Presto Manage Interface.
Customisation and configuration is done by authorised users with the right permissions (roles) and is done through the Presto Admin module.
We will always engage with our customers to guide them through the configuration/customisation of the system, so it will be adapted perfectly to their processes and procedures.

Scaling

Independence of resources
Our systems are based on a "private cloud" configuration, with dedicated resources. This means that our customers' systems by default are not shared with or influenced by other customers.

Regarding the users of a customer, we design our solution to scale (with a substantial buffer) based on the planned requirements of each customer. As we monitor our customers' system performance and resources continuously, we are able to adapt quickly to changing resource demands.

Analytics

Service usage metrics
Yes
Metrics types
We have a real-time dashboard that displays all monitored processes and their status. In case of an event, details of the event can be mailed to the customer in real-time.
Customers can receive service statistics on requests.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Presto provides several ways of exporting data.
In our reporting section, most reports and lists can be exported in CSV or Excel format. Additionally, we provide our StorageDB connector that can be configured to automatically export a pre-defined data set to the customer's own data repository.
Exports can be scheduled to any interval.
Data export formats
  • CSV
  • Other
Other data export formats
  • Microsoft SQL
  • Oracle
  • MySQL
  • MariaDB
Data import formats
  • CSV
  • Other
Other data import formats
  • Microsoft SQL
  • Oracle
  • MySQL
  • MariaDB

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We have provided our SLA.
We guarantee 99.9% availability.
Approach to resilience
Our servers are hosted at a Dutch (UK hosting with same standards available also) hosting provider, that meets the highest standards. Among others, they are ISO27001, ISO9001, ISO14001, ISAE 3000 / SOC 2 type 2 and PCI-DSS certified.

We can guarantee a 99,9% availability. If higher levels are required, we can offer 99,95% availability at additional cost.

The data centers are physically guarded by security, 24/7/365.
The data centers have 3 separate power feeds and 3 separate connections to the Internet.
Outage reporting
We actively monitor our customers' systems processes and connections. In case of an occurrence of any type (defined with our customer), we can actively signal the customer by email, supplying details of the event.
During service hours, in case of an event that will impact the normal operation of the customer, we will immediately get in touch with the customer by phone.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Our own software systems as well as our third party tooling are fully role and permission based. Only authorised users have access to data specifically required for their operational role and duties.

All access to customer data is audited and is regularly assessed to ensure it meets our data and security policies.
Access restriction testing frequency
At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
DEKRA
ISO/IEC 27001 accreditation date
5/03/2021
What the ISO/IEC 27001 doesn’t cover
We cover all key aspects of our business operations.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • SURF
  • ISO 9001:2015
  • ISO 27001:2013
  • ISAE 3402 type II
  • ISO 14001:2015
  • ISO 50001:2018

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
We comply with the SURF-standard. SURF is a collaborative organisation for ICT in Dutch higher education and research (JISC equivalent). The SURF standard is a derivative of the ISO 27001.
Information security policies and processes
As stated in the "Security governance" section, we comply with the SURF-standard, which is a derivative of ISO 27001.
To execute and meet this standard, we have a system in place where we store all information regarding policies, processes, impact analyses and audit results. Our security officer keeps track of changes and ensures there is focus on security awareness with our employees.

We fully comply with the GDPR standard.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Any change to the software or the configuration thereof, is handled by our issue management system.
Any request or question from the customer is initiated via our Service Portal. Cases follow a workflow that allows to track the status throughout it's lifetime. The issue management system is accessible by our customers.

When engaging in a change to a customers system, we:

- Describe, validate and authorise the change through a workflow
- Run automated tests on the software
- Manually test the changes on the customer's test environment, together with the customer
- Move the change to production
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Following the SURF standard (previously described, JISC equivalent), we perform risk assessments of new systems or changes to existing systems.
We test our systems automatically and manually and, where applicable, we perform additional "hack" and load tests.

Our fully automated, test driven development tooling ensures that we can deploy patches very quickly.

Our monitoring system and centrally managed virus & threat protection systems warn us in case of immediate threats. Additionally, we have a real-time anti-DDoS security system in place.
Subscriptions to several IT and tech news sites keep us informed of "trends".

We can provide additional documentation on request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our real-time monitoring system monitors the processes and resources of all of our customers. In general, this allows us to react to events even before our customers notice anything.
We provide a 24/7/365 DDoS protection service on our cloud based service.

During working hours, we have support engineers on call. They will respond immediately to events from our own monitoring system, or to telephone or web portal service calls from the customer.
We record our response times in the SLA we have with our customers. During working hours, we normally respond to events within 15 minutes.
Incident management type
Supplier-defined controls
Incident management approach
Our customers and our own service agents can report their incidents trough our web based service portal. Incidents follow pre-defined processes, based upon their nature and severity.

As all communication is done via the Service Portal, all information regarding incidents is accessible in real-time by the customer.
On request, we can provide our customers with aggregated reports.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Equal opportunity
  • Wellbeing

Equal opportunity

Equality, Diversity, and Inclusion:

We recognise that unconscious bias, discrimination, and harassment can hinder a truly inclusive workplace. To address these issues, we provide ongoing EDI training for our supervisory and management staff. This training covers:

Unconscious Bias: We educate our leaders on identifying and mitigating unconscious biases that can lead to unfair or inequitable treatment.

Discrimination and Harassment Prevention: We provide comprehensive training on recognising, preventing, and responding to discrimination and harassment in the workplace.

Inclusive Leadership: We empower our leaders to foster a culture of inclusion, where all employees feel valued, heard, and respected.

Through these EDI initiatives, we strive to create a workplace where everyone feels welcome, respected, and empowered to contribute their unique talents and perspectives. We believe that a diverse and inclusive workplace is not just the right thing to do, but it is also essential for our long-term success.

Wellbeing

EDI: Creating a Fair, Equitable, and Inclusive Workplace

Simac is committed to fostering a workplace that embraces fairness, equity, and inclusion (EDI) for all employees, including contract workers. We recognise that a diverse and inclusive workforce is not only a moral imperative but also a key driver of innovation, creativity, and productivity. To achieve our EDI goals, we have implemented and are constantly expanding a range of initiatives:

1. In-work Development and Progression Opportunities:

We believe in empowering our employees to reach their full potential and advance their careers. We provide a variety of opportunities for professional growth, including:

Skill Development Training: We offer comprehensive training programs and workshops to enhance employees' skills and knowledge, aligning with their career aspirations and the evolving needs of our industry.

Mentorship Programmes: We pair experienced employees with mentees to provide guidance, support, and career development insights. These mentorship relationships foster a culture of learning and growth within our organisation.

Coaching Programmes: We provide access to personalised coaching services to help employees identify their strengths, set goals, and navigate career transitions effectively.

Pricing

Price
£5.05 a user a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tony.vicente@Simac-IDS.com. Tell them what format you need. It will help if you say what assistive technology you use.