Skip to main content

Help us improve the Digital Marketplace - send your feedback

Essential Computing

HubStar Utilisation

HubStar Utilisation provides a true picture of occupancy in a single source of truth, to optimise costs, reduce emissions and create a workplace experience people love.

Features

  • Measure, predict & optimize occupancy
  • Flexible: use with or without occupancy sensors.
  • Predict occupancy based on historical patterns.
  • Reduce costs; use sensors only where most critical.
  • WiFi occupancy tracking for larger areas
  • Gain intelligent insights to support building consolidation.
  • Integrate with HubStar Connect for great employee experience.
  • Data driven insights based on actual occupancy data.
  • Integrate with Hubstar H20 and Hubstar Connect.
  • KPIs including workplace occupancy and adherence to RTO policy.

Benefits

  • Provide intelligent insights to decision makers about actual occupancy
  • Track impact of office-time policies to determine success.
  • Support cost reductions; suggestions for consolidating space.
  • Suggested re-purposing of office spaces based on usage.
  • Easily observe patterns of utilization on heat maps.
  • Multiple sensor options to meet requirements.
  • Predictive analytics with push alerts to stakeholders.
  • Deployment for short-term survey or longer term analysis.
  • Create a more collaborative working environment.

Pricing

£9,100 a unit a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@essential.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 9 9 2 1 6 4 9 5 6 1 8 9 8 6

Contact

Essential Computing Clare Knight
Telephone: 01275 343199
Email: info@essential.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft Office 365, Zoom.
Cloud deployment model
Private cloud
Service constraints
None.
System requirements
  • Internet Access
  • Access via any supported browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1 hour, Monday to Friday UK office hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
There are three levels of priority:

Urgent - an error that:
• Prevents the Services from processing a time-critical business process.
• Completely prevents one or more users from accessing Customer Data or putting new Customer Data into the Services.
• Causes loss or corruption of Customer Data. Examples:
• Cannot save any changes.
• Cannot open any Service Request.

Medium - an error that hinders a business process but is not necessarily time critical.
Examples:
• Unable to generate a standard report for a non-time critical business process (and Customer Data not available via other means).
• Room panel is off-line.

Low - an error that affects an important function of Services, but not vital for it to be resolved in the short term and/or where a reasonable work-around is available.
Examples:
• Unable to generate a standard report, but the Customer Data is available via another report

This is the vendor's standard SLA and it forms part of the clients normal subscription package, at no additional cost.

A Technical Account resource who has product knowledge will address the problem directly with the customer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Essential provide a complete onboarding service, designed to leave our customers ready and equipped to go live.

An outline of the process is below:

Planning workshop with dedicated consultant/s:
• Review requirements, priorities and scope of implemention
• Define workflow for booking process
• Identify the key users & roles
• Specify Rules and Restrictions required to meet business needs
• Discuss integration with EntraID, SSO and M365 with IT representatives.

Data Collection Phase
Templates are provided to our customers, to support capture of key information such as resource names, numbers, hours of operation, user roles and groups. We'll also discuss branding requirements to suit organisational branding.

Remote Configuration by Essential including:
• Remote configuration of database
• Population of resource data from templates
• Configuration of Business Rules & notifications
• Catering & other services
• Approval Process

Validation and Testing
• Demonstrate configured system to stakeholders
• Make final adjustments
• Gain acceptance of configured system
• Training – Admin / Users
• Plan Go-Live
• Post On-Boarding Check Up
Training Services
• Training services are provided remotely via Teams and recorded for reference.
• Customer Success will check in periodically throughout the subscription period.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The customer has access to their data for the length of the contract. This is available within the application.

Any data remaining on the service will be deleted from any backups 30 days after the subscription ends.
End-of-contract process
Customers can gain access to their data before the end of the subscription period. Once the subscription lapses access will be removed from the customer.

The data will remain on back-up for 30 days, after which the data will be permanently destroyed.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
HubStar Utilisation can be viewed though any currently supported web browser. It consolidates multiple data sources across the portfolio by unifying occupancy data from anywhere (WI-FI, sensors, badges, scheduling and more) into a single view. Understand when peak utilisation occurs, what were the previous trends and how is occupancy forecast going forward. Data can be filtered and re-processed against multiple metrics and easily exported for sharing. Interactive dashboards offer three alternative metrics to be displayed: Opportunity, Utilisation Rate and Time-in-use Rate.
Accessibility standards
None or don’t know
Description of accessibility
Access via any supported browser.
Accessibility testing
None.
API
Yes
What users can and can't do using the API
There is an API framework consisting of a library of API endpoints that enable integration and extensions. There is also an API broker that allows us to call 3rd party tools directly.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Customisable options include: Measured daily time span, data fields, analyzed date/time frame, data grouping, space classifications, meta data tags, favourites, time data markers, building settings, office hours, holidays, excluded periods, core hours, room sizes. The customer has the ability to customise the service.

Scaling

Independence of resources
HubStar Utilisation is hosted internationally by Amazon Web Services (AWS) with EU location in Dublin. Load balancers and scaling groups are in place to allow for scalability. Ongoing performance monitoring is in place to ensure the suitability of the running stack to the observed load and activity and there are customer databases with over a hundred thousand users and tens of thousands of resources.

Analytics

Service usage metrics
Yes
Metrics types
Hubstar Utilisation consolidates data from Wi-Fi, Sensors, Access Control systems and Hubstar Connect booking data.
View real-time zone-level utilisation versus capacity. Occupancy changes over time with heatmaps. Understand previous trends and forecast future occupancy. Floor plans provide a clear picture of utilisation at a glance. Compare neighbourhood and zone usage.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
HubStar Systems Limited

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Data is stored in an encrypted RDS instance in AWS to AES-256 standard.
Databases and PII within the data is also encrypted.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
There is an API endpoint for data export.
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
  • CSV
  • Other
Other data import formats
PDF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Globally we use Amazon Web Services (AWS) for both production and DR. DR testing for both environments is performed annually. Minimum system uptime for Production Systems is 99.5%, measured monthly.
Our continuity objectives are stated in terms of the amount of time it would take to resume normal operations in case of a major event. Note that minor events will have a much faster recovery time.

A major event is one which renders all of the systems at one site unusable. For a major event involving client-facing systems, our DR Recovery Time Objective (RTO) is 8 hours, while our Recovery Point Objective (RPO) is 24 hours. Note that client systems are also designed with local resilience so that no single component failure will cause a substantial outage or loss of data.
Approach to resilience
We provide load balancing architecture - details can be made available upon request.
The application leverages AWS load balancing and dynamic routing components to ensure lowest latency and highest availability.
Application servers are split between two (at least) availability zones within each region to ensure continuity of service should one availability zone become unavailable.
Elastic load balancers distribute the traffic across the available servers.
Servers are grouped under auto scaling groups which allows for the increase in processing capability if the application is put under stress.
Outage reporting
Email alerts will be sent for Planned Maintenance Works. Email alerts are sent to Client Administrators and Technical contacts, to advise of plans, remedies and general communications. If the client has an outage, a ticket will be raised following an email, portal log or telephone call.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Access is controlled as follows;
• Multi-factor authentication for named admin users to the hosted environment
• Support Portal - dedicated client users with username and password
• An email alert goes to the support agent with a unique ID
• Access levels are reviewed periodically
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
07/09/2022
What the ISO/IEC 27001 doesn’t cover
The ISO/IEC 27001 certification covers the Smartway2 by HubStar Workspace Management System.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
HubStar is committed to the establishment and maintenance of the Information Security Management System (ISMS) described in our Information Security Policy and implemented by Smartway2 to meet the requirements of ISO 27001:2022.

All members of Smartway2 staff within the ISMS impacted business areas shall strictly adhere to the policies and security procedures, which support the Information Security Policy.
The objectives of the ISMS are to:
• Meet legislative and regulatory requirements
• Design, develop and run secure resilient applications
• Identify and manage Information Security and Cyber Risks
• Identify and manage risks within the supply chain Smartway2

These intrinsically include:
• Continual review and improvement of the ISMS and Controls
• Comply with Customer security requirements
• Report on the effectiveness of the ISMS and controls to the CEO
• Provide assurance that Information Security is inherent within Business as usual activities

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
HubStar operate a thorough Change Request Process, and once a change request has been raised, it is documented and discussed as part of weekly triage. The request is placed on our CR system. The enhancement is addressed as follows;
• Evaluation
• Development
• Code Review
• Quality Assurance
• Deploy

Security needs to be considered at various stages. This translates into security gates throughout the process, at follows;
• Secure Requirement Review
• Risk Test Planning
• Secure Design Review
• Code Review
• Penetration testing
Changes are deployed as part of our normal deployment methodology.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Security and event monitoring is in place on the hosted environment to capture all privileged activity, in addition to the automated alerts that are configured.

When a vulnerability is identified, the issues will be weighed according to the rules outlined in the Risk test planning section.
Based on the Exposure obtained from this classification, the vulnerability or risk will be ranked.

Tests will be designed to be integrated to the regression tests (either automated or manual depending on the case) for future iterations.

Patch deployment - Not critical - within next maintenance window
Critical within 30 days following successful testing.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Automated alerts go to relevant parties. In the case of an availability or performance metric alert, the support team will be notified. In the case of an intrusion or intrusion attempt, the security officer and team will be notified. A triage will take place to classify, prioritise and assign the incident. Classification will fall into one of four categories.
Critical, Significant, Minor, Negligible.
Checks are performed automatically on the application, and automated alerts are dispatched to the team in case of availability events.
Not critical are patched within next maintenance window. Critical within 30 days following successful testing.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Application Issue -
For every incident a ticket is always raised via the Portal, Email or Telephone. These tickets are categorised – Critical, Medium or Low. The issue is addressed as per our SLA. A Root cause analysis is carried out for critical issues and communicated back to the customer

Hardware Issues -
Hardware supplied by HubStar will be covered by their subscription plan. Faulty units should be returned for assessment. Where appropriate, replacements will be returned to client within 5 working days of receipt of faulty unit, subject to availability.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

We are committed to reducing our environmental impact as part of how we operate as a digital business.
As a digital services provider, we enable our customers to realise sustainable hybrid workplaces for positive wellbeing and environmental impact through the technology solutions we provide, and through the way we collaborate to implement the solutions for long term success.
Our focus is on reducing energy and resource usage, reducing the need to travel where possible, and enabling team communications and education to support these objectives. We proactively support our customers, and vendors to do the same by delivering projects in a way which considers environmental factors at the planning stage.
In recent years, we have reduced our office footprint to support hybrid working, minimising travel requirements for our teams. Our services are delivered fully remotely to customers, to pass on the same benefits.

Equal opportunity

We provide technology solutions which help level the playing field for people across the workforce. Accessibility is a key consideration, and we work with solutions which integrate with Microsoft’s advanced accessibility capabilities wherever possible.

Wellbeing

The solutions we provide are aimed at making day to day working life better for the people using it, by enabling them to achieve more from within their Microsoft365 applications, reducing digital friction.
Doing the right thing is a core value of our business. This starts with commitment to our team, to be a responsible, fair and supportive employer, by offering a safe and welcoming environment to do their best work and providing development pathways where possible.
Our belief is that if our people are supported well, they can do the best they can for our customers.
Underpinning all the above, is the choice to work with vendors with aligned values in terms of their positive impact on their people, teams, partners, and customers.

Pricing

Price
£9,100 a unit a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We offer a trial as part of a proof of concept.
Link to free trial
We offer a Proof of Concept for eligible opportunities

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@essential.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.