Skip to main content

Help us improve the Digital Marketplace - send your feedback

Matrix SCM

eBulkPlus

eBulkPlus is Matrix Security Watchdog’s proprietary world-class screening technology, delivering DBS and Disclosure Scotland checks at pace, including the electronic delivery of results.

Features

  • DBS and Disclosure Scotland checks
  • Social Media checks
  • Identity and Right-to-work checks
  • Reporting and management information
  • Unlimited numbers of client divisions and user accounts
  • User-friendly platform which is optimised to work on any device
  • Web-based platform which negates the need to download software
  • Applications tracked from submission through to completion

Benefits

  • Improves the turnaround time in performing background screening
  • Allows customers to submit online disclosure applications
  • Reduces the complexity and cost of background checks
  • Approved and accredited by the DBS and Ministry of Justice
  • Data validation reduces errors to 0.01%
  • Reduced processing times

Pricing

£2.50 a transaction

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at chris.grimes@matrix-scm.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 5 4 0 1 9 1 1 1 2 5 8 4 4 3

Contact

Matrix SCM Chris Grimes
Telephone: 07843072803
Email: chris.grimes@matrix-scm.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No
System requirements
Access to the internet

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond to all queries within 24 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Service desk, email and phone.
Service delivery team provided at no cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training is provided for the client admin users. Candidates will not require training as the candidate portal is highly intuitive, however, there are FAQ and support options available via the portal.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All client owned data can be extracted via the client portal in a default format. Bespoke data extract options may be available upon request.
End-of-contract process
Typically contracts run on a rolling annual commitment unless the client wishes to terminate at the end of the agreed contract time frame.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
EBulkPlus is fully mobile and tablet compatible and does not require an app to be downloaded. When using eBulkPlus on alternative devices, the platform will fully condense to the device to maximise user experience.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The main interface is through a web browser that is fully responsive to a work on mobile browser.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None.
API
Yes
What users can and can't do using the API
EBulkPlus has an open API. Our solution is capable of fully integrating with other systems, including Applicant Training Systems. our open API allows clients to build their own integrations. It allows them to pull and push their data to and from our solution in the ways that suit them best.
The integration has a few capabilities, which can either be used individually or in conjunction with each other:
• Your database could be fully integrated into ours. This would mean the candidate doesn’t need to be involved in the DBS checks.
• For part-integration we can trigger the invitation to the candidates to start the application from your system.
• Status updates can be sent back to the ATS platform on the candidate’s screening.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The following communications can be customised:
• Automated invitations to the candidates.
• Confirmation emails to the candidates.

Scaling

Independence of resources
Server capacity monitoring and alerting. Reviews of server perform.

Analytics

Service usage metrics
Yes
Metrics types
Real time dashboard and real time reporting.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Client users are able to export data via the eBulk Plus reporting functionality.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • HTML
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Imperva Web Application Firewall
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
VPN gateway
VLANs

Availability and resilience

Guaranteed availability
We have a 99% 24 x 7 uptime target
Approach to resilience
Tier 3 designed data centre with dual power generators, dual internet connection, dual network cards, dual servers, UPS's.
Outage reporting
Matrix Security Watchdog has a full business and continuity plan that documents exactly how outages are reported, how to and how frequently. Client Relationship Managers would manage all communications with client users directly by either email or phone.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Users are given a pre-defined role which controls what they can access within the system.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
29/03/2022
What the ISO/IEC 27001 doesn’t cover
Nothing.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Matrix is accredited for IS0 27001 which demonstrates we have a well-structured and embedded Information Security Management System. Account Managers report to the Business Management and Operations Director. Matrix SCM also holds the Cyber-Essentials certification.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All components of our eBulk Plus system are tracked through their lifetime via a risk register, issue log and/or change request process, which is managed by our IT support team/Product Management team. Any changes made to the system are put through rigorous user testing in a testing environment, which is signed off via a change board implemented on the the live production site.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our ISO27001 ISMS includes a specific documented process for vulnerability management. This includes weekly automated vulnerability testing, risk assessment and risk scoring in line with industry best practices, collation and review of results by the InfoSec manager, and accountability for resolution within a documented timeframe by the nominated product manager.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Regularly monitored and patched antivirus protection on endpoint devices. Imperva Web Application Firewall protects all web-based services. SIEM protection for critical event logs, with altering based on risk profile.
Incident management type
Supplier-defined controls
Incident management approach
We follow an ITIL-style approach to incident management. Software-related incidents are logged into the helpdesk system by end users where they are triaged and assigned a priority rating. Lower-rated incidents follow a default process, with a separate process reserved for Major Incident Management (MIM). Incident reports are communicated back to the end-users either through phone, email or the system itself. The technical support team are in direct contact with the product development team where resolution requires it.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

Our internal social value team will engage with public sector buyers and lead social value initiatives tailored to their goals. We will work with public sector buyers to understand their key priorities. From this, we will create an action plan that sets out our Social Value deliverables against fighting complement changes.

Equal opportunity

Our internal social value team will engage with public sector buyers and lead social value initiatives tailored to their goals. We will work with public sector buyers to understand their key priorities. From this, we will create an action plan that sets out our Social Value deliverables against driving equal opportunities.

Pricing

Price
£2.50 a transaction
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at chris.grimes@matrix-scm.com. Tell them what format you need. It will help if you say what assistive technology you use.