eBulkPlus
eBulkPlus is Matrix Security Watchdog’s proprietary world-class screening technology, delivering DBS and Disclosure Scotland checks at pace, including the electronic delivery of results.
Features
- DBS and Disclosure Scotland checks
- Social Media checks
- Identity and Right-to-work checks
- Reporting and management information
- Unlimited numbers of client divisions and user accounts
- User-friendly platform which is optimised to work on any device
- Web-based platform which negates the need to download software
- Applications tracked from submission through to completion
Benefits
- Improves the turnaround time in performing background screening
- Allows customers to submit online disclosure applications
- Reduces the complexity and cost of background checks
- Approved and accredited by the DBS and Ministry of Justice
- Data validation reduces errors to 0.01%
- Reduced processing times
Pricing
£2.50 a transaction
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 5 4 0 1 9 1 1 1 2 5 8 4 4 3
Contact
Matrix SCM
Chris Grimes
Telephone: 07843072803
Email: chris.grimes@matrix-scm.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Access to the internet
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond to all queries within 24 hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Service desk, email and phone.
Service delivery team provided at no cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training is provided for the client admin users. Candidates will not require training as the candidate portal is highly intuitive, however, there are FAQ and support options available via the portal.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All client owned data can be extracted via the client portal in a default format. Bespoke data extract options may be available upon request.
- End-of-contract process
- Typically contracts run on a rolling annual commitment unless the client wishes to terminate at the end of the agreed contract time frame.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- EBulkPlus is fully mobile and tablet compatible and does not require an app to be downloaded. When using eBulkPlus on alternative devices, the platform will fully condense to the device to maximise user experience.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The main interface is through a web browser that is fully responsive to a work on mobile browser.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
-
EBulkPlus has an open API. Our solution is capable of fully integrating with other systems, including Applicant Training Systems. our open API allows clients to build their own integrations. It allows them to pull and push their data to and from our solution in the ways that suit them best.
The integration has a few capabilities, which can either be used individually or in conjunction with each other:
• Your database could be fully integrated into ours. This would mean the candidate doesn’t need to be involved in the DBS checks.
• For part-integration we can trigger the invitation to the candidates to start the application from your system.
• Status updates can be sent back to the ATS platform on the candidate’s screening. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The following communications can be customised:
• Automated invitations to the candidates.
• Confirmation emails to the candidates.
Scaling
- Independence of resources
- Server capacity monitoring and alerting. Reviews of server perform.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Real time dashboard and real time reporting.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Client users are able to export data via the eBulk Plus reporting functionality.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- HTML
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Imperva Web Application Firewall
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
VPN gateway
VLANs
Availability and resilience
- Guaranteed availability
- We have a 99% 24 x 7 uptime target
- Approach to resilience
- Tier 3 designed data centre with dual power generators, dual internet connection, dual network cards, dual servers, UPS's.
- Outage reporting
- Matrix Security Watchdog has a full business and continuity plan that documents exactly how outages are reported, how to and how frequently. Client Relationship Managers would manage all communications with client users directly by either email or phone.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Users are given a pre-defined role which controls what they can access within the system.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 29/03/2022
- What the ISO/IEC 27001 doesn’t cover
- Nothing.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- Matrix is accredited for IS0 27001 which demonstrates we have a well-structured and embedded Information Security Management System. Account Managers report to the Business Management and Operations Director. Matrix SCM also holds the Cyber-Essentials certification.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All components of our eBulk Plus system are tracked through their lifetime via a risk register, issue log and/or change request process, which is managed by our IT support team/Product Management team. Any changes made to the system are put through rigorous user testing in a testing environment, which is signed off via a change board implemented on the the live production site.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our ISO27001 ISMS includes a specific documented process for vulnerability management. This includes weekly automated vulnerability testing, risk assessment and risk scoring in line with industry best practices, collation and review of results by the InfoSec manager, and accountability for resolution within a documented timeframe by the nominated product manager.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Regularly monitored and patched antivirus protection on endpoint devices. Imperva Web Application Firewall protects all web-based services. SIEM protection for critical event logs, with altering based on risk profile.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We follow an ITIL-style approach to incident management. Software-related incidents are logged into the helpdesk system by end users where they are triaged and assigned a priority rating. Lower-rated incidents follow a default process, with a separate process reserved for Major Incident Management (MIM). Incident reports are communicated back to the end-users either through phone, email or the system itself. The technical support team are in direct contact with the product development team where resolution requires it.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Our internal social value team will engage with public sector buyers and lead social value initiatives tailored to their goals. We will work with public sector buyers to understand their key priorities. From this, we will create an action plan that sets out our Social Value deliverables against fighting complement changes.Equal opportunity
Our internal social value team will engage with public sector buyers and lead social value initiatives tailored to their goals. We will work with public sector buyers to understand their key priorities. From this, we will create an action plan that sets out our Social Value deliverables against driving equal opportunities.
Pricing
- Price
- £2.50 a transaction
- Discount for educational organisations
- Yes
- Free trial available
- No