GencardaSuite
Gencarda Suite delivers up-to-date and trusted authentication of individuals’ credentials (qualifications, licences, certificates and memberships).
It is the chosen solution for a wide range of organisations looking for a sustainable, digital system to:
Reduce credential fraud
Engage with their membership/ community effectively and
Manage records in one powerful online system.
Features
- Quick and easy to set up. Sustainable .
- A scalable, fully hosted, secure online solution.
- High-security virtual or physical smartcards can be used.
- Each individual’s cards can hold multiple credentials.
- Cards can be updated, cancelled, suspended and reactivated electronically.
- Free apps for authenticating virtual/ physical smartcards and individual credentials.
- A range of data can be managed quickly using templates.
- API available for importing and exporting member/ individual data.
- Effective and simple reporting at your fingertips.
- Messaging module for effective and instant communication with cardholders
Benefits
- Suitable for a very wide range of organisations.
- Provides a powerful communications conduit to cardholders
- A dashboard provides key management information at a glance
- Card renewals are easy to identify and manage
- Information stored on cards is up to date and available
- Cards can be authenticated offline as well as online
- Virtual smartcards can be downloaded instantly.
- Sustainability. Virtual smartcards eliminate need to use plastic stock.
- Full card data is captured when cards are checked.
- Electronic card checks eliminate fake cards, cut fraud/ protect communities
Pricing
£10,000.00 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 7 3 4 7 2 3 7 6 8 0 9 1 9 1
Contact
Causeway Technologies Limited
Tanya Morris
Telephone: 01753 279927
Email: tanya.morris@causeway.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No formal constraints. Occasional system maintenance is managed through scheduled downtime, which is always communicated to clients in advance.
- System requirements
-
- A device with internet access and a current web browser
- Modern browser versions: MS Edge; Google Chrome; Apple Safari.
- Internet Connectivity
- (Optional) Checarda Android App: v6+. Rear-facing camera. NFC
- (Optional) Checarda iOS App: iOS 12+. Rear-facing camera. NFC
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Gencarda Database to Scheme administrators: Normal working hours Monday - Friday (09.00-17.00) only.
Response time varies depending on priority.
End users (i.e. cardholders) are supported by the Client organisation, not by Reference Point. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Service Availability: The standard GencardaSuite price includes hosted service availability (24/7 ) other than minimal scheduled downtime (for maintenance or updates), which is always communicated in advance.
Our Cloud service is monitored at all times to ensure full availability.
User Support to named, trained scheme administrators only during standard UK office hours (9am to 5pm Monday-Friday). - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training to Scheme Administrators as well as consultancy are offered as options within the Initial Set-up array for further charges.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The data remains the property of the data controller throughout the entirely of the contract/ service delivery and beyond contract end (and to be clear the client is Data Controller, NOT Reference Point). In line with the above, at the end of the contract, the full data-set will be provided to the client securely as a set of encrypted relational data tables in CSV or other agreed format.
- End-of-contract process
-
The standard End of Contract process is as follows. The Client shall settle any valid outstanding invoices for use of the Software and for the Services provided prior to termination. Within ten (10) Business Days Reference Point will supply the Client with a series of encrypted relational data-files containing any and all Client data held and shall securely dispose of any copies of the data held in the service immediately thereafter. The above service is included for a standard end of contract fee.
If the Client requires any additional services, these are available but would be additionally chargeable (such as requiring RPL to retain copies for more than 15 days after contract end or provide any further consultancy around end of contract processes).
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
In addition to the main online Gencarda database (accessed via a web browser), users can install the Checarda App (Android and iOS versions available), which enables people simply to check smartcards (physical or virtual) and the credentials on them.
Virtual smartcards can be downloaded to our electronic wallet called Vircarda (Android and iOS versions available). - Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Once logged in to the browser-based admin interface, the service user is presented with a clear and concise overview of the current service status. This then leads the user into a series of intuitive screens to represent the key application workflows driving the management of scheme members, the issuance of smartcards and the ongoing administration of credentials, such as qualifications, licences, certificates and identity documents.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- In-house development and testing.
- API
- Yes
- What users can and can't do using the API
-
The API facilitates programmatic execution of all the key tasks otherwise performed via the browser-based admin interface, with the exception of system configuration, user management and reporting.
API consumers are issued with an API key that restricts the scope of their interaction via the API to a given subset of the application model. Support and guidance is offered throughout the implementation of the API by way of developer training and usage samples. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Gencarda is hosted on the Microsoft Azure cloud platform and so benefits from the security tools, scalability and controls this provides. Run on a responsive, tiered platform, the system has been implemented to utilise the scalability, performance and resilience benefits offered by the MS Azure cloud. This includes the capability to be scaled horizontally and vertically to meet the demands of very large numbers of concurrent users and high volumes of transactions, with rapid escalation when demand/ usage peaks.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Gencarda's reporting module provides a suite of pre-built reports and the ability to define custom reports to meet specific client requirements. Once executed, the results can be exported to Excel or CSV.
In addition, server-level metrics can be provided from the functions provided by the Azure platform for a further fee. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Gencarda's reporting module provides a suite of pre-built reports which are also added to from time to time.
We also have the ability to define custom reports to meet specific client requirements and make these available on the system too (additional report creation charges may apply – depending on the content required). Once executed, any report results can be exported to Excel or CSV. - Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
- If using API, JSON or XML
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
The software is hosted and available over the internet on the Microsoft Azure platform 24 hours a day, 365/6 days a year with uptime (excluding planned downtime for scheduled maintenance or updates) of 99.5%. Run on a responsive, tiered platform, the system has been implemented to utilise the scalability, performance and resilience benefits offered by the MS Azure cloud.
This includes the capability to be scaled horizontally and vertically to meet the demands of very large numbers of concurrent users and high volumes of transactions, with rapid escalation when demand/ usage peaks.
Further details available on request.
The service is hosted in Azure data centres with geo-redundant back-ups.
The standard service is provisioned on MS Azure to ensure high availability through automated health monitoring and management services that the platform provides. As such, service resources are configured across multiple fault domains to guarantee the service will operate reliably in the event of an underlying hardware or infrastructure failure with a resilience ratio greater than N+1.
Further details are available on request. - Approach to resilience
-
The service is hosted in UK Azure data centres with geo-redundant back-ups. The standard service is provisioned on MS Azure to ensure high availability through automated health monitoring and management services that the platform provides. As such, service resources are configured across multiple fault domains to guarantee the service will operate reliably in the event of an underlying hardware or infrastructure failure with a resilience ratio greater than N+1.
Further details are available on request. - Outage reporting
- The service is fully and continually monitored with all notifiable failures immediately escalated to the technical service delivery team. Where necessary, outages are communicated to users via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The browser-based Administrator interface is governed by role-based authorisation within an allocated subset of the application data model, with roles ranging from application-wide system administrators to scheme-specific managers and administrators.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International Limited
- ISO/IEC 27001 accreditation date
- 16/08/2019
- What the ISO/IEC 27001 doesn’t cover
- There are no exemptions and therefore the Standard is fully covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The protection of client information is core to our business. Our approach to information security is fully aligned with our ISO 27001 accredited Information Security Management System. This means that we meet all regulatory and legislative requirements and ensure these are embedded in our policies and business continuity plans. Our information security objectives and business continuity plans are reviewed regularly. These are effectively tested and implemented in the business. All policies are also communicated across the business to all staff who receive suitable, regular training. We ensure the security, integrity and confidentiality of information at all times. We maintain and regularly update a comprehensive information asset register and review all access to information to ensure it is protected from unauthorised access. All third parties and sub-processors who work alongside us are made aware of their obligations towards protecting all information assets. Any breach of information security, whether actual or suspected, is reported to Reference Point's DPO for investigation.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All service components are subject to rigorous proactive monitoring throughout the entirety of their lifetime. All service infrastructure and configuration changes are thoroughly assessed for potential security impact and go through an internal change control/ change approval and robust pre-implementation testing process before being deployed to production environments. Additionally all hosted services are regularly reviewed and subject to external penetration testing from a CREST-accredited supplier to ensure they meet relevant IT security standards and industry best practice.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The underlying MS Azure platform is managed by Microsoft with regards to security and vulnerability management, as well as deployment schedules. All web browsers, Android and iOS Operating Systems are regularly updated by the OS vendors. As a result, Reference Point review all notified changes, vulnerabilities and security updates to ensure no negative impact on the Gencarda service and applications. We perform regular vulnerability scans and continually monitor information sources (such as OWASP) to maintain knowledge and expertise about potential threats that could affect our services and applications. If applicable, suitable updates are provisioned by us.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
The underlying MS Azure platform is managed by Microsoft which provides network level defences against DoS attacks and similar hostile attacks.
Additionally, Reference Point utilise the Azure web application firewalls and gateways to monitor and protect against malicious activity.
The configuration of these services for SkillGuard is reviewed by Microsoft Security technicians to ensure best practice is followed.
Exceptions and other alerts (e.g. around unusual traffic patterns) are automatically escalated to the technical support team at Reference Point.
Additional periodic review of WAF logs is also undertaken. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- There is a defined Incident Management procedure which would be followed. The key points are: Escalation and notification to relevant parties; Immediate analysis to enable confirmation and any immediate preventative actions to be taken. Capture of relevant details, log files, screenshots of incident for subsequent analysis; Development of (any required) actions to mitigate risks - both short and medium term. If required, notify relevant parties within statutory timeframes. Production of report following above. Clients will be notified in line with the SLA.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
As a company we are working towards gaining ISO 14001 certification. - Covid-19 recovery
-
Covid-19 recovery
Reference Point has a clear Covid-19 Risk Management strategy which is regularly reviewed and updated in line with the evolving pandemic - Equal opportunity
-
Equal opportunity
We have an equal opportunities policy which is adhered to and regularly.
reviewed/ updated. - Wellbeing
-
Wellbeing
Wellbeing is a staff priority within the business. This is communicated to all staff from senior management and is monitored.
Pricing
- Price
- £10,000.00 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No