Charge Point Management System (Electric Vehicle Charging Software)
Clenergy EV allows you to manage, monetise and maintain your EV charging network - all from one platform.
Features
- Sell electricity from installed EVSEs to the public or employees
- Allow fleet vehicles to charge for free
- Set user groups per EVSE with customised policies
- Full tariff customisation to monetise installed chargers
- Maintain your network remotely with click-to-fix tools
- Multiple check out options - app, guest, PAYG or card
- OCPP compliant software inline with government regulations
- ISO 27001 accredited + Two-factor authentication
- Track every charge with administration and reporting platform
- 24/7 end user support as standard from trained staff
Benefits
- Earn money from EV charging installations to cover initial outlay
- Simple fleet experience, allowing free charging at point of use
- Lock usage to ensure chargers are available to key users
- Give discounts for charging to specified users
- Reset chargers remotely to fix most issues
- Ease of use for any type of Driver
- Hardware agnostic to the majority of EV brands
- Security and peace of mind as standard
- View your entire network with realtime stats
- Highly technical UK support available as needed
Pricing
£84 a unit
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at info@clenergy-ev.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
2 7 8 5 2 7 7 5 7 9 4 6 5 0 4
Contact
Clenergy EV
Michael Nixon
Telephone: 01443565405
Email: info@clenergy-ev.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- We are constrained by OCPP specific hardware within EV charging. This includes over 40 manufacturers in the UK currently (a full list is available on request).
- System requirements
-
- App available on any device with web browser
- Administration platform available on any device with web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- During office hours (9am-5pm, Monday - Friday) we reply within 2 hours, often sooner. Email and ticketing is handled entirely in house by our dedicated customer support team.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide 24/7 support to the end user as standard. Technical support is provided during standard working hours. We provide an account manager who is highly technical as the main point of contact for any issues long term.
We can provide on-site training and support to set up our services on specific EV charging hardware at a discounted cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide remote or onsite training if required, as well as user documentation to support the client using the platform. We provide end-user guides to support adoption and buy-in from EV Drivers using the service day-to-day.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- End users can download data as required from the platform at any time. If a contract ends and is not renewed, we can support the client in extracting data in csv or xls file if required.
- End-of-contract process
-
The contracted price is for a single EV charging station socket, for an annual licence. When that contracted period is up, the end client can use another platform if required. This swap is done by the end client and not by Clenergy EV support members, as it done per charging station, and this control always resides with the end client.
Any generated income on the EV charging stations will be passed to the end client at the end of the contracted period.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The mobile service is for end-users of the EV charging stations and is accessible via a downloadable app on the Play or App Store (Android and Apple mobile devices). A web app is also available. This allows drivers to pay for a charge.
The desktop service is our "administration platform" which is aimed to managers who require reporting functionality across their EV charger network. - Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The interface provides a visual representation of the various aspect of the EV charging network - it can be graph or text, but also a mapping system.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
-
We have an in-house UX/UI team that look after accessibility standards - this includes making sure colour pallets allow for color blind users and font sizes can be scale if required. We use symbols if possible to provide a universal experience.
We ask for feedback from users constantly to improve our interface. - API
- No
- Customisation available
- Yes
- Description of customisation
- The service can be "white-labelled" as necessary by the end client. This means every aspect of the "Clenergy EV" app and platform can say another brand name if required. This is only done by platform administrators and is a purchasable option.
Scaling
- Independence of resources
-
Our platform is built horizontally with scability in mind. Instead of building a vertical server that must house multiple requests, our system allows for multiple, smaller servers running alongside each other.
The platform can be considered 'stateless' other than the persistence layer. So each 'instance' or server of the platform doesn't know if it is handling 30,000 users out of 30,000 or 30,000 out of 3,000,000. In the latter scenario there would just be 100x the number of instances to cope.
This has been tested with over 1,000 interactions per second successfully.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We can measure the usage of our service by downloadable reports and also in-platform visualisations.
This includes every transaction that has occured on their EV charging network - including (but not limited to) revenue, tax, total kWh, usage type, transaction ID, date and time. There are over 100 data points that we track and can report on. They are split by these reporting types:
User
Income
OZEV compliance
Uptime
Charger Details
Fault Reports - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export data from the platform at any time by navigating to a "Analysis" page on the administration platform. This is completed as a .xls file type and is either emailed to the user or provide in browser (depending on file size).
- Data export formats
-
- CSV
- Other
- Other data export formats
- Xls
- Data import formats
-
- CSV
- Other
- Other data import formats
- Xls
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
-
We use a secure web socket and OCPP 1.6+ /2.0.1.
We also recommend use of SIM cards for connectivity which are separate to an internal network where required, so our software isn't directly connected to the client's IT network. - Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- We use a Secure Web Socket and OCPP 1.6+ / 2.0.1
Availability and resilience
- Guaranteed availability
-
Clenergy EV shall use reasonable endeavours to ensure that the uptime for the Hosted Services/Platform is at least 99% during each calendar month.
In respect of each calendar month during which the Hosted Services uptime is less than the commitment specified, the Customer shall earn service credits as follows:
1 month of service credit for each charge socket for any month which does not meet the commitment specified
This will be added to the end of each contractual period a required.
A full breakdown of our SLAs can be made available on request. - Approach to resilience
-
We use a horizontally scaling system to allow for more servers to be deployed automatically during heavy usage periods,to ensure resilience.
We also use CREST accredited Penetration testing and intruder reporting tools to ensure resilience from cyber attack.
More information can be made available on request. - Outage reporting
-
We use a public dashboard available on https://clenergyev.statuspage.io/ to report any outages on our platform.
A similar dashboard is also available on the administration platform, as well as email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
-
We use 2FA as standard throughout our support channels (Hubspot, JIRA) to ensure all client information is kept restricted.
Employees are only given access to management or support channels if it is required for their core job role. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 01/06/2022
- What the ISO/IEC 27001 doesn’t cover
- -
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have a nominated ISMS Manager that reports directly to the CEO for issues relating to security policies and processes that all company individuals must follow.
We have an ISO27001 accreditation that ensures all polices and processes are well document and adhere to best practice. This includes in total 13 separate process for security, including the following:
Access Control
Backup
Cryptographic control
Information Exchange
Information Security
Network Systems Monitoring
Password Contrrol
Remote Access
Secure Development
Security Incident Reporting
Supplier Relationship
Virus Protection
To ensure policies are followed, each employee is given an individual training regime that requires completion. This includes cyber security awareness related to the job. This is mandatory for all employees, at all company levels, and is set by the ISMS Manager.
During employee induction, they are made aware of all company security policies and are made aware of their responsibilities with regards to cyber security. The employee notice board contains all processes and policies, with any updates shared to the wider team if required.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- -
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We use an automated tool to run 24-hourly threat scanning of our platform. This then provides feedback.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
We use an automated penetration testing tool that scans our platform and network on a 24-hourly basis. Potential security risks are identified under the following criteria:
Severe
High
Medium
Low
Any issue in the "Severe" category are resolved as soon as possible by our development team, recognising the urgency in such a requirement. If necessary, systems will be placed offline to.
Other risks are discussed in a weekly meeting of senior team members, with resolution achieved the same week if possible. - Incident management type
- Undisclosed
- Incident management approach
-
We have a set incident management procedure that all employees must adhere too. This includes notifying the ISMS Manager if an incident occurs - this can be a near miss (i.e. a phishing email sent to a staff member) or a data leak/breach.
When reported, the ISMS manager will investigate the root cause of the issue and look to investigate or mitigate impacts. If a breach impacts clients, a report is made available detailing the incident and what actions have taken place to rectify. This is provided within 30 days.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Wellbeing
Fighting climate change
It is Clenergy EV's mission to enable the decarbonisation of the transport industry via our EV charging software. This is done by us being highly innovative and ensuring EV drivers or fleet operators are given the full benefits of this new technology.
As a company, we only use electric or hybrid vehicles within our fleet. We also provide EV chargers to employee homes if they are already in ownership of an electric vehicle.
We are signatories to Tech Zero and have already established our total carbon output as a company. By 2025, we will have an established carbon reduction plan to be net zero this decade.Covid-19 recovery
Clenergy EV emerged from the Covid-19 pandemic from one full-time employees at the start of 2020 to 12 by the end of 2021 - and then 30 by the end of 2023. We continue to grow whilst looking managing the impact of Covid-19 on our staff members, by allowing hybrid working.
Our development staff all work remotely, whilst our main office is flexible with working patterns.Wellbeing
By decarbonising transport, our planet's wellbeing, and that of its residents, will be secured for the next millennium.
As a company we provide for our employees' wellbeing by providing health insurance and healthy meal options at lunchtime. We also provide a gym within our office space.
Pricing
- Price
- £84 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We offer a basic offering of our service which is free at point of use. This allows up to 3 EV charging stations to be monetised and managed, with reduced reporting and support functionality.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at info@clenergy-ev.com.
Tell them what format you need. It will help if you say what assistive technology you use.