EDGEBITS

Cloud Mobility Print Infrastructure Services - EDGEPRINT

A hybrid cloud print solution designed to support NHS Healthcare Providers to digitise their workforce, by enabling users to become fully mobile. This Software as a Service solution delivers standardisation and allows for future-proofing of the very complex and disparate IT print infrastructure across primary care and other IT estates.

Features

  • Cloud Service hosted in the UK.
  • Supports EMIS,TPP/SystmOne and Vision Clinical Systems.
  • Third party label printers and software compatibility including LabelTrace/Smart Label.
  • Automatic configuration of Printer Settings, Default Printer Trays/Duplex/Drivers.
  • Fully Managed Auto Updates for future-proofing.
  • Multi-vendor support for printers Brother/HP/Zebra/Smart/Dymo/Kyrocera.
  • Fully compliant with Windows 8, 10 and 11.
  • User Friendly.
  • Runs securely under restricted User Rights (Non-Administrator).
  • Compatible with Software Deployment Systems - SCCM, Cetero etc.

Benefits

  • Enables use of Laptops with Docking Stations instead of PCs.
  • Standardised GPIT Estate Setup includes default printing.
  • Supports a fully mobile primary care workforce.
  • Enables GPs/PCN staff and others to work across multiple sites.
  • Plug and Play functionality with pre-set tray configuration and default-settings.
  • Reduces engineering required for printer support and related issue management.
  • Printers can be dispatched without the need for engineering support.
  • Reduces ongoing out of warranty Dual Capital Replacement Costs.
  • Independently CHECK Pen-Tested thereby meeting Cyber Security Requirements.
  • Developed in direct response to Primary Care clinicians' needs.

Pricing

£1.50 a device a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Ryan.Edridge@edgebits.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

2 9 3 4 0 6 0 1 9 0 3 1 9 3 6

Contact

EDGEBITS Ryan Edridge
Telephone: 07800609391
Email: Ryan.Edridge@edgebits.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
N/A
System requirements
PC/Laptop Client compatible with Windows 10/11

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are normally within 24hrs Monday to Friday, excluding Bank Holidays.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our Contract/SLA includes the delivery of a 24 hour response time covering Monday-Friday (excluding bank holidays).

Status updates are provided every 4, 8 and 16 hours depending on the severity of the incident i.e. Minor, Major or Critical. This is included as part of the core solution offering.

Technical account management, and access to support engineers, are included within our standard support offering.

24/7 support is available at an additional cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We follow an installation process which includes a document framework that defines every customer's solution integration requirements. This framework outlines how our team will work with our customers to achieve a successful installation. Part of our approach to sucessful installation and usage includes training on the basic operations of the system so that all our customers can take full advantage of our technology. Training can be remote, face to face and can include personalised documentation. We also provide each customer with a trouble shooting guide with useful hints and tips for resolving the most common post installation queries.
Service documentation
Yes
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction
Users would just need to uninstall the application. No user data is collected, stored or transmitted by the EDGEPRINT print mobility application software.
End-of-contract process
Customers have the ability at the end of the contract to accept a contract extension. Should the extension period not be invoked then the Service Termination Notice would be served inline with the terms included in the Contract/SLA.

All software would be required to be removed from Users devices in line with licensing and contract agreement.

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
This service is specifically designed to provide Printing Mobility for clinicians and other users that work across Laptops and Mobile Windows devices.

The software print application downloads Printer Drivers and applies Printer configurations on all supported printers from the Microsoft Azure Data Centre. It provides clinicians with the ability to use their laptops in multiple sites and to seamlessly print across a non-standardised GPIT estate.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
We have a core delivery team However, we have the capability and resources to flex the team numbers to increase the team's capacity to meet increasing demand for the service. We regularly monitor and review our service demand and service offering and put in place the necessary plans and resources to meet additional customer requirements.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
N/A
Data export formats
Other
Other data export formats
Not Applicable
Data import formats
Other
Other data import formats
Not Applicable.

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
The Mobile Print Application uses a Shared Access Security Token back to an Microsoft Azure Environment. The infrastructure is encrypted, and follows best practice Cyber protection and security principles. The Azure environment is regularly penetration tested for any threats or weaknesses, ensuring secure end to end communications.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our data is hosted in the Microsoft Azure -UK Data Centre that hosts the IT infrastructure for our Software as a Service (SaaS) solution and which guarantees 99.95% up time. In addition, Microsoft put high availability into their hosting infrastructure and application architecture that typically delivers above 99.95% availability from a SaaS perspective.

Our solution also provides offline availability.
Approach to resilience
Our Software as a Service (SaaS) solution has been designed to ensure high availability. We use Microsoft Azure resilience services, Load Balancing to ensure we deliver both high availability and Disaster Recovery. Additional information is available upon request should it be required.
Outage reporting
In the unlikely event of a service outage, our internal monitoring systems will alert our support team to respond and escalate as necessary. Our customers will be notified of outages through the use of phone, text and/or email.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
Access restrictions in management interfaces and support channels
Restrictions are provided based on RBAC (Role Based Access Controls). RBAC controls are strictly enforced and provisioned as a function of user role or through rigorous just-in-time access requests.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our Information Security Governance aims to set strategic
measures to protect our organisation’s information.
Information security policies and processes
Our Information Security Governance approach aims to set the strategic measures necessary to protect our organisation’s and our customers' information and to ensure that it is protected from a loss of confidentiality, integrity and availability. Our Information Security Policy details the requirements and responsibilities for maintaining the security of information within EDGEBITS. The purpose of this data security policy is to protect restricted, confidential or sensitive data from loss, to avoid reputation damage and to avoid adversely impacting our customers. The protection of data is a critical business requirement whilst also ensuring flexibility to access data and to work effectively. It is supported by other policy documents including: Data Protection By Design & Default, Privacy Policy, Data Quality Policy, Record Keeping Policy, IG Security Training Policy and by other guidance documents which support putting these policies into practice day-to-day.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration and change management is managed and achieved using our internal governance processes. Our configuration management processes focus on managing the configurable items and the state of the system while our change management processes focus on managing the changes that affect the configurable items and the system. These processes include creating, authorising, monitoring and implementing changes within our secure software development lifecycle. All changes are reviewed and assessed for potential security impacts and approved depending on the outcome of the security impact assessments.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
All of our infrastructure is patched on a monthly cycle in line with best practice.
Our development team use OWASP vulnerability assessment and threat modelling.
We also use a variety of Cyber best practices within our day to day running of the business, which includes receiving and implementing as necessary updates from the National Cyber Security Centre. In addition, we have scheduled vulnerability scanning with our Cyber Partner, Dionach , to ensure we keep our patches and security fully updated at all times.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All breaches and/or suspected breaches and other information security incidents are reported to the Managing Director and DPO immediately. Depending on the size and seriousness of the breach, data is isolated to facilitate forensic examination and an investigation into the circumstances surrounding the incident carried out.
Investigations may include examination of our systems and procedures and could lead to a recommendation to inform data subjects about a security breach incident.
Findings are reported to the Managing Director and DPO. Our risk register and relevant policies are updated if required to reduce the risk of a similar incident re-occurring.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management framework defines the roles and responsibilities and processes for the detection, escalation, response and communication of incidents.
Incident reporting forms are available and must be completed by the relevant staff member. Incidents are recorded in the Security Incident Log and investigated to establish their cause and impact with a view to avoiding similar events.
Our team monitors the system and classifies, escalates and coordinates the response as per the documented procedures.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • NHS Network (N3)
  • Health and Social Care Network (HSCN)

Social Value

Fighting climate change

Fighting climate change

Our company promotes the use of public transport by the team when possible. We also encourage working from home to reduce the impact of transport on the environment. We look to procure sustainable products from our suppliers. We encourage and promote the use of recycled materials wherever possible.
Covid-19 recovery

Covid-19 recovery

EDGEBITS recognises the impact that COVID-19 has had on the individual, their personal circumstances and the wider economy. EDGEBITS will work with its partners, customers and team wherever possible to support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.

Our company aims to recruit locally whenever possible and will identify possible opportunities for employment within the company for those left unemployed as a result of the pandemic. The company supports initiatives that promote mindfulness and positive mental and physical wellbeing, which are particularly important for recovery from COVID-19

During the pandemic EDGEBITS actively encouraged working from home and made every effort to support staff and improve their working conditions during this time. Post pandemic the company continues to encourage the team by promoting a hybrid working model which also supports a better life balance for the team.
Tackling economic inequality

Tackling economic inequality

As an SME EDGEBITS recognises the importance of supporting small local suppliers of services to foster local business development and growth. It is often difficult for SMEs to fully participate in and benefit from national government frameworks. Our approach is to collaborate with other similar organisations whenever possible so that we can share skills and experiences and to develop effective partnerships so that we are better able to meet the needs of our clients and fully participate in government frameworks. We believe that it is vitally important to recruit staff locally where ever possible to support local economic and environmental sustainability.
Equal opportunity

Equal opportunity

EDGEBITS is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally. We believe that having a diverse workforce is essential for the development of a healthy and successful company.

EDGEBITS takes all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.

We also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.

EDGEBITS does not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with EDGEBITS.

EDGEBITS has a zero-tolerance approach to modern slavery, and we are committed to acting ethically and with integrity in all our business dealings and relationships and to implementing and enforcing effective systems and controls to ensure modern slavery is not taking place anywhere in our own business or in any of our supply chains.
Wellbeing

Wellbeing

Our company supports initiatives that promote mindfulness and positive mental and physical wellbeing amongst our team. We encourage staff to work remotely whenever possible in a bid to help them to achieve a better work life balance. We routinely get together to socialise and for team building activities. Fostering a strong team spirit is a vital part of our company's approach to company development.

Pricing

Price
£1.50 a device a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We can offer a free trial of EDGEPRINT so that customers can experience the benefits of our product in a 'live' environment. We are very happy to discuss this option with our customers and further details can be made available on request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Ryan.Edridge@edgebits.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.