Voyagerr Schools
The Voyagerr home to school transport management system ensures efficiency in planning and management of schools transport for mainstream and SEN students. It covers application to contract assignment, bus passes, and route optimisation. Voyagerr supports client, driver and operator communication; and streamlines transport operator interactions, contracts and financial management.
Features
- Responsive UI works across multiple device types, accessible anywhere
- Portal for parents to apply for travel and receive updates
- Portal for operators to submit invoices and documentation
- Scheduling route optimisation
- Embedded mapping, including Google integration, and live traffic
- Powerful financial cost management, prediction, reporting and forecasting
- Bus pass production and printing
- Invoice reconciliation, approval and payments
- GDPR compliance and data retention policies
- Operator and staff details including operator compliance
Benefits
- Simple allocation and management of transport
- Reduce paperwork with online portals for parents, clients and operators
- Reduce transport cost through schedule optimisation
- Dashboard and Key performance information integrated within the system.
- User-friendly, workflow-based interfaces save time and minimise errors.
- Self-Service dramatically reduces phone enquiries and data entry
- Increase operational effectiveness monitoring and updating routes in real time
- Minimise time for bookings with quick scheduling and trip booking
Pricing
£17,000 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 9 8 8 0 5 5 1 0 5 2 2 8 8 8
Contact
Trapeze Group UK Ltd
Colin Urquhart
Telephone: 07384241680
Email: tenders@trapezegroup.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Modern browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Call and emails are acknowledged immediately. Best practice SLAs apply.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard support service (no extra cost, with account manager and support engineers):
Priority Level 1 Resolution time (days) 2
A reported problem in the Software, or one of its necessary components, has caused the Software to cease function or has caused a complete system shutdown. The incident may result in a downtime and prohibit the Trapeze Customer from carrying on procedures crucial to the operations are immediately addressed.
Priority Level 2 Resolution time (days) 3
A reported problem in the Software or one of its necessary components has caused a serious disruption of a major business function and cannot be temporarily solved by an alternative method or 'work around'.
Priority Level 3 Resolution time (days) 5
A reported problem or query in the Software, or one of its necessary components, which cannot be temporarily solved by an alternative method or 'work around'.
Priority Level 4 Resolution time (days) 5
A reported problem, question, desire, request, etc. which is not included in the definitions of Priority 1-3 and demands less immediate attention than said priorities.
Priority Level 5 Resolution time (days) Next upgrade
A problem of cosmetic nature that may be corrected in the next release of the software. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- User guides and training, online self-serve portal.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Export into standard data exchange formats such as .csv files or data migration is available as a separate service.
- End-of-contract process
- Standard functionality enables data export. Once the contract has ended, access to the browser-based system is revoked.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Layouts optimised for mobile use.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- API for admission systems or local authorities to submit student applications.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Screen panels and available functionality can be defined for individuals or groups of users.
Scaling
- Independence of resources
- Capacity is designated in order to provide service to the required number of users or customers/ students managed.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Availability, response times, application logs include usage
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
Firewalls, Whitelisting client sites, Role base access controls by support staff.
All your backed-up data is automatically encrypted when stored in the cloud using Azure Storage encryption, which helps you meet your security and compliance commitments. This data at rest is encrypted using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All data can be exported in flat file format such as .csv.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Within Azure we have client separation through resource groups that include localised virtual networks.
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
-
Access lists on VLAN,
Firewalls,
Network scanning for vulnerabilities
Availability and resilience
- Guaranteed availability
- Minimum is 99.5 but can go up to 99.9 at customer request under separate agreement.
- Approach to resilience
- Failover lines, Failover firewalls and Resilient switches.
- Outage reporting
- All production servers are monitored 24/7. Availability is monitored and managed via Uptrends which tests accessibility globally.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The system holds its own passwords which are fully encrypted within the database. The password policy is enforceable and includes reset & expiry features. Superusers can reset passwords. Unsuccessful logins result in lockouts. There is full login audit. Admin passwords can be regularly changed. Supports single sign-on.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 08/04/2024
- What the ISO/IEC 27001 doesn’t cover
- Scope covers all activities involving client data, not internal systems.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001:2015
- ISO 27001: 2013
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- It is the policy of Trapeze Group UK Ltd to ensure: >Confidentiality of information is maintained >Integrity of information through protection from unauthorised modification >Availability of information to authorized users when needed >Information is protected against unauthorised access >Information is not disclosed to unauthorized persons through deliberate or careless action >Regulatory and legislative requirements will be met >Business continuity plans are produced, maintained and tested as far as practically possible >Information security training is given to all Employees maintaining the hosting centre environment >All breaches of information security and suspected weaknesses are reported and investigated. Induction and ongoing training via an audited on-line course ensure awareness of GDPR and security. There is an appointed Data Protection Officer. responsibility for adherence to policy lies at board level.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We manage change through our ITSM tool following the ITIL defined process. The Service Desk Manager working with the IT Manager ensures that the underlying infrastructure is managed using industry best practice procedures to prevent adverse impacts on security. In order for changes to progress smoothly, a planning stage includes: • Identification of issues • Scope definition • Gap analysis • Estimating • Timeframes • Resourcing • Success criteria Once the change has been defined, often working with you to fully understand the what and why, the plan is shared and explained to all stakeholders.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We ensure up to date patching is applied to both the OS and the application. We use an industry-standard tool for confirming known vulnerabilities are identified and addressed.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use a combination of Rapid7 IVM and IDR which proactively scan for vulnerabilities and security related events. This reports back to a central management portal. A detailed risk analysis is provided by Rapid7 IDR and if deemed to be major, the major incident policy is invoked. Incident management and incident response teams are convened. An investigation will assess the implications. Once the root cause has been identified, a permanent solution will be put in place and the incident is closed. We also use Crowdstrike for rogue behaviour detection along with a managed service that protects the infrastructure 24/7
- Incident management type
- Supplier-defined controls
- Incident management approach
- We work within ISO27001 / ITIL frameworks. An incident is anything out-of-the-normal occurring that negatively affects us or one of our customers. Users can report incidents via web portal, email or phone. Major incidents are dealt with by two teams: The Response Team ensure that all necessary remedial actions are taken as quickly and effectively as possible; the Management Team allows the Response Team to focus on fixing the incident whilst they take strategic decisions, ensure resourcing for the Response Team and deal with external communications. Incident Management is an iterative process: Preparation > Identification > Response > Lessons Learned.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
Trapeze invest in a carbon offset scheme, tree planting etc...Wellbeing
Voyagerr have a number of wellbeing initiatives which we run for our staff. These include a 'Healthy Minds' steering group with monthly meetings open to all staff, and trained mental heath first aiders.
Pricing
- Price
- £17,000 an instance
- Discount for educational organisations
- No
- Free trial available
- No