Portzo
Portzo is a porter management solution using Wifi to allocate tasks to the nearest porter. It is a multi-award winning fully automated porter tracking solution to improve efficiency and reduce delays in patient transfers. Real-time location data helps drive efficiency, reduce wastage of resources and minimise delays in patient care.
Features
- Electronic requesting of portering tasks
- Automated allocation of tasks to the nearest porter
- Location tracking of porters using WiFi RTLS
- AI Business Intelligence dashboard
- Natural language processing interface
- Advanced analytics
Benefits
- Improves operational efficiency
- Savings in nursing time due to a fully electronic system
- Improved experience for porters
- Financial savings as a dispatcher is no longer required
- 26.1% more tasks completed
- 31.3% reduction in task completion time
- Reduced response time
Pricing
£1,299.99 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 1 8 8 0 3 8 5 2 9 9 0 8 0 9
Contact
INTEGRATED HEALTHCARE LTD
Dr Rakesh Patel
Telephone: 07920884693
Email: rakesh.patel@ihealthcareltd.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No, we offer a fully managed solution.
- System requirements
-
- Client PC with minimum 4GB RAM
- 10GB Free Hard Drive Space
- Windows 7 or above
- IE 11, EDGE, Chrome, Mozilla
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
A) Normal working hours within Six (6) hours
b) Non-working hours (21.00- 09.00 hours) including weekends and public holidays within twelve (12) hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
First Line support is via the helpdesk using via email or telephone
Second line support - Remote support from a cloud application support engineer
Third line support - Onsite attendance by a technical account manager - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a hybrid approach to training
1. Train the Trainers
2. Specific online training sessions with additional drop-in online sessions
3. On-site floor walkers for Go-Live
4. Online teaching module and videos
5. User documentation - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data is accessible via the application to be downloaded via an excel file.
- End-of-contract process
- The design, implementation and maintenance of the porter management solution including the maintenance of all software and hardware us included in the contract. At the end of the contract the licences will come to an end and the solution will no longer be able to be used.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile version has limited access to the reporting / analytical tools compared to the desktop version.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- PORTZO can be customised to provide specific monthly reports with site specific KPIs entered into the system to assess performance against them. Task allocation can be setup to a general pool as well as to specific porter groups eg Radiology porters, ED porters etc. The system can be customised with logic for daily tasks to trigger at specific times and specific tasks allocated to particular porters based on skill mix.
Scaling
- Independence of resources
- We have monitoring of our cloud service setup to automatically escalate performance issues with further load balancing capabilities.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrics are provided on all aspects including number of task requests, user logins, turn around times, response times, task completion times, server uptime.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported by users directly from the cloud hosted we application.
- Data export formats
-
- CSV
- Other
- Other data export formats
- XLS
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
(1) We agree a server availability commitment of 99.95%. Planned downtime for maintenance, patching, upgrading etc are excluded.
(2) A service credit on the cloud hosting charges will be applied eqivalent of 3% of monthly spend per 5% below service level target.
(3) Force majeure events are excluded
(4) Network connectivity problems such as internet and VPN connectivity are not included.
(5) To request a service credit, the purchaser must email support@icegen.net within thirty days of the relevant suspected SLA event. ICEGEN will review the request and issue a service credit if applicable. - Approach to resilience
- Available on request
- Outage reporting
- Outages are initially reported via email alerts which are followed up by a phone call from the account relationship manager or our service desk if out of hours.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We use two factor-authentication for access to our management interfaces and support channels. Further restriction of critical management interfaces by IP address is also undertaken. Access to management interfaces is only granted after a review of the requirement is undertaken by the head of cyber security and the managing director. Management interfaces also have different levels of user accounts with administrative accounts only being used if the task cannot be carried out using a standard user account. Access to the management interfaces is granted on a case by case basis and documented.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Other
- Description of management access authentication
- Restricted IP addresses
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Cloud infrastructure third party provider has ISO 27001
- Cloud infrastructure third party provider has ISO 27017
- Cloud infrastructure third party provider has ISO27018
- Cloud infrastructure third party provider has CSA Cloud Security Alliance
- Cloud infrastructure third party provider has cyber essentials plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Cloud infrastructure we use (UK Cloud) is certified to:
ISO9001
ISO20000
ISO27001
ISO27017
ISO27018
CSA Cloud Security Alliance
Cyber essential plus - Information security policies and processes
-
Information Security Policies define the responsibiltiy of organisation employees and the business. Policies includes access control, vulnerability management, patching, data encryption, network configuration, Remote working, asset management, change control and physical security.
We have a hierarchical reporting structure with a functional organisational structure.
We ensure polices are followed by
- Sharing details of identified risks with staff
- Guidance to staff on identifying threats
- Policies and procedures stored in a single location for easy access
- Adequate train and a strict policy in place for non-adherence.
-Formal acknowledgement from staff that the policy has been read and understood.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration and change management processes are followed to maintain the integrity of our infrastructure and software.
All configuration of the service are tracked throught their lifetime within our asset register.
Changes to the service are documented, tested in non-production envoirnment, assessed for potential sevice/security impact, and are subject to a formal change process before being applied to production envoirnments. No unauthorised changes are allowed and production envoirnment is regularly audited.
Customer of the software will be provided appropricate notice before changes are applied to production enviornments to minimise service impact. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerability manangement processes include:
* Monitoring OS infrastructure, software and code using vulnerability management tools and regular code reviews to identify vulnerabilities.
* Prioritisation of patching to remediate vulnerabilities based on severity (Monthly) and sooner if critical.
* Ensuring resources are deployed to mitigate.
Threats are monitored from various sources including CISA, US-CERT and NCSC for advisories.
Cloud hosting provider conforms to industry standards to ensure secure IaaS is provided. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- SaaS and OS infrastruture is regularly monitored to detect suspicious activity or compromise through audit events.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident response process has been defined and is used in a reponse to security incidents including common cyber attacks, reporting incident to customers, and how the security incident affects their data.
Users report incidents via the telephone Helpdesk or online support tool. Incident reports are provided by email to clients.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Health and Social Care Network (HSCN)
Social Value
- Fighting climate change
-
Fighting climate change
We provide a monthly carbon offset certificate confirming that an independent greenhouse gas assessment has been conducted, and that carbon emissions which have resulted from consumption of cloud services have been reduce to net zero through verified, high-quality carbon credits.
Pricing
- Price
- £1,299.99 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A free trial option is available if the number of licenses required is a minimum of 20 for the trial. The trial option includes the licensing but not the setup costs for a period of 3 months. The cost of user devices are also not included in the free trial.