Cloud Mobility Print Infrastructure Services - EDGEPRINT
A hybrid cloud print solution designed to support NHS Healthcare Providers to digitise their workforce, by enabling users to become fully mobile. This Software as a Service solution delivers standardisation and allows for future-proofing of the very complex and disparate IT print infrastructure across primary care and other IT estates.
Features
- Cloud Service hosted in the UK.
- Supports EMIS,TPP/SystmOne and Vision Clinical Systems.
- Third party label printers and software compatibility including LabelTrace/Smart Label.
- Automatic configuration of Printer Settings, Default Printer Trays/Duplex/Drivers.
- Fully Managed Auto Updates for future-proofing.
- Multi-vendor support for printers Brother/HP/Zebra/Smart/Dymo/Kyrocera.
- Fully compliant with Windows 8, 10 and 11.
- User Friendly.
- Runs securely under restricted User Rights (Non-Administrator).
- Compatible with Software Deployment Systems - SCCM, Cetero etc.
Benefits
- Enables use of Laptops with Docking Stations instead of PCs.
- Standardised GPIT Estate Setup includes default printing.
- Supports a fully mobile primary care workforce.
- Enables GPs/PCN staff and others to work across multiple sites.
- Plug and Play functionality with pre-set tray configuration and default-settings.
- Reduces engineering required for printer support and related issue management.
- Printers can be dispatched without the need for engineering support.
- Reduces ongoing out of warranty Dual Capital Replacement Costs.
- Independently CHECK Pen-Tested thereby meeting Cyber Security Requirements.
- Developed in direct response to Primary Care clinicians' needs.
Pricing
£1.00 a device a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 5 9 5 2 8 9 4 9 9 3 6 7 3
Contact
EDGEBITS
Ryan Edridge
Telephone: 07800609391
Email: Ryan.Edridge@edgebits.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- PC/Laptop Client compatible with Windows 10/11
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are normally within 24hrs Monday to Friday, excluding Bank Holidays.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our Contract/SLA includes the delivery of a 24 hour response time covering Monday-Friday (excluding bank holidays).
Status updates are provided every 4, 8 and 16 hours depending on the severity of the incident i.e. Minor, Major or Critical. This is included as part of the core solution offering.
Technical account management, and access to support engineers, are included within our standard support offering.
24/7 support is available at an additional cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We follow an installation process which includes a document framework that defines every customer's solution integration requirements. This framework outlines how our team will work with our customers to achieve a successful installation. Part of our approach to sucessful installation and usage includes training on the basic operations of the system so that all our customers can take full advantage of our technology. Training can be remote, face to face and can include personalised documentation. We also provide each customer with a trouble shooting guide with useful hints and tips for resolving the most common post installation queries.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- Users would just need to uninstall the application. No user data is collected, stored or transmitted by the EDGEPRINT print mobility application software.
- End-of-contract process
-
Customers have the ability at the end of the contract to accept a contract extension. Should the extension period not be invoked then the Service Termination Notice would be served inline with the terms included in the Contract/SLA.
All software would be required to be removed from Users devices in line with licensing and contract agreement.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
This service is specifically designed to provide Printing Mobility for clinicians and other users that work across Laptops and Mobile Windows devices.
The software print application downloads Printer Drivers and applies Printer configurations on all supported printers from the Microsoft Azure Data Centre. It provides clinicians with the ability to use their laptops in multiple sites and to seamlessly print across a non-standardised GPIT estate. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- We have a core delivery team However, we have the capability and resources to flex the team numbers to increase the team's capacity to meet increasing demand for the service. We regularly monitor and review our service demand and service offering and put in place the necessary plans and resources to meet additional customer requirements.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- N/A
- Data export formats
- Other
- Other data export formats
- Not Applicable
- Data import formats
- Other
- Other data import formats
- Not Applicable.
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- The Mobile Print Application uses a Shared Access Security Token back to an Microsoft Azure Environment. The infrastructure is encrypted, and follows best practice Cyber protection and security principles. The Azure environment is regularly penetration tested for any threats or weaknesses, ensuring secure end to end communications.
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Our data is hosted in the Microsoft Azure -UK Data Centre that hosts the IT infrastructure for our Software as a Service (SaaS) solution and which guarantees 99.95% up time. In addition, Microsoft put high availability into their hosting infrastructure and application architecture that typically delivers above 99.95% availability from a SaaS perspective.
Our solution also provides offline availability. - Approach to resilience
- Our Software as a Service (SaaS) solution has been designed to ensure high availability. We use Microsoft Azure resilience services, Load Balancing to ensure we deliver both high availability and Disaster Recovery. Additional information is available upon request should it be required.
- Outage reporting
- In the unlikely event of a service outage, our internal monitoring systems will alert our support team to respond and escalate as necessary. Our customers will be notified of outages through the use of phone, text and/or email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Access restrictions in management interfaces and support channels
- Restrictions are provided based on RBAC (Role Based Access Controls). RBAC controls are strictly enforced and provisioned as a function of user role or through rigorous just-in-time access requests.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our Information Security Governance aims to set strategic
measures to protect our organisation’s information. - Information security policies and processes
- Our Information Security Governance approach aims to set the strategic measures necessary to protect our organisation’s and our customers' information and to ensure that it is protected from a loss of confidentiality, integrity and availability. Our Information Security Policy details the requirements and responsibilities for maintaining the security of information within EDGEBITS. The purpose of this data security policy is to protect restricted, confidential or sensitive data from loss, to avoid reputation damage and to avoid adversely impacting our customers. The protection of data is a critical business requirement whilst also ensuring flexibility to access data and to work effectively. It is supported by other policy documents including: Data Protection By Design & Default, Privacy Policy, Data Quality Policy, Record Keeping Policy, IG Security Training Policy and by other guidance documents which support putting these policies into practice day-to-day.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configuration and change management is managed and achieved using our internal governance processes. Our configuration management processes focus on managing the configurable items and the state of the system while our change management processes focus on managing the changes that affect the configurable items and the system. These processes include creating, authorising, monitoring and implementing changes within our secure software development lifecycle. All changes are reviewed and assessed for potential security impacts and approved depending on the outcome of the security impact assessments.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
All of our infrastructure is patched on a monthly cycle in line with best practice.
Our development team use OWASP vulnerability assessment and threat modelling.
We also use a variety of Cyber best practices within our day to day running of the business, which includes receiving and implementing as necessary updates from the National Cyber Security Centre. In addition, we have scheduled vulnerability scanning with our Cyber Partner, Dionach , to ensure we keep our patches and security fully updated at all times. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
All breaches and/or suspected breaches and other information security incidents are reported to the Managing Director and DPO immediately. Depending on the size and seriousness of the breach, data is isolated to facilitate forensic examination and an investigation into the circumstances surrounding the incident carried out.
Investigations may include examination of our systems and procedures and could lead to a recommendation to inform data subjects about a security breach incident.
Findings are reported to the Managing Director and DPO. Our risk register and relevant policies are updated if required to reduce the risk of a similar incident re-occurring. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Our incident management framework defines the roles and responsibilities and processes for the detection, escalation, response and communication of incidents.
Incident reporting forms are available and must be completed by the relevant staff member. Incidents are recorded in the Security Incident Log and investigated to establish their cause and impact with a view to avoiding similar events.
Our team monitors the system and classifies, escalates and coordinates the response as per the documented procedures.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our company promotes the use of public transport by the team when possible. We also encourage working from home to reduce the impact of transport on the environment. We look to procure sustainable products from our suppliers. We encourage and promote the use of recycled materials wherever possible.Covid-19 recovery
EDGEBITS recognises the impact that COVID-19 has had on the individual, their personal circumstances and the wider economy. EDGEBITS will work with its partners, customers and team wherever possible to support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
Our company aims to recruit locally whenever possible and will identify possible opportunities for employment with in the company for those left unemployed as a result of the pandemic. The company supports initiatives that promote mindfulness and positive mental and physical wellbeing, which are particularly important for recovery from COVID-19
During the pandemic EDGEBITS actively encouraged working from home and made every effort to support staff and improve their working conditions during this time. Post pandemic the company continues to encourage the team by promoting a hybrid work model which also supports a better life balance for the team.Tackling economic inequality
As an SME EDGEBITS recognises the importance of supporting small local suppliers of services to foster local business development and growth. It is often difficult for SMEs to fully participate in and benefit from national government frameworks. Our approach is to collaborate with other similar organisations whenever possible so that we can share skills and experiences and to develop effective partnerships so that we are better able to meet the needs of our clients and fully participate in government frameworks. We believe that it is vitally important to recruit staff locally where ever possible to support local economic and environmental sustainability.Equal opportunity
EDGEBITS is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally. We believe that having a diverse workforce is essential for the development of a healthy and successful company.
EDGEBITS takes all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.
We also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.
EDGEBITS does not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with EDGEBITS.
EDGEBITS has a zero-tolerance approach to modern slavery, and we are committed to acting ethically and with integrity in all our business dealings and relationships and to implementing and enforcing effective systems and controls to ensure modern slavery is not taking place anywhere in our own business or in any of our supply chains.Wellbeing
Our company supports initiatives that promote mindfulness and positive mental and physical wellbeing amongst our team. We encourage staff to work remotely whenever possible in a bid to help them to achieve a better work life balance. We routinely get together to socialise and for team building activities. Fostering a strong team spirit is a vital part of our company's approach to company development.
Pricing
- Price
- £1.00 a device a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We can offer a free trial of EDGEPRINT so that customers can experience the benefits of our product in a 'live' environment. We are very happy to discuss this option with our customers and further details can be made available on request.