Uma Book
UMA Book is a cloud based room booking system, that allows individuals to book meeting rooms using the companion application. It also monitors & feeds-back occupancy and availability of these rooms and spaces.
Features
- Room Booking
- Resource Booking
- People Counting
- Desk Booking
Benefits
- Detailed Analytical Data
- Resource Planning
- Resource Management
- Desk Management
Pricing
£144 to £192 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 7 5 6 2 8 8 7 6 5 5 6 1 2 9
Contact
ISDM Solutions Ltd
Andy Ford
Telephone: 0333 300 1876
Email: andy.ford@isdmsolutions.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- NA
- System requirements
-
- Network
- O365 or G Suite Required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24 hour response time
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- ISDM provide Gold, Enterprise and Platinum support depending on user requirements. The pricing is bespoke depending on the size of the deployment and the levels that the customer would like to have with ISDM. ISDM can supply a technical account manager if required to manage the deployment and help with additional support post roll out. ISDM will provide a customer success manager to help faciltiate with training and user adoption.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- ISDM/UMA can provide onsite and online training, and can assign a customer success manager to help drive usage and adoption of the system. UMA can also provide user documentation to help users utlise and get the most from the service.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users can request extraction of their data from UMA after the contract ends. Users can submit this request in writing, and ISDM/UMA will formally acknowledge the request, and a timeline of when the actions will be performed.
- End-of-contract process
-
The contract includes use of the UMA Resource booking service. Additional costs are installation of any hardwares, like desk or room sensors. Or additonal professional services.
The contract includes the exclusive use of the software only.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are mild GUI interface differences between the two, however most functionlaity is broadly the same. Users may find it more convienient to use the application if they are on the move, or alternatively wish to use their voice to book rooms.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- ISDM/UMA can assist users with bespoke API services should this be required.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can customise the deskop and mobile applications, so that they are branded to the requirements of the company.
Scaling
- Independence of resources
- UMA uses a traffic management service that ensures that users aren't negatively impacted by periods of high demand. UMA services run through AWS cloud services, which also employ their own cloud management services.
Analytics
- Service usage metrics
- Yes
- Metrics types
- UMA provides metrics around booked rooms, most popular resources booked, no shows, people count information and other information related to the booking and management of resources.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- UMA
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Users can export their data, by requesting it formally in writing from ISDM/UMA and UMA will facilitate this request and return all data to the customer.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
UMA guarantee an uptime of 99.99%. UMA will communicate any expected downtime where it is reasonably possible.
UMA will work with the customer to establish SLAs prior to any contract starting, and will write these into the contract to ensure that they are met. - Approach to resilience
- This information is available on request.
- Outage reporting
- Service outage are reported via email alerts and through the UMA dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Different users have access to different levels of information. This is governed by the user permissions that specific users have.
In addition only users assigned supporting roles are giving access to customers tickets and access to relevant customer information, required to assist with the management and resolution of support tickets.
This is all managed through username and password access. Users are prohibited from sharing user names and passwords.
Roles are assigned throughout the UMA platform which limits what users get access to. - Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Security governance of UMA is managed by an internal board, with results documented and published to customer upon request.
- Information security policies and processes
-
UMA uses staff vetting to ensure that anyone who comes to work at UMA has a clear record. Staff computers are locked using passwords and any access to the UMA service requires passwords, and secure access.
Access to UMA offices are limited by key cards, and only UMA staff can gain access to UMA premises.
The use of key drives or pen drives, is limited and all this hardware is encrypted.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All components of services are recorded and tracked internally, continually throughout the life cycle of the product. This can be tracked back to service version, should this be required.
All potential changes are road tested in a sandbox environment to access their potential to cause damage or inherently negative consequences, this is documented.
All newly released versions of the product are fully tested prior to their release to minimise as much as is possible disruption to the customer. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
UMA is committed to security and uses a number of sources to identify potential threats to the serivce. UMA monitors the global security situation, and is quick to identify any potential threats to the operation of the service. If any threats are identified, these are flagged internally and externally to customers, adn patches are deployed immediatly.
UMA uses a range of different sources to gather information about potential security threats. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
UMA continually monitors the service, and reacts quickly to any potential compromises. UMA uses a range of sources, both from users and from the internal development team to try to identify any potential compromises.
When a potential compromise is found, UMA alerts internal and external users to make them aware of a potential software compromise.
UMA respond to incidents as quickly as is feasibly possible. - Incident management type
- Undisclosed
- Incident management approach
-
UMA has a number of processes in place for common events, such as software upgrages, and the roll out of updates.
Users can report incidents directly to ISDM the service provider or alternatively through the application.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
ISDM have introduced a Sustainability Policy to define a common goal to work towards as a team to promote good sustainability practice, to reduce the environmental impact of all our activities and to help our clients to do the same.
Our Sustainability Policy is based upon the following principles:
• To comply with, and exceed where practicable, all applicable legislation, regulations, and codes of practice.
• To integrate sustainability considerations into all our business decisions.
• To ensure that all staff are fully aware of our Sustainability Policy and are committed to implementing and improving it.
• To make clients and suppliers aware of our Sustainability Policy and encourage them to adopt sound sustainable management practices.
• To review, annually report, and to continually strive to improve our sustainability performance.
• Ensure that we measure everything that we do by creating a company culture that seeks to reduce carbon emissions as a standard part of all within ISDM.
These will be achieved through:
• Research - Engage in and develop ideas to support defined principles that ISDM will harness in the pursuit of direct and indirect goals for sustainability and environmental practices and policies.
• Promotion – Thoughtful measurable outcomes that algin to continuous sustainable improvements within the ISDM journey.
• Challenge - Highlight the status quo within current working practices, seek change-house management behavior to meet enlightened sustainable outcomes.
• Support – Change, through the validation of measured data and metrics.
• Enablement - Creation of a journey through leadership for all
Pricing
- Price
- £144 to £192 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Room Book and Desk Book Licenses only for a maximum period of 6 weeks for G-Cloud 13.
All associated hardware and provisioning services are chargeable. - Link to free trial
- https://askuma.ai/free-trial-uma/