ISDM Solutions Ltd

Uma Book

UMA Book is a cloud based room booking system, that allows individuals to book meeting rooms using the companion application. It also monitors & feeds-back occupancy and availability of these rooms and spaces.

Features

  • Room Booking
  • Resource Booking
  • People Counting
  • Desk Booking

Benefits

  • Detailed Analytical Data
  • Resource Planning
  • Resource Management
  • Desk Management

Pricing

£144 to £192 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andy.ford@isdmsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

3 7 5 6 2 8 8 7 6 5 5 6 1 2 9

Contact

ISDM Solutions Ltd Andy Ford
Telephone: 0333 300 1876
Email: andy.ford@isdmsolutions.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
NA
System requirements
  • Network
  • O365 or G Suite Required

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 hour response time
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
ISDM provide Gold, Enterprise and Platinum support depending on user requirements. The pricing is bespoke depending on the size of the deployment and the levels that the customer would like to have with ISDM. ISDM can supply a technical account manager if required to manage the deployment and help with additional support post roll out. ISDM will provide a customer success manager to help faciltiate with training and user adoption.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
ISDM/UMA can provide onsite and online training, and can assign a customer success manager to help drive usage and adoption of the system. UMA can also provide user documentation to help users utlise and get the most from the service.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users can request extraction of their data from UMA after the contract ends. Users can submit this request in writing, and ISDM/UMA will formally acknowledge the request, and a timeline of when the actions will be performed.
End-of-contract process
The contract includes use of the UMA Resource booking service. Additional costs are installation of any hardwares, like desk or room sensors. Or additonal professional services.
The contract includes the exclusive use of the software only.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There are mild GUI interface differences between the two, however most functionlaity is broadly the same. Users may find it more convienient to use the application if they are on the move, or alternatively wish to use their voice to book rooms.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
ISDM/UMA can assist users with bespoke API services should this be required.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can customise the deskop and mobile applications, so that they are branded to the requirements of the company.

Scaling

Independence of resources
UMA uses a traffic management service that ensures that users aren't negatively impacted by periods of high demand. UMA services run through AWS cloud services, which also employ their own cloud management services.

Analytics

Service usage metrics
Yes
Metrics types
UMA provides metrics around booked rooms, most popular resources booked, no shows, people count information and other information related to the booking and management of resources.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
UMA

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users can export their data, by requesting it formally in writing from ISDM/UMA and UMA will facilitate this request and return all data to the customer.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
UMA guarantee an uptime of 99.99%. UMA will communicate any expected downtime where it is reasonably possible.
UMA will work with the customer to establish SLAs prior to any contract starting, and will write these into the contract to ensure that they are met.
Approach to resilience
This information is available on request.
Outage reporting
Service outage are reported via email alerts and through the UMA dashboard.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Different users have access to different levels of information. This is governed by the user permissions that specific users have.
In addition only users assigned supporting roles are giving access to customers tickets and access to relevant customer information, required to assist with the management and resolution of support tickets.
This is all managed through username and password access. Users are prohibited from sharing user names and passwords.
Roles are assigned throughout the UMA platform which limits what users get access to.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Security governance of UMA is managed by an internal board, with results documented and published to customer upon request.
Information security policies and processes
UMA uses staff vetting to ensure that anyone who comes to work at UMA has a clear record. Staff computers are locked using passwords and any access to the UMA service requires passwords, and secure access.
Access to UMA offices are limited by key cards, and only UMA staff can gain access to UMA premises.
The use of key drives or pen drives, is limited and all this hardware is encrypted.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All components of services are recorded and tracked internally, continually throughout the life cycle of the product. This can be tracked back to service version, should this be required.
All potential changes are road tested in a sandbox environment to access their potential to cause damage or inherently negative consequences, this is documented.
All newly released versions of the product are fully tested prior to their release to minimise as much as is possible disruption to the customer.
Vulnerability management type
Undisclosed
Vulnerability management approach
UMA is committed to security and uses a number of sources to identify potential threats to the serivce. UMA monitors the global security situation, and is quick to identify any potential threats to the operation of the service. If any threats are identified, these are flagged internally and externally to customers, adn patches are deployed immediatly.
UMA uses a range of different sources to gather information about potential security threats.
Protective monitoring type
Undisclosed
Protective monitoring approach
UMA continually monitors the service, and reacts quickly to any potential compromises. UMA uses a range of sources, both from users and from the internal development team to try to identify any potential compromises.
When a potential compromise is found, UMA alerts internal and external users to make them aware of a potential software compromise.
UMA respond to incidents as quickly as is feasibly possible.
Incident management type
Undisclosed
Incident management approach
UMA has a number of processes in place for common events, such as software upgrages, and the roll out of updates.
Users can report incidents directly to ISDM the service provider or alternatively through the application.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

ISDM have introduced a Sustainability Policy to define a common goal to work towards as a team to promote good sustainability practice, to reduce the environmental impact of all our activities and to help our clients to do the same.

Our Sustainability Policy is based upon the following principles:

• To comply with, and exceed where practicable, all applicable legislation, regulations, and codes of practice.
• To integrate sustainability considerations into all our business decisions.
• To ensure that all staff are fully aware of our Sustainability Policy and are committed to implementing and improving it.
• To make clients and suppliers aware of our Sustainability Policy and encourage them to adopt sound sustainable management practices.
• To review, annually report, and to continually strive to improve our sustainability performance.
• Ensure that we measure everything that we do by creating a company culture that seeks to reduce carbon emissions as a standard part of all within ISDM.

These will be achieved through:

• Research - Engage in and develop ideas to support defined principles that ISDM will harness in the pursuit of direct and indirect goals for sustainability and environmental practices and policies.
• Promotion – Thoughtful measurable outcomes that algin to continuous sustainable improvements within the ISDM journey.
• Challenge - Highlight the status quo within current working practices, seek change-house management behavior to meet enlightened sustainable outcomes.
• Support – Change, through the validation of measured data and metrics.
• Enablement - Creation of a journey through leadership for all

Pricing

Price
£144 to £192 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Room Book and Desk Book Licenses only for a maximum period of 6 weeks for G-Cloud 13.

All associated hardware and provisioning services are chargeable.
Link to free trial
https://askuma.ai/free-trial-uma/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andy.ford@isdmsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.