Skip to main content

Help us improve the Digital Marketplace - send your feedback

Tekwurx Limited

EasyVista EV Reach

EV Reach is a SaaS or on-premises software used for remote support and IT process automation.

Features

  • Process automations for asset management, software deployments, network detection
  • Access and control the information and settings on remote machines
  • Remote control to solve technical issues remotely
  • Software deployment tools install, repair, remove software on remote systems
  • Extend functionality by adding links to external programs
  • Automatic Inventory Collection

Benefits

  • 1

Pricing

£1,045 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at keith@tekwurx.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 8 2 0 9 3 1 8 0 1 4 2 0 6 1

Contact

Tekwurx Limited Keith Pound
Telephone: +44 208 148 3717
Email: keith@tekwurx.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
EasyVista EV Service Manager
Cloud deployment model
Public cloud
Service constraints
No specific constraints. The service is available according to the SLAs.
System requirements
  • No specific requirements
  • https://wiki.easyvista.com/xwiki/bin/view/Documentation/EV-Reach/

User support

Email or online ticketing support
Email or online ticketing
Support response times
S1: 24x7, 1 clock hour
S2: 7:00-19:00, Mon-Fri (excluding public holidays), 4 business hours
S3: 7:00-19:00, Mon-Fri (excluding public holidays), 8 business hours
S4: 7:00-19:00, Mon-Fri (excluding public holidays), 12 business hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
S1: 24x7, 1 clock hour
S2: 7:00-19:00, Mon-Fri (excluding public holidays), 4 business hours
S3: 7:00-19:00, Mon-Fri (excluding public holidays), 8 business hours
S4: 7:00-19:00, Mon-Fri (excluding public holidays), 12 business hours

We will provide a named Customer Success Manager
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All new customers receive administrator and user training as part of the Tekwurx EasyStart implementation service. This is usually delivered remotely, but can be on-site if preferred.
All configuration changes are documented
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
When a contract with EasyVista ends, the following data extraction and destruction procedures are followed:

- Data Extraction: All customer data is returned to the customer to ensure they retain full ownership and control of their information.

- Destruction of Virtual Assets: Dedicated virtual machines used for the customer’s services are destroyed within 15 days after contract termination to prevent reuse.

- Data and Backup Deletion: All customer data and backups older than 10 days are securely deleted, except for necessary copies retained for disaster recovery and compliance purposes.

These steps are part of EasyVista's commitment to secure data management and compliance with data protection regulations at the end of service contracts.

The backups in our possession are then destroyed once the client has confirmed safe receipt and reading of this data.
End-of-contract process
At the end of a contract with EasyVista, the following steps are taken:

Data Return: All customer data is returned to ensure full ownership remains with the customer.
Asset Destruction: Dedicated virtual machines and other assets are destroyed within 15 days to prevent reuse.
Data Deletion: Data and backups older than 10 days are securely deleted, except for copies kept for disaster recovery or compliance.
Secure Disposal: All used storage media are physically destroyed to ensure data cannot be recovered.

These actions ensure data security and compliance after a contract ends.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
https://wiki.easyvista.com/xwiki/bin/view/Documentation/EV-Reach/
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Unknown
API
No
Customisation available
Yes
Description of customisation
Yes, buyers can customize the EV Reach service in several ways to fit their needs:

Remote Control Settings: Adjust how remote access is granted and manage administrative privileges.
Network Ports: Change default network ports to align with specific network security requirements.
Database Options: Switch from a file-based database to a more scalable MS-SQL server.
Client Agent Settings: Set up rules for automatic installation and updates of client agents.
Branding: Modify user interface elements to reflect corporate branding.
Security Settings: Configure gateway services for secure management of external endpoints.

Scaling

Independence of resources
The EV Reach architecture is scalable. It can be reviewed and modified based on changes in your requirements. You can therefore start your project with a well-defined scope (modules used, number of users etc.) and extend it in line with your needs. This extension will be managed by our teams, working closely with you to ensure the process is as transparent as possible.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
EasyVista

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Access Export Features: Use the software's built-in tools to export data in formats like CSV, XML, or JSON.
Database Backup: If using a customized database setup, perform a full backup of the database.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • JSON
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
Firewall, WAF, IPS/IDS, Antivirus

Availability and resilience

Guaranteed availability
This service is available 7 days a week and 24 hour a day outside of the maintenance periods specified below.

We guarantee 99.9% availability (calculated over a quarter, excluding scheduled maintenance periods).

Scheduled maintenance periods must not exceed 2 hours per month
Approach to resilience
Available on request
Outage reporting
Incident Detection: Continuous monitoring alerts the operations team to disruptions.
Customer Notification: Affected customers are promptly notified via email or support tickets.
Regular Updates: Updates are provided until the issue is resolved.
Post-Mortem Analysis: A detailed report is shared with customers after resolving the outage, explaining the cause and the resolution process.

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
EV Reach authenticates users primarily through native Windows Local Account or Active Directory credentials Additionally, users need local administrative privileges to initiate remote control sessions or manage remote machines. For cases where additional privileges are required, EV Reach allows the use of alternate credentials, such as LDAP or RDP, and supports SmartCard redirection and Microsoft LAPS for enhanced security. All user actions are also audited to ensure accountability​​.
Access restrictions in management interfaces and support channels
Access to the data of Service Manager is secure and is based on the following concepts:

profiles: restriction of access to areas of the interface;
domains: restriction of access to data;
management of employee access: identification of employees with access to the application, by assigning them a login/password and a profile;
password management: securing resources and services to which access is limited and protected; the encryption of passwords is performed with the EasyCrypt utility.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
Multi-Factor Authentication (MFA)
Role-Based Access Control (RBAC): Access is tailored to individual roles, limiting it to necessary permissions only.
Strong Password Policies: Enforces complex password requirements to enhance security.
Encrypted Communication: Uses secure channels like HTTPS or VPNs for all management activities.
Regular Audits: Access logs are frequently audited to detect and respond to any suspicious activity.

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
Unknown
CSA STAR certification level
Level 5: CSA STAR Continuous Monitoring
What the CSA STAR doesn’t cover
Unknown
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • SOC2 Type 2
  • SOC3 Type 2
  • ISAE 3402

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow the NIST security governance standards.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We use procedures to perform configuration and change management according to level of criticity and impact of the change or incident.
All the changes of the components are tracked on our Configuration Management Database (CMDB). The components are permanently scanned to find vulnerabilities
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Regular Vulnerability Scans: Weekly scans with tools like Qualys to detect vulnerabilities.
Penetration Testing: Regular tests based on OWASP guidelines to identify potential security weaknesses.
Patch Management: Swift application of security patches to fix vulnerabilities.
Third-Party Audits: External audits to verify the effectiveness of security measures.
Continuous Monitoring: Ongoing monitoring to detect and respond to new security threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The platform is automatically monitored by various tools for this purpose. Alerts are also automatically sent to the EasyVista SOC team.

Aspects covered by monitoring are:

The data integration process.
The users connected to the service.
The workload coming from application services.
The slowest requests executed on the platform.
The use of disk space allocated under the contract.

Availability of the service, IP addresses and the database is automatically checked every 30 seconds
Incident management type
Supplier-defined controls
Incident management approach
The Prepare phase involves implementing controls to prevent incidents from occurring in the first place.

The next phase of Detect and Identify kicks off the Observe, Orient, Decide, and Act (OODA) loop.

From the OODA loop, the Contain and Eradicate phases are next.

The Recovery phase is the process of implementing mitigations against the incident that has taken place and making sure that the threat is fully eradicated.

The final phase is Lessons Learned. Be sure all employees and involved individuals know where the organization made improvements and why those improvements will help protect the network in the future.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Tekwurx cloud solutions and services assist in COVID-19 recovery efforts by:
1. Facilitating remote work setups, allowing businesses and organisations to continue operations while adhering to social distancing measures.
2. Tekwurx Cloud services offer scalability and flexibility, enabling organisations to quickly scale up or down their IT resources based on fluctuating demands

Covid-19 recovery

Tekwurx cloud solutions and services assist in COVID-19 recovery efforts by:
1. Facilitating remote work setups, allowing businesses and organisations to continue operations while adhering to social distancing measures.
2. Tekwurx Cloud services offer scalability and flexibility, enabling organisations to quickly scale up or down their IT resources based on fluctuating demands

Tackling economic inequality

Tekwurx Cloud Solutions and Services can tackle economic inequality by fostering inclusive practices within the company, investing in communities, and advocating for policies that promote economic justice and opportunity for all.

Equal opportunity

TekWurx Cloud Solutions and Services promotes equal opportunities in several ways:
1. We implemented diverse hiring practices that ensure our workforce represents various backgrounds, including gender, race, ethnicity, and socio-economic status. This promotes equal opportunities within the company itself.
2. We offer training and development programs that help all our team develop the skills they need to advance within the company
3. We ensure that promotions and opportunities for advancement within the company are based on merit rather than factors such as gender or ethnicity. This creates a level playing field for all employees.

Wellbeing

By focusing on efficiency, flexibility, security, collaboration, customer satisfaction, and employee development, TekWurx's cloud solutions and services can significantly promote well-being within its team and customer base.

Pricing

Price
£1,045 a user a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at keith@tekwurx.com. Tell them what format you need. It will help if you say what assistive technology you use.