Volo-X™ by VoloForce
Volo-X™ is an automated compliance, safety and task workflow management system that helps you achieve optimisation of your operational processes and is designed for use across organisations.
Volo-X™ ensures your department is delivering to agreed policy and measures compliance.
Its unique bi-directional feature allows instant, real-time communication and issue resolution.
Features
- Secure cloud solution with user friendly web browser/mobile app interfaces
- Scheduled/on-demand inspections and surveys via custom online forms and checklists
- Remote compliance/task/workflow automation tool capturing evidence
- Simple QR code access
- Evidence capture - photos, video, documents, uploads, URL links
- Integrated action management and service requests
- Real time analytics and reporting at all levels
- Customer branded reporting interface
- Scalability from team based to enterprise level deployments
- Restful APIs allow real time integration with other technology
Benefits
- Improved compliance, safety and security
- Improved safety and regulatory fleet compliance
- Standardised business operations across all locations
- Instant capture of public feedback on locations, assets, vehicles, operators
- Reduced inspection and repair costs
- Increased revenue
- Increased vehicle/asset life span and reduced downtime
- Improved brand integrity
- Rapid resolution of issues of public concern
- Improved staff optimisation and customer satisfaction
Pricing
£10.00 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 8 8 8 4 7 8 7 3 8 8 3 8 4 8
Contact
AJAR-Tec Limited
Sales Department
Telephone: 0800 6122680
Email: sales@ajartechnology.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
No constraints, however we recommend working with the following operating systems.
Android - Operating System version 6 or above, with 2GB RAM
iOS - iPhone 5 + iOS 11.x, or iPad mini 2 + iOS 11.x
Volo-X™™ may run on other iOS or Android devices, however, results may vary. - System requirements
-
- Android OS6 or above
- IOS 11.0 or above
- For web use, all browsers except Internet Explorer are compatible
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response time for emails between 8am - 5pm Monday to Friday will be answered same day. Response times outside of these hours may vary.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
An Account Manager is dedicated to each contracted customer.
On site support is included in the contract.
An additional technical support line is provided, with support provided by phone, email or Webex. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Full implementation plan provided, together with dedicated implementation manager.
Data is requested via simple onboarding templates.
Training is provided via the implementation manager and/or creating training modules within the application and web portal.
Additional supporting documentation is provided.
The system is very simple to use, with users very familiar with the technology being used. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data can be easily downloaded into Excel or csv files for offline storage post-contract.
- End-of-contract process
-
The contract covers live task management/workforce management during the term of the contract.
This includes automating all operational and asset checklists and collecting all evidence, and aggregating into a smart reporting system.
At the end of the contract, reports at contract end can be provided before the system is closed down, with off line copies being provided.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
User experience is tailored whether the user is completing actions on a mobile device (via an app) or desktop actions.
Tasks are very clear and user experience is very simple on whichever medium is chosen. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Our platform runs on an open API which gives us the flexibility to integrate with any compatible 3rd party systems for data measurement and management, including payroll, staff rostering, asset management, sensors, IIOT, service desk, CRM systems etc.
In addition, data can be exported back into other IT or reporting systems that the customer uses. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Logos can be added or full whitelabelling is available.
A backdrop image is added to the log in page.
All check lists and workflows are those of the customer.
Schedules, publish times and the desired reports are built to meet the needs of each customer.
Customer can pay to have additional features developed for the system.
Scaling
- Independence of resources
-
An independent server is stood up for each customer.
The capacity of that server is calculated based on total potential usage plus additional spare capacity. Server capacity can be amended as and when required
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Operational execution (as a percentage of tasks)
Operational execution (as a percentage of locations)
Compliance
Issue reporting and tracking (to completion)
User usage data
Evidence of all compliance and task completion - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Project Management
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Within the web portal there are simple and obvious export buttons, that guide through the export process.
In addition, any report can be saved directly, printed or saved to pdf. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- Word
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel
- Onboarding templates
- API feeds
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99.9% availability is guaranteed, aside from communicated outages for system upgrades at agreed times.
An SLA documenting outage SLAs and refund levels will be provided as part of any agreement. - Approach to resilience
- Information available on request.
- Outage reporting
-
Email alerts are sent immediately on system outage.
Further emails are sent when any updates are available or on a regular basis to update as appropriate.
A final email is sent once the service is re-instated.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The system has tiered levels of access privilege and on system set up we allocate all users the appropriate access privilege. This can be edited in real time by the customer or by our support teams at any time.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Internal and external audits.
- Information security policies and processes
-
The CEO for UK/Europe has ultimate responsibility for information security in the UK/Europe and ensures that all necessary policies and procedures are in place. This is managed on a day to day basis by the Head of Operations, together with the Quality and Risk Management.
External Data security audits are conducted every six months.
Outcomes from internal and external audits are reviewed with remedying action plans put in place, and reviewed at monthly Quality and Risk meetings.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Impact of change for a software feature is assessed prior to development as part of the analysis phase of the change lifecycle.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Service vulnerability is assessed on a 1-5 scale, where incident reports are scored based on threat level. An incident with a score of 5 will require immediate patching. Anything less will be weighted in priority with other requirements.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Volo-X™ utilizes internal and external monitoring services to identify a variety of service interruptions. Each is assessed individually, prioritized and addressed by priority level.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Service incidents are assessed on a 1-5 scale, where incident reports are scored based on threat level. An incident with a score of 5 will require immediate attention. Anything less will be weighted in priority with other requirements.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
This cloud based solution limits the need for users to drive/travel to client locations for managers to look at operations, therefore improving their carbon footprint. The use of cloud based solutions reduce the need for paper based checks. Our organisation is committed to environmental sustainability and social value matters, to support this we have a core working party (ESS Group, Environmental, Sustainability & Social Value) who lead and promote initiatives that contribute to our roadmap and values. The group are responsible for suggesting, recommending, initiating and communicating plans for developing or increasing the environmental sustainability roadmap. Plans are categorised into short, medium and long term roll out, and scored with consideration made against cost, implementation timeframes, achievability, business benefit and environmental benefit. We aim for 3-5 measurable and realistic targets within each timeframe. Why is it important? We want to act in a way which ensures natural growth for our business, whilst ensuring future generations have opportunities to live and work in a sustainable environment. Our sustainable goals for this year include; • Increasing recycling to over 95% across the business • Increase our electric vehicle fleet where possible and viable • Increase localised work bases to limit travel to sites • Decommissioned equipment to be re-purposed for use. 87% of all decommissioned equipment to be re-purposed by end of 2025
Pricing
- Price
- £10.00 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Proof of concept for agreed time periods on case by case basis.