Skip to main content

Help us improve the Digital Marketplace - send your feedback

AJAR-Tec Limited

Volo-X™ by VoloForce

Volo-X™ is an automated compliance, safety and task workflow management system that helps you achieve optimisation of your operational processes and is designed for use across organisations.

Volo-X™ ensures your department is delivering to agreed policy and measures compliance.

Its unique bi-directional feature allows instant, real-time communication and issue resolution.

Features

  • Secure cloud solution with user friendly web browser/mobile app interfaces
  • Scheduled/on-demand inspections and surveys via custom online forms and checklists
  • Remote compliance/task/workflow automation tool capturing evidence
  • Simple QR code access
  • Evidence capture - photos, video, documents, uploads, URL links
  • Integrated action management and service requests
  • Real time analytics and reporting at all levels
  • Customer branded reporting interface
  • Scalability from team based to enterprise level deployments
  • Restful APIs allow real time integration with other technology

Benefits

  • Improved compliance, safety and security
  • Improved safety and regulatory fleet compliance
  • Standardised business operations across all locations
  • Instant capture of public feedback on locations, assets, vehicles, operators
  • Reduced inspection and repair costs
  • Increased revenue
  • Increased vehicle/asset life span and reduced downtime
  • Improved brand integrity
  • Rapid resolution of issues of public concern
  • Improved staff optimisation and customer satisfaction

Pricing

£10.00 a licence a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@ajartechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 8 8 8 4 7 8 7 3 8 8 3 8 4 8

Contact

AJAR-Tec Limited Sales Department
Telephone: 0800 6122680
Email: sales@ajartechnology.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No constraints, however we recommend working with the following operating systems.

Android - Operating System version 6 or above, with 2GB RAM

iOS - iPhone 5 + iOS 11.x, or iPad mini 2 + iOS 11.x

Volo-X™™ may run on other iOS or Android devices, however, results may vary.
System requirements
  • Android OS6 or above
  • IOS 11.0 or above
  • For web use, all browsers except Internet Explorer are compatible

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response time for emails between 8am - 5pm Monday to Friday will be answered same day. Response times outside of these hours may vary.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
An Account Manager is dedicated to each contracted customer.
On site support is included in the contract.
An additional technical support line is provided, with support provided by phone, email or Webex.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Full implementation plan provided, together with dedicated implementation manager.
Data is requested via simple onboarding templates.
Training is provided via the implementation manager and/or creating training modules within the application and web portal.
Additional supporting documentation is provided.

The system is very simple to use, with users very familiar with the technology being used.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data can be easily downloaded into Excel or csv files for offline storage post-contract.
End-of-contract process
The contract covers live task management/workforce management during the term of the contract.

This includes automating all operational and asset checklists and collecting all evidence, and aggregating into a smart reporting system.

At the end of the contract, reports at contract end can be provided before the system is closed down, with off line copies being provided.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
User experience is tailored whether the user is completing actions on a mobile device (via an app) or desktop actions.

Tasks are very clear and user experience is very simple on whichever medium is chosen.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Our platform runs on an open API which gives us the flexibility to integrate with any compatible 3rd party systems for data measurement and management, including payroll, staff rostering, asset management, sensors, IIOT, service desk, CRM systems etc.

In addition, data can be exported back into other IT or reporting systems that the customer uses.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Logos can be added or full whitelabelling is available.

A backdrop image is added to the log in page.

All check lists and workflows are those of the customer.

Schedules, publish times and the desired reports are built to meet the needs of each customer.

Customer can pay to have additional features developed for the system.

Scaling

Independence of resources
An independent server is stood up for each customer.
The capacity of that server is calculated based on total potential usage plus additional spare capacity. Server capacity can be amended as and when required

Analytics

Service usage metrics
Yes
Metrics types
Operational execution (as a percentage of tasks)
Operational execution (as a percentage of locations)
Compliance
Issue reporting and tracking (to completion)
User usage data
Evidence of all compliance and task completion
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Project Management

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Within the web portal there are simple and obvious export buttons, that guide through the export process.

In addition, any report can be saved directly, printed or saved to pdf.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF
  • Word
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • Onboarding templates
  • API feeds

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% availability is guaranteed, aside from communicated outages for system upgrades at agreed times.

An SLA documenting outage SLAs and refund levels will be provided as part of any agreement.
Approach to resilience
Information available on request.
Outage reporting
Email alerts are sent immediately on system outage.
Further emails are sent when any updates are available or on a regular basis to update as appropriate.
A final email is sent once the service is re-instated.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
The system has tiered levels of access privilege and on system set up we allocate all users the appropriate access privilege. This can be edited in real time by the customer or by our support teams at any time.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Internal and external audits.
Information security policies and processes
The CEO for UK/Europe has ultimate responsibility for information security in the UK/Europe and ensures that all necessary policies and procedures are in place. This is managed on a day to day basis by the Head of Operations, together with the Quality and Risk Management.

External Data security audits are conducted every six months.
Outcomes from internal and external audits are reviewed with remedying action plans put in place, and reviewed at monthly Quality and Risk meetings.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Impact of change for a software feature is assessed prior to development as part of the analysis phase of the change lifecycle.
Vulnerability management type
Undisclosed
Vulnerability management approach
Service vulnerability is assessed on a 1-5 scale, where incident reports are scored based on threat level. An incident with a score of 5 will require immediate patching. Anything less will be weighted in priority with other requirements.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Volo-X™ utilizes internal and external monitoring services to identify a variety of service interruptions. Each is assessed individually, prioritized and addressed by priority level.
Incident management type
Supplier-defined controls
Incident management approach
Service incidents are assessed on a 1-5 scale, where incident reports are scored based on threat level. An incident with a score of 5 will require immediate attention. Anything less will be weighted in priority with other requirements.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

This cloud based solution limits the need for users to drive/travel to client locations for managers to look at operations, therefore improving their carbon footprint. The use of cloud based solutions reduce the need for paper based checks. Our organisation is committed to environmental sustainability and social value matters, to support this we have a core working party (ESS Group, Environmental, Sustainability & Social Value) who lead and promote initiatives that contribute to our roadmap and values. The group are responsible for suggesting, recommending, initiating and communicating plans for developing or increasing the environmental sustainability roadmap. Plans are categorised into short, medium and long term roll out, and scored with consideration made against cost, implementation timeframes, achievability, business benefit and environmental benefit. We aim for 3-5 measurable and realistic targets within each timeframe. Why is it important? We want to act in a way which ensures natural growth for our business, whilst ensuring future generations have opportunities to live and work in a sustainable environment. Our sustainable goals for this year include; • Increasing recycling to over 95% across the business • Increase our electric vehicle fleet where possible and viable • Increase localised work bases to limit travel to sites • Decommissioned equipment to be re-purposed for use. 87% of all decommissioned equipment to be re-purposed by end of 2025

Pricing

Price
£10.00 a licence a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Proof of concept for agreed time periods on case by case basis.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@ajartechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.