Skip to main content

Help us improve the Digital Marketplace - send your feedback

Eighty20 Risk Systems

E20 Safety Management System

Our cloud solution 'e20' is designed to simplify and streamline the management process. Using both desktop and mobile technology users can assign and monitor actions, manage risk and compliance, analyse data and reports easily with real-time dynamic
dashboards; all at the touch of a button

Features

  • Designed by safety professionals for safety professionals
  • Mobile offline solution
  • Dynamic Reporting
  • Action Tracking
  • Easy Customisation
  • Self Serve System
  • Monitor and Manage Compliance
  • Analyse Date
  • AIBased Risk Assessment

Benefits

  • Single Source Management
  • Easy Admin Control & Management
  • Low and Transparent Costing Model
  • Unlimited User Base

Pricing

£55,000 an instance a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at craig@eighty20risk.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 1 0 8 3 6 8 9 7 7 3 8 2 2 5

Contact

Eighty20 Risk Systems Craig Lydiate
Telephone: 07814010830
Email: craig@eighty20risk.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Modern Web Browsers for Desktop
  • Current Models of iOS or Android

User support

Email or online ticketing support
Email or online ticketing
Support response times
Eighty20 Risk Systems will respond by telephone/email to the Customer’s queries, submitted via the system support, within:
• Four hours for issues classified as Urgent.
• Eight hours for issues classified as normal priority.
• Twelve to twenty-four hours for issues classified as low priority.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
Natural information such as text, images, and sounds
code or markup that defines structure, presentation, etc.
Onsite support
Yes, at extra cost
Support levels
Scope of Service – Level 1 Support Service
Based on the payment of the agreed annual charge and is included in such charge
In scope (Non-Chargeable Items)
• 1st Level User Support
• Fault Finding
• Critical Issue Resolution
• Technical Coordination with 3rd Parties
• Ongoing Live Penetration Testing
• Data backups
• Data Management and backups
• 5 Forms built at setup, 2 Forms built in addition per year
• 5 Dashboards built per year
In scope (Chargeable Items – Level 3 Support as Detailed Below)
• Additional Training (online & on-site)
• Additional support time (charged in half day increments)
• 3rd Party Software Integration Out of scope
• Hardware Support
• Client In-House Software Support or Problems
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We have onsite training, online support, full online documentation as needed by the client on a case by case basis.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
By extraction to json or csv. Client has full access to download and extract at end of contract.
End-of-contract process
Full extraction of all required data, an agreed close down date and full access restriction on this date.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Desktop is full admin control, management and access to records. Mobile is response only, ie complete a form, assessment or task.
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Web based tile based management process
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Still ongoing
API
Yes
What users can and can't do using the API
Users can request API and conduct the required connections
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Most features of E20 (our platform) can be customised. The system is a highly configurable platform designed to deliver both off the shelf and huge configuration options in one platform

Scaling

Independence of resources
Auto scaling is the process of automatically adding or removing resources based on changing demand, allowing your infrastructure to grow or shrink as needed. In Google Cloud Platform (GCP), auto scaling is typically accomplished using managed instance groups (MIGs).

Analytics

Service usage metrics
Yes
Metrics types
Google cloud platform using big query and looker studio. This is full user configurable and customisable at all times.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Our system is designed to remove the need to extract data (it is an end to end dynamic process) but at all stages the user (if given such permissions by the client organisation) can export to csv.
Data export formats
  • CSV
  • Other
Other data export formats
Json
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Eighty20 Risk Systems guarantees 99.9% uptime each month 24 hours a day 7 days a week (Agreed Hours of Service). Uptime is measured based on the monthly average of availability (rounded down to the nearest minute) and is calculated as follows:
Agreed Hours of Service – Hours of Downtime
Uptime % = _____________________________________ x 100%
Agreed Hours of Service
Approach to resilience
E20 is built on Google Cloud, which provides comprehensive solutions for every phase of the security and resilience lifecycle
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Password and access control configuration by user / client
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Head of IT (director) has overall control of all aspects of security. We have been certified to Cyber Essentials standards.
Information security policies and processes
Technical director ensures compliance to standards and policy management.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Full control by the Technical Director. Changes to code, full stack determined by this role.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Constant / live penetration testing using Intruder platform / service.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
To be added
Incident management type
Supplier-defined controls
Incident management approach
To be added

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

A comprehensive approach to mental health wellbeing and lifestyle centred emplyment.

Pricing

Price
£55,000 an instance a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Full system access for a limited time period

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at craig@eighty20risk.com. Tell them what format you need. It will help if you say what assistive technology you use.