E20 Safety Management System
Our cloud solution 'e20' is designed to simplify and streamline the management process. Using both desktop and mobile technology users can assign and monitor actions, manage risk and compliance, analyse data and reports easily with real-time dynamic
dashboards; all at the touch of a button
Features
- Designed by safety professionals for safety professionals
- Mobile offline solution
- Dynamic Reporting
- Action Tracking
- Easy Customisation
- Self Serve System
- Monitor and Manage Compliance
- Analyse Date
- AIBased Risk Assessment
Benefits
- Single Source Management
- Easy Admin Control & Management
- Low and Transparent Costing Model
- Unlimited User Base
Pricing
£55,000 an instance a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 1 0 8 3 6 8 9 7 7 3 8 2 2 5
Contact
Eighty20 Risk Systems
Craig Lydiate
Telephone: 07814010830
Email: craig@eighty20risk.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Modern Web Browsers for Desktop
- Current Models of iOS or Android
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Eighty20 Risk Systems will respond by telephone/email to the Customer’s queries, submitted via the system support, within:
• Four hours for issues classified as Urgent.
• Eight hours for issues classified as normal priority.
• Twelve to twenty-four hours for issues classified as low priority. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
-
Natural information such as text, images, and sounds
code or markup that defines structure, presentation, etc. - Onsite support
- Yes, at extra cost
- Support levels
-
Scope of Service – Level 1 Support Service
Based on the payment of the agreed annual charge and is included in such charge
In scope (Non-Chargeable Items)
• 1st Level User Support
• Fault Finding
• Critical Issue Resolution
• Technical Coordination with 3rd Parties
• Ongoing Live Penetration Testing
• Data backups
• Data Management and backups
• 5 Forms built at setup, 2 Forms built in addition per year
• 5 Dashboards built per year
In scope (Chargeable Items – Level 3 Support as Detailed Below)
• Additional Training (online & on-site)
• Additional support time (charged in half day increments)
• 3rd Party Software Integration Out of scope
• Hardware Support
• Client In-House Software Support or Problems - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We have onsite training, online support, full online documentation as needed by the client on a case by case basis.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- By extraction to json or csv. Client has full access to download and extract at end of contract.
- End-of-contract process
- Full extraction of all required data, an agreed close down date and full access restriction on this date.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Desktop is full admin control, management and access to records. Mobile is response only, ie complete a form, assessment or task.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Web based tile based management process
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Still ongoing
- API
- Yes
- What users can and can't do using the API
- Users can request API and conduct the required connections
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Most features of E20 (our platform) can be customised. The system is a highly configurable platform designed to deliver both off the shelf and huge configuration options in one platform
Scaling
- Independence of resources
- Auto scaling is the process of automatically adding or removing resources based on changing demand, allowing your infrastructure to grow or shrink as needed. In Google Cloud Platform (GCP), auto scaling is typically accomplished using managed instance groups (MIGs).
Analytics
- Service usage metrics
- Yes
- Metrics types
- Google cloud platform using big query and looker studio. This is full user configurable and customisable at all times.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Our system is designed to remove the need to extract data (it is an end to end dynamic process) but at all stages the user (if given such permissions by the client organisation) can export to csv.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Json
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Eighty20 Risk Systems guarantees 99.9% uptime each month 24 hours a day 7 days a week (Agreed Hours of Service). Uptime is measured based on the monthly average of availability (rounded down to the nearest minute) and is calculated as follows:
Agreed Hours of Service – Hours of Downtime
Uptime % = _____________________________________ x 100%
Agreed Hours of Service - Approach to resilience
- E20 is built on Google Cloud, which provides comprehensive solutions for every phase of the security and resilience lifecycle
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Password and access control configuration by user / client
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Head of IT (director) has overall control of all aspects of security. We have been certified to Cyber Essentials standards.
- Information security policies and processes
- Technical director ensures compliance to standards and policy management.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Full control by the Technical Director. Changes to code, full stack determined by this role.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Constant / live penetration testing using Intruder platform / service.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- To be added
- Incident management type
- Supplier-defined controls
- Incident management approach
- To be added
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
A comprehensive approach to mental health wellbeing and lifestyle centred emplyment.
Pricing
- Price
- £55,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Full system access for a limited time period