VOLTi4
Security Watchdog provide bespoke pre-employment screening packages to suit the requirements of your organisation. Background Checking, such as Right to Work, Digital ID (Identity), DBS (Disclosure and Barring Service), Referencing, Financial Probity, Social Media, Security, Financial, Criminal, Sanctions, Directorship, BPSS, SM&CR, BS7858, CQC, FCA, FORS, and International Checks.
Features
- Leading and largest supplier of Background Checking services in EMEA
- Automated workflow, updates and alerts
- Reporting and management information
- User-friendly platform which is optimised to work on any device
- Web-based platform which negates the need to download software
- Applications tracked from submission through to completion
- User-friendly and accessible with a mobile first design
- Optical Character Recognition (OCR) and dynamic question sets
- Full integration with eBulk+, Equifax and Digital ID
- Email, SMS, and WhatsApp communication
Benefits
- Impress your incoming employees, enhancing your reputation as an employer
- Automation to smooth the process for everyone
- Fast screening turnaround times
- Make better-informed hiring decisions to protect your organisation from risk.
- Fully compliant GDPR audit trail
- Minimises the time, complexity, cost, and risk of background screening
Pricing
£8.00 a transaction
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 1 0 6 2 9 5 2 1 7 1 5 6 8
Contact
Matrix SCM
Chris Grimes
Telephone: 07843072803
Email: chris.grimes@matrix-scm.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Access to the internet
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond to all queries within 24 hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Service desk, email and phone.
Service delivery team provided at no cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training is provided for the client admin users. Candidates will not require training as the candidate portal is highly intuitive, however, there are FAQ and support options available via the portal.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All client owned data can be extracted via the client portal in a default format. Bespoke data extract options may be available upon request.
- End-of-contract process
- Typically contracts run on a rolling annual commitment unless the client wishes to terminate at the end of the agreed contract time frame.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- VOLTi4 is fully mobile and tablet compatible and does not require an app to be downloaded. The platform will fully resizes to the device to maximise user experience.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The main interface is through a web browser that is fully responsive to a work on mobile browser.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The service is delivered through a web browser and as such will allow the accessibility features of the browser to be utilized - Text zoom, speech, keyboard shortcuts. The interface is fully responsive to the screen size that is being used.
- Accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
-
VOLTi4 has an open API. Our solution is capable of fully integrating with other systems, including Applicant Training Systems. Our open API allows clients to build their own integrations. It allows them to pull and push their data to and from our solution in the ways that suit them best.
The integration has a few capabilities, which can either be used individually or in conjunction with each other:
• Your database could be fully integrated into ours. This would mean the candidate doesn’t need to be involved in the DBS checks.
• For part-integration we can trigger the invitation to the candidates to start the application from your system.
• Status updates can be sent back to the ATS platform on the candidate’s screening. - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The following can be customised :
Reflect your brand, which reinforces the professionalism of your business from the get go; and
Reflect the role of the employee, which means time is not wasted on obtaining any unnecessary information.
Scaling
- Independence of resources
-
Server capacity monitoring and alerting.
Auto Scaling - Automatically scales when load reaches a threshold.
Analytics
- Service usage metrics
- Yes
- Metrics types
- MI data is available for the client via the Client Portal. This will cover a number of data fields, including Checks Status, Time Scales, Costings, and other relevant information regarding the screening process. Clients will also have the benefit of using Google Analytics to help visualise the reporting data.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Client users of the system are able to export data through our client portal.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JPG
- PNG
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Imperva Web Application Firewall
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
VPN gateway
VLANs
Availability and resilience
- Guaranteed availability
- We have a 99% 24 x 7 uptime target.
- Approach to resilience
-
The solution design constrains the single points of failure. Within the application, load balancing across multiple instances of service and automated restart of failed services preserves availability. To support these measures the service is monitored such that failures or anomalous behaviour can be identified and corrective action taken, in many cases before defects emerge.
The technical measures outlined are supported by a range of operational controls including comprehensive testing, configuration control, release management, and asset management. In the event of a failure that is not automatically recovered, an effective major incident management process ensures the service is quickly recovered and lessons learned preventing repeat scenarios. In the event of a BC/DR failure, cloud-enabled replication across the region enables rapid restoration of the service. - Outage reporting
- Matrix Security Watchdog has a full business and continuity plan that documents exactly how outages are reported, how to report them and how frequently. Client Relationship Managers would manage all communications with client users directly by either email or phone.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Users are given a pre-defined role which controls what they can access within the system.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 29/03/2022
- What the ISO/IEC 27001 doesn’t cover
- Nothing.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- Matrix is accredited for IS0 27001 which demonstrates we have a well-structured and embedded Information Security Management System. Account Managers report to the Business Management and Operations Director. Matrix SCM also hold the Cyber-Essentials certification.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All components of our VOLTi4 system are tracked through their lifetime via a risk register, issue log and/or change request process, which is managed by our IT support team/Product Management team. Any changes made to the system are put through rigorous user testing in a testing environment, which is signed off via a change board implemented on the live production site.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our ISO27001 ISMS includes a specific documented process for vulnerability management. This includes weekly automated vulnerability testing, risk assessment and risk scoring in line with industry best practices, collation and review of results by InfoSec manager, and accountability for resolution within a documented timeframe by the nominated product manager.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Regularly monitored and patched antivirus protection on endpoint devices. Imperva Web Application Firewall protects all web-based services. SIEM protection for critical event logs, with altering based on risk profile.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We follow an ITIL-style approach to incident management. Software-related incidents are logged into the helpdesk system by end users where they are triaged and assigned a priority rating. Lower-rated incidents follow a default process, with a separate process reserved for Major Incident Management (MIM). Incident reports are communicated back to the end users either through phone, email or the system itself. The technical support team are in direct contact with the product development team where resolution requires it.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Our internal social value team will engage with public sector buyers and lead social value initiatives tailored to their goals. We will work with public sector buyers to understand their key priorities. From this, we will create an action plan that sets out our Social Value deliverables against fighting complement changes.Equal opportunity
Our internal social value team will engage with public sector buyers and lead social value initiatives tailored to their goals. We will work with public sector buyers to understand their key priorities. From this, we will create an action plan that sets out our Social Value deliverables against driving equal opportunities.
Pricing
- Price
- £8.00 a transaction
- Discount for educational organisations
- Yes
- Free trial available
- No