Omnia AIOne Asset Management
Our Fleet operations and execution management software is designed to streamline local authority service delivery, encompassing waste collection, road sweeper operations, housing, and highways management. Integrating advanced telematics, vehicle CCTV, route optimisation, asset management, and paperless workflow systems, our software enhances job management and operational efficiency.
Features
- AI-Powered Route Optimisation
- Hardware-Agnostic Telematics
- Vehicle CCTV Surveillance
- Mobile App for Paperless Workflow
- User-Friendly Interface
- Modular Software Platform
- Comprehensive Asset Management with RFID, Barcode, and QR Code Integration
- Customised Management Reporting
- Real-Time Route Monitoring (Plan vs. Actual)
- Dynamic Job and Vehicle Allocation
Benefits
- Enhances operational efficiency with AI driven route optimisation in realtime.
- Offers compatibility across diverse hardware for seamless telematics integration.
- Improves safety and accountability through comprehensive vehicle CCTV surveillance.
- Streamlines operations with paperless workflow via user-friendly mobile app.
- Ensures accessibility and ease of use with user-friendly interface
- Provides flexible system customisation through modular software platform.
- Optimises asset tracking and management multiformat identification technology.
- Facilitates informed decision-making with customised, data-driven management reports.
- Enables proactive route management with real-time monitoring and adjustments
- Simplifies staff and vehicle coordination with dynamic job allocation features.
Pricing
£5,000 to £9,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 2 5 6 1 7 3 8 5 4 7 0 5 5
Contact
OMNIA SMART TECHNOLOGIES LIMITED
Mike Stewart
Telephone: 07895660253
Email: mike.stewart@weareomnia.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Our platform is a complete, standalone fleet management and logistics solution, eliminating the need for external integrations. It offers comprehensive operational capabilities, while also providing optional connectivity with ERP, CRM for enhanced functionality, giving users flexibility and extended utility directly through our self-sufficient platform.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Service constraints
-
To ensure you have a comprehensive understanding of our service's operational framework, it's important to consider the following constraints that may affect usage and implementation:
Maintenance Windows: Off-peak scheduled maintenance with advance notification.
Support Hours: UK business hours, with emergency protocols for critical issues.
Compatibility: Requires latest web browsers and specific Android/iOS versions.
Data Location: Data stored in specified jurisdictions, affecting international users.
Integration: Advanced third-party integrations may need customisation.
Training: Initial training recommended; subject to scheduling.
Hardware: Certain features require minimum hardware specs.
Connectivity: Stable internet needed for real-time features.
Access Control: User roles define feature and data access. - System requirements
-
- System must be available on the internet
- System must be available 24 hours a day
- System must be accessible by mobile devices
- Operating system needs Android 7, iOS15, Windows10 or later.
- Supported browsers are Chrome, EDGE, Firefox and Safari
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our commitment to providing exceptional support includes adhering to strict Service Level Agreements (SLAs) that ensure timely responses to all inquiries. During business hours, our response time is within 2 hours for critical issues and within 24 hours for standard queries. On weekends, response times may extend up to 48 hours for non-critical issues, reflecting our dedication to align with operational requirements while also recognising the need for comprehensive coverage outside of standard working hours. This structured approach guarantees that all questions are addressed promptly, ensuring minimal disruption to your operations.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Our company is committed to providing comprehensive support at every organisational level. We offer a robust service level agreement (SLA) that ensures timely and effective issue resolution, underpinned by penalty clauses for added accountability.
Support Levels Provided:
Standard Support: All customers benefit from our dedicated support team, accessible via email, phone, and a ticketing system for any service-related queries.
Technical Support: A technical team is on standby to address platform-specific and cloud support concerns, ensuring expert assistance is always available.
Cost of Different Support Levels:
Our pricing structure is designed with simplicity in mind. The cost of support is integrated into the standard service pricing. We believe in equitable access to high-quality support and do not differentiate between support levels – every customer receives the same exceptional service without any additional fees.
Provision of Account Management and Technical Support Personnel:
Each customer is paired with a dedicated account manager to provide personalised service management. Additionally, we have qualified cloud support engineers as part of our technical team, ready to address any platform/infrastructure issues that may arise.
By adopting this holistic approach, we ensure that our customer have access to the necessary resources, expertise, and support they need to thrive. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Our onboarding process is meticulously designed to facilitate a smooth transition to using our service. It begins with an initial consultation phase where we engage with the client to fully understand their operational and user requirements. This phase is crucial for tailoring the training to the specific needs of the users.
Following this, we provide comprehensive onsite training sessions conducted by experienced trainers. These sessions are hands-on, ensuring that users gain practical experience with the system, understand its full capabilities, and can utilize it confidently in their day-to-day operations. Our training is supplemented by extensive user documentation, which serves as a valuable reference tool.
We also recognize the importance of flexible learning options. We offer library of online video tutorials that cover a range of topics, from basic functions to advanced features. These are accessible at any time, allowing users to learn at their own pace.
In addition, we provide scheduled remote training sessions. These are interactive and can be arranged to accommodate new feature rollouts, refresher courses, or to address specific queries. This combination of personalized onsite training, self-guided online resources, and interactive remote sessions ensures that every user, regardless of their learning preference or schedule, is fully supported. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Video
- Online
- Word
- End-of-contract data extraction
-
In our commitment to data accessibility and interoperability, we've developed a multifaceted data export approach that empowers users to easily retrieve their data in various formats and structures.
The core of our data export functionality resides within our robust reporting module. Users can seamlessly export reports directly from the platform in several formats, including Excel, PDF, and CSV. This ensures compatibility with a wide range of applications and facilitates easy data analysis and sharing.
For routine data needs, we offer automated daily extracts from the database. Clients can specify the structure and format they prefer, and this data will be automatically generated and delivered to them via email each day. This service is ideal for users who require regular updates and wish to integrate this data with other systems or for archival purposes.
Moreover, we provide our clients with the capability to perform on-demand data exports via our API. This powerful feature allows for real-time data access and the ability to integrate with external systems, supporting a more dynamic and responsive use of the data. Our API is designed with security and ease of use in mind, providing detailed documentation to assist with implementation. - End-of-contract process
- Upon the conclusion of a service contract, users are entitled to a comprehensive data extraction process. To initiate this, customers can request a manual data dump, which our team will execute using SQL to compile all pertinent data into a secure, accessible format. Following the successful data transfer, we will conduct a verification process with the customer to ensure all required data has been accurately and completely received. Once verification is complete and the customer confirms they have secured their data, we adhere to stringent data protection protocols to securely and permanently delete the customer's data from our servers. This process is designed to protect the customer's data sovereignty and confidentiality while also meeting our data handling compliance obligations. Customers are advised to initiate the data extraction process well before the contract end to ensure a smooth transition.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our service provides tailored experiences for both mobile and desktop users to best suit their operational environments. The mobile interface is optimised for drivers on the move, with streamlined access to navigation, job updates, and communication tools. It's designed for ease of use on smaller screens and touch interfaces. Conversely, the desktop version offers a comprehensive suite of features for office staff, including detailed reporting, route planning, and asset management. Both platforms are synchronized for real-time data sharing, ensuring seamless operation and communication between drivers and office personnel, but each is uniquely adapted to the user’s role within the organisation.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Our service interface offers a user-friendly, intuitive web portal designed for desktop users, alongside a streamlined mobile app for on-the-go access. The web interface provides comprehensive tools for route planning, asset management, data analytics, and job scheduling, all accessible through a secure login. Enhanced by visual data representations, it allows users to monitor operations in real-time with dashboards customised to their role. The mobile app, optimised for field personnel, enables direct communication with dispatchers, access to route information, and workflow management. Both interfaces are unified in design and function, ensuring a seamless user experience across devices.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Our development roadmap includes accessibility standards.
- Accessibility testing
- We have tested with users that suffer from dyslexia.
- API
- Yes
- What users can and can't do using the API
- Our RESTful API allows users to create and manage customer profiles and jobs with secure, token-based access. The API facilitates the integration of fleet management tasks into existing workflows, enabling real-time operational adjustments. While users can perform a wide range of functions, actions like bulk data alterations or deletion of historical records are restricted to preserve data integrity and system security. These limitations ensure the API's robust operation while safeguarding against unauthorized changes, providing a balanced approach to functionality and protection.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customisation is at the heart of our service, where users can inject corporate identity through branded colors and logos on reports. Customisable permissions grant precise access control. Unique images represent different vehicle types, and naming conventions for vehicles and drivers are freely modifiable. These adjustments are made via an intuitive interface, empowering users to tailor the experience to their needs. Administrative personnel manage daily customisations, while our development team stands ready to incorporate specialized features upon request. This dual-level customisation ensures our service is both user-friendly and adaptable to specific client requirements, reflecting a commitment to personalized service delivery.
Scaling
- Independence of resources
- To ensure uninterrupted service and performance for all users, our cloud infrastructure is hosted on AWS, which features robust autoscaling functionality. This advanced infrastructure automatically adjusts computing resources in response to real-time demand, guaranteeing that each user’s experience remains unaffected by the load from others. Our system continuously monitors traffic and scales resources both horizontally (adding more instances) and vertically (upgrading existing resources), maintaining optimal performance and reliability. This dynamic scaling capability, combined with our cloud architecture's high redundancy and fault tolerance, ensures consistent service levels and resource independence for every user.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We contract to various metrics to ensure our service delivery standards Unit Uptime - ensuring ITO devices are always active, Support call responses ensuring our responses are inline with Contracts turnaround times, technical service calls to ensure our technicians are onsite to repair our technology. we are also contract to software uptime and resolution turnaround times.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- To ensure the security of data at rest, our systems use Advanced Encryption Standard (AES) protocols, one of the most secure encryption methods available. All sensitive information stored within our systems is encrypted using AES encryption, which complies with the highest levels of security standards. This method not only encrypts data but also safeguards the keys with robust key management practices. Additionally, we enforce strict access controls and conduct regular audits to detect any unauthorized access attempts, ensuring that only authorized personnel can access the encrypted data, further fortifying the privacy and integrity of our clients' information.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Reporting module exporting through excel pdf, csv
- Data export formats
-
- CSV
- ODF
- Other
- Data import formats
-
- CSV
- ODF
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- Within our network, we strictly adhere to AWS best practices and ISO standards to safeguard data. Our compliance with GDPR and UK data protection laws ensures the utmost security and privacy. We employ encryption at rest and in transit, and access controls based on the least privilege principle. Continuous monitoring and automatic threat detection mechanisms are in place to promptly identify and mitigate potential risks. Regular staff training on data protection complements these technical measures, creating a comprehensive defense system that protects our clients' sensitive information at all times.
Availability and resilience
- Guaranteed availability
- We guarantee an availability of 99.9% for server uptime and 98% for system uptime. Our Service Level Agreements (SLAs) solidify our commitment to reliability. If we fall short of these targets, SLA-defined penalties are applied, which may include reductions in service costs or refunds based on the specific pricing model. Additionally, we collaborate with clients to develop and endorse a detailed continuity plan, ensuring minimized operational impact in the event of an outage. This plan is formalized and agreed upon, demonstrating our proactive approach to maintaining continuous operations and our dedication to service excellence
- Approach to resilience
-
Our service is crafted with resilience at its core, adhering to the UK government's 2nd cloud security principle: 'Asset protection and resilience'. We employ AWS's disaster recovery strategies, ensuring that our data center's architecture can swiftly recover from disruptions. Our RDS is configured for point-in-time recovery, enabling us to restore service to any second in time, which minimizes downtime and data loss.
We embrace the AWS Shared Responsibility Model, securing our operations within AWS's robust infrastructure. Advanced encryption protects data at rest against loss or tampering. Continuous monitoring with AWS CloudTrail and Amazon GuardDuty allows for the immediate detection and response to threats, while AWS Identity and Access Management (IAM) ensures strict access controls.
Our resilience protocol is detailed and transparent, ready for review upon request, providing confidence in the continuous protection and availability of your data within our resilient cloud architecture. - Outage reporting
-
Our outage reporting system is a blend of transparency and immediate client communication. The system includes:
Public Dashboard:
A user-friendly dashboard displays the live status of our services, capturing real-time and historical data. It informs users about system performance, planned maintenance, and current outages, offering a transparent overview of our service reliability.
API Integration:
Clients can leverage our API to integrate real-time service updates into their monitoring solutions, enabling automated alerts tailored to their operational needs. This facilitates a proactive response to any service disruptions and ensures continuous alignment with internal processes.
Email Alerts:
Our service automatically triggers targeted email alerts for service disruptions based on critical thresholds. These notifications provide essential details about the nature and extent of the outage, expected resolution times, and follow-up actions.
We maintain rigorous monitoring to preemptively identify potential issues, with an incident response team ready to mitigate and resolve any disruptions promptly. Communication protocols are in place to deliver initial notifications, provide progress updates, and conclude with detailed reports post-resolution.
This system ensures not only that our users are promptly informed but also that they have the insights necessary to manage any service impacts effectively.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
To authenticate access to our service, we employ JSON Web Tokens (JWTs) with expiry dates, ensuring secure and temporary access. Upon a successful login attempt, a JWT is generated and signed with a secure key unique to our system. This token encodes the user's identity and privileges, granting access based on predefined roles and permissions.
The JWT approach is favored for its statelessness, allowing scalability and ease of use across distributed systems. Tokens are designed to expire within a strict timeframe, minimizing the risk of unauthorized use if a token is compromised. - Access restrictions in management interfaces and support channels
- Access to our management interfaces and support channels is strictly governed by a permission-based model, which aligns with established principles of least privilege. Users are granted access rights and permissions according to their specific roles and responsibilities within the organization. This model extends to feature access, ensuring users can only interact with the elements of the system that are pertinent to their role. Administrative access to management interfaces is limited to authorized personnel, with actions tracked and auditable.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
-
To authenticate management access to our service, we employ JSON Web Tokens (JWTs) with expiry dates, ensuring secure and temporary access. Upon a successful login attempt, a JWT is generated and signed with a secure key unique to our system. This token encodes the user's identity and privileges, granting access based on predefined roles and permissions.
The JWT approach is favored for its statelessness, allowing scalability and ease of use across distributed systems. Tokens are designed to expire within a strict timeframe, minimizing the risk of unauthorized use if a token is compromised.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- ICO
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
- Our governance standards are aligned with recognised industry frameworks to ensure robust information security and data protection practices. While we operate in a manner that is consistent with the principles and controls of ISO 27001, focusing on the protection of information assets, we also adhere to the guidelines of (GDPR).
- Information security policies and processes
-
Our information security strategy adheres to industry (AWS) best practices and frameworks, including the implementation of a least privilege access model to mitigate unauthorized data exposure and risk. We follow comprehensive policies that encompass data protection, incident management, and regular security audits.
Data Encryption and Protection: Utilising state-of-the-art encryption both at rest and in transit.
Regular Security Audits: Conducted to ensure ongoing compliance with our rigorous standards.
Incident Response: A well-defined incident response plan for swift action in case of a breach.
Ensuring Compliance:
Continuous Training: All staff receive regular security awareness training to recognise and prevent breaches.
Access Controls: Strict access controls and periodic access reviews are conducted to ensure the integrity of the least privilege model.
Automated Monitoring: Deploying automated systems to monitor our network and applications for unusual activities signaling potential security threats.
Reporting Structure:
Our reporting hierarchy includes a Chief Information Security Officer (CISO) who oversees our security posture, with regular reporting to management and key stakeholders and board members
Compliance Reports: Regular compliance reports are generated, assessing adherence to policies, and identifying areas for improvement.
We conduct regular reviews of our security policies and adapt our processes in line with evolving threats and industry advancements.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our process is rigorous and user-centric. Service components are systematically tracked from inception through to deployment, with every change logged for lifetime traceability. Security impact is a paramount consideration; we assess each modification for vulnerabilities before implementation. Configurations are tailored to optimize client operations, and we conduct thorough testing with both management and operational teams. Post-deployment, we support change management with 7 - 10 day on-site guidance, followed by remote weekly check-ins and structured onsite reviews at 7 weeks and 7 months. All platform updates undergo meticulous QA in a UAT environment, culminating in scheduled releases during off-peak hours.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our vulnerability management process is proactive and thorough. We conduct regular audits of node packages, rigorously monitor for Common Vulnerabilities and Exposures (CVEs), and maintain real-time surveillance through advanced security tools. Upon identifying potential threats, our dedicated security team assesses the risk level and deploys patches, often within hours, ensuring minimal impact on service continuity. Patch management is prioritized based on threat severity to address the most critical issues first. Information about potential threats is sourced from reputable security advisories, industry consortia, and security-focused community forums, allowing us to stay ahead of emerging risks and protect our services proactively.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We actively monitor for potential compromises through AWS's alerting mechanisms. On notification of an anomaly, our team responds immediately to assess the situation. If a data breach is confirmed, we notify regulatory bodies as required and initiate direct communication with the affected customer to mitigate the issue. Each incident triggers the creation of a detailed report, outlining the nature of the compromise, the response action taken, and the steps for future prevention. Our incident response protocol is swift, with a structured process to ensure quick action—typically within minutes of an alert—to any security incidents.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management process is structured around predefined categories: P1 for critical, P2 for major, and P3 for minor events, each with associated SLAs to ensure timely resolution. Incidents are reported by users through a user-friendly ticketing platform, providing a streamlined way to track and manage issues. Upon receiving an incident report, our response team is alerted and follows a strict protocol to address and resolve the issue within the SLA timeframe. Detailed incident reports are generated and communicated to the client, outlining the incident's nature, the response actions taken, and measures implemented to prevent future occurrences.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
In the realm of fleet optimisation for local authorities, our G-Cloud service embodies a steadfast commitment to delivering substantial social value, intricately aligned with the themes outlined in PPN 06/20. Our software is not merely a tool for enhancing operational efficiency but a strategic asset in addressing broader societal challenges.
Fighting Climate Change: Central to our mission is the reduction of environmental impact through advanced fleet optimisation. Leveraging AI for route optimisation and employing sophisticated telematics, our solution significantly cuts down carbon emissions. By minimising idle times, optimising routes, and ensuring vehicle efficiency, we empower local authorities to contribute actively to environmental sustainability, aligning with global climate action goals.Covid-19 recovery
COVID-19 Recovery: The pandemic has magnified the necessity for adaptable and resilient public services. Our software enhances fleet management flexibility, crucial for uninterrupted essential services. Through optimised logistics, we facilitate adherence to health guidelines, safeguarding community health and aiding in the societal recovery from COVID-19 disruptions.Tackling economic inequality
Tackling Economic Inequality: Our technology ensures equitable access to public services by optimising resource deployment across communities. Efficient fleet management translates to more consistent and reliable service delivery, bridging service gaps and fostering economic parity. This approach underpins our commitment to mitigating economic inequalities, ensuring that advancements in service efficiency translate to benefits for all community segments.Equal opportunity
Equal Opportunity: We champion inclusivity, ensuring our platform is accessible, thereby promoting an inclusive work environment for our clients. This commitment extends to our workforce, where we prioritise diversity and equal opportunities, understanding that a varied team brings innovative solutions.Wellbeing
Wellbeing: By streamlining public service fleets, our solution indirectly bolsters community wellbeing. Efficient, reliable services contribute to cleaner, safer environments, enhancing quality of life. Our commitment to wellness extends beyond physical health, recognising the role of dependable public services in fostering social cohesion and mental wellbeing.
Our engagement with these social value themes is both a reflection of our corporate ethos and a strategic alignment with our clients’ objectives. Through our fleet optimisation service, we not only aim for operational excellence but also strive to be a catalyst for positive social change, addressing climate challenges, supporting recovery efforts, promoting equality, and enhancing community wellbeing.
Pricing
- Price
- £5,000 to £9,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- The free trial will include testing of our Waste collection optimisation module, vehicle tracking and job management