Asset Management Software
MEMSS is an easy-to-use and intuitive Asset Management Software that ensures quick, simple, real-time maintenance of healthcare/fixed assets from a single point.
A cloud solution that empowers service providers to manage and maximise the use of full inventory and operate more efficiently while monitoring real-time performance and curtailing its cost.
Features
- Asset Management -commissioning to decommissioning
- Calibration Management
- Calibration Management
- Work Order - Reactive, Preventive - Parts, Time Tracking
- Contract/License Management
- Barcoding/QR Code - GS1 Ready
- Inventory Tracking
- Asset Library and Asset Loan Management
- Document Management - Safety Alerts and Manuals
- Cloud Solution - Unlimited assets, users
Benefits
- Control, Manage and track Assets and Improved Regulatory Compliance
- Increase Asset Life Cycle -by tracking PM, Reactive Jobs
- Real Time Spend analysis and Capital Budgeting
- Identify ghost assets and Efficiently audit assets by location
- Remove spread sheets - Secure data on Cloud
- Accelerate maintenance planning
- Effective use of time
- Improve life cycle management
- Real time Stock Tracking
- 360 Degree view of Asset Information
Pricing
£4,999.00 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 3 1 2 7 8 5 7 3 1 4 5 9 2 7
Contact
WT DATATECH LTD
Dileep Iarala
Telephone: 07738729304
Email: dileep.iarala@memss.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No Constraints work Any Cloud service provider but Planned maintenance is typically scheduled outside of regular business hours.
- System requirements
-
- Subscription to Cloud Service
- Internet Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- MEMSS Client Support group will make every reasonable effort to ensure that submitted cases are assigned the proper level of Severity. Submitted cases will be responded to in the order in which they are received, with consideration given for higher Severity levels. Response Time is the time it takes before a MEMSS Support agent makes initial contact with the individual who submitted case. Bundled Service (Normal Priority 6 Hours, Serious Priority 3 hours, Critical Priority Live Call Only) Concierge Standard (Normal Priority 4 Hours, Serious Priority 2 hours, Critical Priority Live Call Only)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
We include support within our annual fee. We will allocate both a technical account manager and a cloud support engineer
Standard Support is available from 09:00 to 17:00 hours, Monday to Friday (not English Public Holidays). Incidents may be logged via the web, telephone or email during these times. Additionally, incidents may be logged via email or the web outside of these hours, but they will not progress until the next working day. We also support out-of-hours for priority issues. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The application is web-based, ensuring accessibility from any location. Our onboarding process commences with a comprehensive review of your existing business processes, aligning them seamlessly with MEMSS functionality. We will tailor the configuration to your precise specifications and deliver customized training programs.
During the implementation phase, your core project team will receive in-depth training to gain a robust understanding of the system. This includes data structuring within the solution, available standard configuration options, and detailed process operation. We provide both traditional classroom and convenient webinar training formats.
Upon going live with the software, you will have continuous access to our knowledgeable support staff, ready to address all system-related questions and inquiries. Additionally, comprehensive documentation, user guides, and the dedicated client support team will be at your disposal. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Our software includes built-in export functionalities that allow you to extract your data in standard formats such as CSV, XML, or JSON. You'll have complete control over this process anytime after contract termination. We recommend performing a data export before the end date to ensure you have a full backup.
- End-of-contract process
- Following termination of the contract , buyer shall certify that it has returned or destroyed all copies of the MEMSS processes and Documentation provided and confidential information of MEMSS and acknowledges that its rights to use the same are relinquished. If required we can also provide the data in other standard formats, this will be an additional cost option for the buyer to choose at contract end. The cost will be determined by the export format required and the volume of data to be exported.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Look and feel will verify to desktop service to mobile service. but can do all the tasks which can see in desktop version
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
We can Provide API access to Assets and Work order information.
Limitations is depends on the service selected. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Reference Data
Workflow Process
We can customise to client requirements.
Scaling
- Independence of resources
- Service usage alerts has been stepped and our service cloud based. We can increase allocation services as demand increases.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Summary metrics including
No Of Assets and various metrics
No of Work Orders and various usage metrics
Financial - Capital replacement metrics
Usage metrics
Performance reporting on KPIs
Resource management including time-sheet reporting
Custom reports available subjected to service agreement. - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
The data is exported as a set of comma-separated values (CSV) files. Data export tools provide a convenient way to obtain a copy of your Asset data, either for backup or for importing into a different system.
From Reports also you can export data in various formats (Csv/excel/XML etc) - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We use Azure Cloud which is provided by Microsoft.
https://azure.microsoft.com/en-gb/support/legal/sla/
and also our internal team available to support the application availability twenty -four (24) hours a day, seven (7) days a week. - Approach to resilience
- We utilise a Azure Cloud environment built using the App service Management platform. It provides an environment that is: - Scalable through auto-scaling (up and out) - Highly available through automatic failover and full active-active High Availability. The application will be hosted in multi-node environment and this will protect from bringing the system down for any reason.
- Outage reporting
- Outage are reported to our clients by email .
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Not Applicable
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
MEMSS have the following security policies and processes in place: Information & Security policy, Data Attack Preparedness and Response process and Data and Netwrok Security Breach Incident Management policy Incident response is conducted by the IT Directors of the company with input from other members of the Data, Application and Infrastructure Architectural teams dependent on the type and scale of the issue with policies reviewed and testing completed regular basis, as a minimum.
As part of staff on-boarding, we train the staff on the importance of security measures and train them to respond to computer and network security incidents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We follow standard development Configuration and change management process includes GitHub Source Control and Asana for issue tracking to monitor and track features and fixes.
All Change Requests must be submitted in accordance with change management procedures . Each Change Request must receive formal CAB approval before proceeding with the change and it will be created in Asana for tracking (Development, Deployment, 1st and 2 nd level Testing, Release to Test and Live) - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Application Logs created to a logfile and to database on every event based are monitored regularly. Patches are deployed when required. Potential threats are identified offline and online and with regular vulnerability scanning.
Multilocation data backup and we have in place Disaster Recovery procedures and management process in all times. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Protective monitoring controls include recording the logs with time real time stamp with system information and logs suspicious activity at a module level.
Full time in house testing with various tools/methods this will include the data, network, penetration and stress testing. - Incident management type
- Supplier-defined controls
- Incident management approach
-
All staff are trained and made aware of the incident management process which includes reporting the incident
Priority 1, Critical: System down and Critically Impacts to all business activities.
Priority 2, Functional failure: Prevent operation of particular functionality and not usable.
Priority 3, Intermittent failure: The problem is affecting a particular functionality and impacting limited users but the problem is relocatable.
Priority 4, Minor:. Very low impact to users or the problem is cosmetic.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change
Fighting climate change WT Datatech support in cloud services has significantly impacted the well-being of our staff, our client's staff, and the local communities we serve. With the rise of remote work, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to cultivate a happy and confident workforce that delivers exceptional customer service while positively impacting our communities, whether remotely or in-office. Our initiatives are tailored to meet the needs of our staff, identified and developed accordingly. To ensure the health and happiness of our employees, we have: Established a network of trained mental health first aiders to assist colleagues across our contracts. Fostered a supportive environment that promotes wellbeing through mindfulness and wellness activities each month, with ongoing employee feedback and engagement. Created an environment that supports wellbeing, maintaining a culture of engagement to ensure a happy and confident workforce that delivers exceptional services and positively impacts our communities, whether working remotely or in-office.Covid-19 recovery
Covid-19 recovery
Covid-19 recovery Thanks to our cloud technology strategy, when COVID-19 struck, we seamlessly transitioned to remote working with minimal disruption to our services. Since then, our model has evolved into hybrid working. Our offices now offer smaller, modern spaces where teams can work permanently (if unable to work from home) or for essential face-to-face engagements. We've implemented all COVID-19 regulations within these offices, including social distancing measures, one-way walkways, sanitization stations, and informative posters. Despite these changes, our operational performance remained unaffected, allowing us to continue providing Business as Usual (BAU) services, ensuring continuity for our clients' management software needs. WT Datatech has supported our clients and employees throughout the pandemic, contributing to local communities where possible by offering employability advice and educational support through university programs.Tackling economic inequality
Tackling economic inequality
Tackling economic inequality With a solid commitment to social value and addressing economic inequality, WT Datatech pledges to uphold the following throughout the contract: WT Datatech understands the challenges that small or new businesses face in their growth journey. We recognize that providing IT Management software can sometimes hinder their operations or ability to secure new business. That's why we offer comprehensive support, including free workshops to identify compliance gaps and assist in developing policies and procedures to meet IT Management software standards. We aim to effectively support businesses of all sizes, offering cost-effective rates and additional assistance to ensure their success. Through our operating model, which leverages remote working via cloud services, we create opportunities for those facing barriers to employment and individuals in deprived areas. We provide training opportunities for Consultants and other staff as needed, ensuring inclusivity and equal access to advancement. Additionally, we have established CPD pathways to facilitate professional progression. WT Datatech is dedicated to addressing economic inequality and collaborates with buyers to explore new and innovative methods of breaking down barriers.Equal opportunity
Equal opportunity
Our commitment to equality and diversity is not just a statement but a comprehensive policy that we live by. This policy covers Staff Training & Development, monitoring, effective employee communication, and equality-focused training. It is a policy and a promise aligned with all legislation surrounding equal opportunities. We are committed to ensuring this is reflected in our services, and we take pride in the fact that our policy is incorporated into staff contracts and is briefed during staff inductions. Through our robust equal opportunities, diversity, and inclusion policies, we go beyond mere compliance. We actively tailor our services to provide equal opportunities, reflecting the unique demographics and characteristics of the population across the areas in which we operate. We understand that each community is different and value and respect these differences in our approach.Wellbeing
Wellbeing
Our cloud support services have significantly contributed to the well-being of our staff, client staff, and the local communities in which we operate. As remote work becomes more prevalent, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to foster a happy and confident workforce that delivers excellent customer service and contributes to the sustainable transformation of our local communities, whether working from home or in-office. These initiatives are tailored to meet the support needs of our staff. To ensure employee health and happiness, we have: An established network of trained mental health first aiders is available across our contracts to assist colleagues. We maintain a culture of well-being through engagement, offering a variety of mindfulness and wellbeing activities each month. We continuously consult with and invite employee feedback to tailor our initiatives effectively.
Pricing
- Price
- £4,999.00 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- It includes all features with a basic configuration. Max 30 days we will provide a trial.