Skip to main content

Help us improve the Digital Marketplace - send your feedback

WT DATATECH LTD

Asset Management Software

MEMSS is an easy-to-use and intuitive Asset Management Software that ensures quick, simple, real-time maintenance of healthcare/fixed assets from a single point.
A cloud solution that empowers service providers to manage and maximise the use of full inventory and operate more efficiently while monitoring real-time performance and curtailing its cost.

Features

  • Asset Management -commissioning to decommissioning
  • Calibration Management
  • Calibration Management
  • Work Order - Reactive, Preventive - Parts, Time Tracking
  • Contract/License Management
  • Barcoding/QR Code - GS1 Ready
  • Inventory Tracking
  • Asset Library and Asset Loan Management
  • Document Management - Safety Alerts and Manuals
  • Cloud Solution - Unlimited assets, users

Benefits

  • Control, Manage and track Assets and Improved Regulatory Compliance
  • Increase Asset Life Cycle -by tracking PM, Reactive Jobs
  • Real Time Spend analysis and Capital Budgeting
  • Identify ghost assets and Efficiently audit assets by location
  • Remove spread sheets - Secure data on Cloud
  • Accelerate maintenance planning
  • Effective use of time
  • Improve life cycle management
  • Real time Stock Tracking
  • 360 Degree view of Asset Information

Pricing

£4,999.00 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at dileep.iarala@memss.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 3 1 2 7 8 5 7 3 1 4 5 9 2 7

Contact

WT DATATECH LTD Dileep Iarala
Telephone: 07738729304
Email: dileep.iarala@memss.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No Constraints work Any Cloud service provider but Planned maintenance is typically scheduled outside of regular business hours.
System requirements
  • Subscription to Cloud Service
  • Internet Browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
MEMSS Client Support group will make every reasonable effort to ensure that submitted cases are assigned the proper level of Severity. Submitted cases will be responded to in the order in which they are received, with consideration given for higher Severity levels. Response Time is the time it takes before a MEMSS Support agent makes initial contact with the individual who submitted case. Bundled Service (Normal Priority 6 Hours, Serious Priority 3 hours, Critical Priority Live Call Only) Concierge Standard (Normal Priority 4 Hours, Serious Priority 2 hours, Critical Priority Live Call Only)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
We include support within our annual fee. We will allocate both a technical account manager and a cloud support engineer
Standard Support is available from 09:00 to 17:00 hours, Monday to Friday (not English Public Holidays). Incidents may be logged via the web, telephone or email during these times. Additionally, incidents may be logged via email or the web outside of these hours, but they will not progress until the next working day. We also support out-of-hours for priority issues.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The application is web-based, ensuring accessibility from any location. Our onboarding process commences with a comprehensive review of your existing business processes, aligning them seamlessly with MEMSS functionality. We will tailor the configuration to your precise specifications and deliver customized training programs.

During the implementation phase, your core project team will receive in-depth training to gain a robust understanding of the system. This includes data structuring within the solution, available standard configuration options, and detailed process operation. We provide both traditional classroom and convenient webinar training formats.

Upon going live with the software, you will have continuous access to our knowledgeable support staff, ready to address all system-related questions and inquiries. Additionally, comprehensive documentation, user guides, and the dedicated client support team will be at your disposal.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Our software includes built-in export functionalities that allow you to extract your data in standard formats such as CSV, XML, or JSON. You'll have complete control over this process anytime after contract termination. We recommend performing a data export before the end date to ensure you have a full backup.
End-of-contract process
Following termination of the contract , buyer shall certify that it has returned or destroyed all copies of the MEMSS processes and Documentation provided and confidential information of MEMSS and acknowledges that its rights to use the same are relinquished. If required we can also provide the data in other standard formats, this will be an additional cost option for the buyer to choose at contract end. The cost will be determined by the export format required and the volume of data to be exported.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Look and feel will verify to desktop service to mobile service. but can do all the tasks which can see in desktop version
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
We can Provide API access to Assets and Work order information.
Limitations is depends on the service selected.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Reference Data
Workflow Process
We can customise to client requirements.

Scaling

Independence of resources
Service usage alerts has been stepped and our service cloud based. We can increase allocation services as demand increases.

Analytics

Service usage metrics
Yes
Metrics types
Summary metrics including
No Of Assets and various metrics
No of Work Orders and various usage metrics
Financial - Capital replacement metrics
Usage metrics
Performance reporting on KPIs
Resource management including time-sheet reporting
Custom reports available subjected to service agreement.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The data is exported as a set of comma-separated values (CSV) files. Data export tools provide a convenient way to obtain a copy of your Asset data, either for backup or for importing into a different system.
From Reports also you can export data in various formats (Csv/excel/XML etc)
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We use Azure Cloud which is provided by Microsoft.
https://azure.microsoft.com/en-gb/support/legal/sla/
and also our internal team available to support the application availability twenty -four (24) hours a day, seven (7) days a week.
Approach to resilience
We utilise a Azure Cloud environment built using the App service Management platform. It provides an environment that is: - Scalable through auto-scaling (up and out) - Highly available through automatic failover and full active-active High Availability. The application will be hosted in multi-node environment and this will protect from bringing the system down for any reason.
Outage reporting
Outage are reported to our clients by email .

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Not Applicable
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
MEMSS have the following security policies and processes in place: Information & Security policy, Data Attack Preparedness and Response process and Data and Netwrok Security Breach Incident Management policy Incident response is conducted by the IT Directors of the company with input from other members of the Data, Application and Infrastructure Architectural teams dependent on the type and scale of the issue with policies reviewed and testing completed regular basis, as a minimum.
As part of staff on-boarding, we train the staff on the importance of security measures and train them to respond to computer and network security incidents.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow standard development Configuration and change management process includes GitHub Source Control and Asana for issue tracking to monitor and track features and fixes.
All Change Requests must be submitted in accordance with change management procedures . Each Change Request must receive formal CAB approval before proceeding with the change and it will be created in Asana for tracking (Development, Deployment, 1st and 2 nd level Testing, Release to Test and Live)
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Application Logs created to a logfile and to database on every event based are monitored regularly. Patches are deployed when required. Potential threats are identified offline and online and with regular vulnerability scanning.
Multilocation data backup and we have in place Disaster Recovery procedures and management process in all times.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Protective monitoring controls include recording the logs with time real time stamp with system information and logs suspicious activity at a module level.
Full time in house testing with various tools/methods this will include the data, network, penetration and stress testing.
Incident management type
Supplier-defined controls
Incident management approach
All staff are trained and made aware of the incident management process which includes reporting the incident
Priority 1, Critical: System down and Critically Impacts to all business activities.
Priority 2, Functional failure: Prevent operation of particular functionality and not usable.
Priority 3, Intermittent failure: The problem is affecting a particular functionality and impacting limited users but the problem is relocatable.
Priority 4, Minor:. Very low impact to users or the problem is cosmetic.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Fighting climate change

Fighting climate change WT Datatech support in cloud services has significantly impacted the well-being of our staff, our client's staff, and the local communities we serve. With the rise of remote work, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to cultivate a happy and confident workforce that delivers exceptional customer service while positively impacting our communities, whether remotely or in-office. Our initiatives are tailored to meet the needs of our staff, identified and developed accordingly. To ensure the health and happiness of our employees, we have: Established a network of trained mental health first aiders to assist colleagues across our contracts. Fostered a supportive environment that promotes wellbeing through mindfulness and wellness activities each month, with ongoing employee feedback and engagement. Created an environment that supports wellbeing, maintaining a culture of engagement to ensure a happy and confident workforce that delivers exceptional services and positively impacts our communities, whether working remotely or in-office.

Covid-19 recovery

Covid-19 recovery

Covid-19 recovery Thanks to our cloud technology strategy, when COVID-19 struck, we seamlessly transitioned to remote working with minimal disruption to our services. Since then, our model has evolved into hybrid working. Our offices now offer smaller, modern spaces where teams can work permanently (if unable to work from home) or for essential face-to-face engagements. We've implemented all COVID-19 regulations within these offices, including social distancing measures, one-way walkways, sanitization stations, and informative posters. Despite these changes, our operational performance remained unaffected, allowing us to continue providing Business as Usual (BAU) services, ensuring continuity for our clients' management software needs. WT Datatech has supported our clients and employees throughout the pandemic, contributing to local communities where possible by offering employability advice and educational support through university programs.

Tackling economic inequality

Tackling economic inequality

Tackling economic inequality With a solid commitment to social value and addressing economic inequality, WT Datatech pledges to uphold the following throughout the contract: WT Datatech understands the challenges that small or new businesses face in their growth journey. We recognize that providing IT Management software can sometimes hinder their operations or ability to secure new business. That's why we offer comprehensive support, including free workshops to identify compliance gaps and assist in developing policies and procedures to meet IT Management software standards. We aim to effectively support businesses of all sizes, offering cost-effective rates and additional assistance to ensure their success. Through our operating model, which leverages remote working via cloud services, we create opportunities for those facing barriers to employment and individuals in deprived areas. We provide training opportunities for Consultants and other staff as needed, ensuring inclusivity and equal access to advancement. Additionally, we have established CPD pathways to facilitate professional progression. WT Datatech is dedicated to addressing economic inequality and collaborates with buyers to explore new and innovative methods of breaking down barriers.

Equal opportunity

Equal opportunity

Our commitment to equality and diversity is not just a statement but a comprehensive policy that we live by. This policy covers Staff Training & Development, monitoring, effective employee communication, and equality-focused training. It is a policy and a promise aligned with all legislation surrounding equal opportunities. We are committed to ensuring this is reflected in our services, and we take pride in the fact that our policy is incorporated into staff contracts and is briefed during staff inductions. Through our robust equal opportunities, diversity, and inclusion policies, we go beyond mere compliance. We actively tailor our services to provide equal opportunities, reflecting the unique demographics and characteristics of the population across the areas in which we operate. We understand that each community is different and value and respect these differences in our approach.

Wellbeing

Wellbeing

Our cloud support services have significantly contributed to the well-being of our staff, client staff, and the local communities in which we operate. As remote work becomes more prevalent, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to foster a happy and confident workforce that delivers excellent customer service and contributes to the sustainable transformation of our local communities, whether working from home or in-office. These initiatives are tailored to meet the support needs of our staff. To ensure employee health and happiness, we have: An established network of trained mental health first aiders is available across our contracts to assist colleagues. We maintain a culture of well-being through engagement, offering a variety of mindfulness and wellbeing activities each month. We continuously consult with and invite employee feedback to tailor our initiatives effectively.

Pricing

Price
£4,999.00 an instance a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
It includes all features with a basic configuration. Max 30 days we will provide a trial.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at dileep.iarala@memss.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.