Raedam Parking Management
Raedam is the cloud-based parking management platform that enables you to create a solution tailored to the needs of your organisation.
From defining your car park structure and approval-rules, to managing on-site access, Raedam gives you the tools to take control of your parking, reduce spend, and improve employee satisfaction.
Features
- Self Service Parking Administration Portal
- Data visualisation dashboard of parking metrics
- Automated scoring system for parking assessments
- Dynamic parking need assessment form
- Real-time parking booking module
- Email notifications for parking related information
- Single Sign-On and Two-Factor authentication
- Real time parking permission search
- Self service of permission allocation rules
- Accessible and responsive web application
Benefits
- Build and manage your organisations parking structure
- Control parking access and permission in-line with your parking policy
- Reduce spend in managing your parking allocations via automation
- Improve employee and visitor experience through fair distribution of parking
- Monitor parking activity and utilisation across your sites
- Fully utilise your existing parking infrastructure
- Automated scoring of parking assessments
- Removal of manual inefficient processes and tools e.g. spreadsheets
- Monitor CO2 emissions for your organisations employees and visitors
- Provide access to assessments and booking on mobile, tablet, web
Pricing
£25.00 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 3 9 8 8 3 4 4 6 8 8 6 6 7 5
Contact
SDMC Consulting
Robert Taylor
Telephone: 033 31 124666
Email: rob.taylor@sdmc-consulting.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- Internet access (all modern browsers supported)
- LDAP integration for Single Sign On functionality if required
- Access to API or file for barrier integration
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Standard Support Hours are 08:00 to 18:00hrs (UK local time) Mondays to Fridays excluding English Bank and Public Holidays. Response times vary from two hours to 24hrs based on severity.
Weekend response times are immediate for critical issues, critical incidents should be escalated via the phone support channel. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support Levels: Basic, Standard & Extended.
Core platform support is provided at all levels.
Standard and Extended support levels provide with faster response times to incidents.
Extended support gives direct access to a technical account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
User onboarding through the Raedam product provides guidance on how to get started with using the product and its functionality.
Online documentation is available through the application for administrators.
New customers can take advantage of a free online introductory product demonstration and feature tour, via video conference, with their technical account manager.
Onsite training can be provided on request for an additional cost. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Administrators can self-serve download and generate reports of the data held within the system.
Any additional data, not available in reports, can be requested via the Raedam support channels. - End-of-contract process
-
At the end of the contract if the organisation does not wish to continue using the product, they can download the data they wish to keep. Delete the parking structures and specific configuration. Purge the user data.
Alternatively they can request that we purge all data on their behalf.
No additional cost would be incurred at the contract end.
Data will be retained for a period of three months in case the purchaser wishes to extract any further data or start using the product again, after this point the data will be automatically purged.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The mobile service is orientated to end-user and lookup functionality.
The car park administration functionality is restricted to web and full-sized tablets. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Raedam provides an API for third party system interoperability.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Automated scanning of API interface
- API
- Yes
- What users can and can't do using the API
- The API is used for interoperability with third party systems such as desk booking, ANPR cameras and physical barriers.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Customer administrators can apply branding on an enterprise plan or through a branding paid add-on.
Scaling
- Independence of resources
-
Raedam has been designed with scalability in mind so it scales horizontally rather than vertically.
Utilising cloud best practices, this ensures our product scales up or down dependent on demand, preventing impact to users and enabling us to offer better costs.
Additionally, continuous monitoring has been implemented to ensure the Raedam team are notified as any scaling or performance issues begin to arise.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The product provides a large number of metrics related to the organisations parking and user applications including, but not limited to:
Number of applications.
Car park usage and utilisation.
Parking breach reporting.
Estimated CO2 emissions based on commuter miles.
Distance travelled. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Administrators can export their organisations data via reports available in the administration portal.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Raedam aims for 99.99% uptime, but guarantee 99.95%. If availability averages less than 99.95% over a calendar month then contact your technical account manager for any service credit discussion.
- Approach to resilience
- Available on request.
- Outage reporting
- Customers would be alerted via email, we are looking to launch a public status dashboard during 2022.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Other user authentication
- In addition to the above users can also authenticate via a company or organisations single-sign-on when configured and onboarded.
- Access restrictions in management interfaces and support channels
- We restrict access via account roles and privileges. An organisation administrator can assign roles to individual user accounts.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Description of management access authentication
- In addition to the above management access can be available via an organisations single-sign-on authentication service once setup and onboarded.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow security governance as set out in the AWS Well Architected framework. We also conduct yearly independent penetration and security testing, and follow guidance provided by security expert consultants.
- Information security policies and processes
- We have a documented information security policy which is reviewed and signed off at board level at least once a year. We have a named board member who is responsible for the creation, documentation and sign-off of these policies. We internally audit and test for compliance with these policies. A copy of our information security policy document is available on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All proposed changes and requests are assessed by the development team for security, accessibility, performance and meeting the requirement. These changes then go through our formal change control process before being published to the live environment, this includes peer-review, automated testing, regression testing and human user acceptance testing. Any changes are then logged for the independent security penetration test.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We assess the potential threat on a case by case basis, taking into account the reach, impact and severity.
Based on the severity of the identified vulnerability we would look to patch immediately once the patch has passed the change control process.
Information on potential threats come from a number of sources including AWS themselves, CVE database and other sources. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
All security event logs are available to the SDMC cyber defence and security operations centre.
We use Cloud Watch to collect and monitor all authentication, authorisation, accounting events and sources.
This applies to all relevant components of the application including the hypervisor, administrative and subscription portals, orchestrators, tenant networks and applications.
We have the capability to respond in different ways based on the type of potential compromise.
Incidents like this are monitored and responded to constantly. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We use ITIL Incident Management methodology and practices for the identification and resolution of incidents.
Users can report incidents via our support portal or phone for critical incidents.
Users are kept informed and able to report on incidents via our support portal. In the case of critical events a progress report would be made available every two hours. Updates can also be given via our technical account managers.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We have a documented internal strategy for the reduction of energy use, to fight climate change. - Covid-19 recovery
-
Covid-19 recovery
We have a Covid-19 statement on our website, and a strategy for moving forwards. - Tackling economic inequality
-
Tackling economic inequality
We have a number of policies in place to tackle economic inequality including through our graduate scheme, intern scheme and onboarding processes. - Equal opportunity
-
Equal opportunity
We have a documented, audited and clear policy on equal opportunity for all. - Wellbeing
-
Wellbeing
We take mental health very seriously, and have a number of schemes available to all employees to support this vision.
Pricing
- Price
- £25.00 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Free sandbox trial available on request.
Full functionality is included.
Time period agreed on a case by case basis.