KT Collector
An asset management system allowing mobile users to add highway asset data and geo-referenced mapping for offline use and modelling. The mobile application uploads updated inspection or network data to the cloud system. utilises the ESRI collector Android or Apple app in conjuction with our bespoke web browser reporting system.
Features
- Mandatory data capture, offline working, 'If This, Then That' (IFTTT)
- Associate Council datasets, interface with GIS, CRM, import existing assets
- Defined risk groups with map visualisation and work package allocation
- Create programme based on risk, resilience, importance and importance
- Independent Defect recording with service request/fulfillment facility, HADDMS compatible
- Reporting suite with map view, export functionality (shp csv etc).
- Integration/Interface with existing corporate systems, Symology, Confirm, Alloy, etc
Benefits
- Self served mobile working, outstanding todo filter and inspection history
- Any attribute report filtering, including drawn area, and inspection history
- Onsite or online training, remote desktop support, normal working hours
- Data validation service to confirm data attributes and location information
- Flexible creation of work packages from report output, Interactive KPI's
- PDF reports with automatic compilation of maps, photos, inspection data
- Does not require dedicated client resource to manage system.
- Dedicated account manager, GDPR Compliant, ISO 27001 accreditation
Pricing
£995 to £1,295 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 4 3 8 6 3 6 4 9 5 4 7 9 1 4
Contact
Kaarbon Technology Ltd
Graeme Forward
Telephone: 01202031333
Email: sales@kaarbontech.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- There are no service constraints.
- System requirements
-
- Web browser, Google Chrome, Mozilla Firefox, Edge or Internet Explorer
- Internet connection, minimum 10Mbps and latency less than 100ms
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Monday to Friday 8am to 6pm - response within 60 minutes, out of hours SLA can be specified, further details on request
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our support services are delivered by online ticket, email or telephone and are operational 0800 until 1800 UK time, Monday to Friday excluding bank and public holidays. We do provide a dedicated account manager for each customer but this is not specifically a technical or cloud support engineer.
We offer onsite support at the rate published on our pricelist. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide detailed training video's, telephone support and offer on site training for an additional fee
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Video tutorials
- End-of-contract data extraction
- All data can be exported at any time during the contract period.
- End-of-contract process
- No additional charges are due at the end of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile service can have offline maps for use when a mobile signal is not available.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Our API is not part of our standard G Cloud offering, Please contact us to discuss your requirements
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Asset collection process has questions based on HMEP advice, answers to these questions can be personalised by buyer once an order has been received.
Scaling
- Independence of resources
- We limit the amount of customers hosted on a single server and monitor demand to ensure system is optimised at all times
Analytics
- Service usage metrics
- Yes
- Metrics types
- Real-time management and login information provided
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported in from the operations tab on the main menu or from many of the reporting screens within the system.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Esri Shapefile
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99% service availablility
- Approach to resilience
- Detailed resilience information available on request
- Outage reporting
- Email alert of service outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We use Puppet as our core user control system. Access can be restricted via an access control dashboard, restricted access and version control access is also applied to reduce the possibility of unauthorised access to the system
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Approachable Certification Ltd
- ISO/IEC 27001 accreditation date
- 01/04/2021
- What the ISO/IEC 27001 doesn’t cover
- Website (kaarbontech.co.uk)
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Our policies around information security are held within the companies ‘service definition’ document and are reviewed annually. All queries or issues with regard to information security should be reported the Information Security Officer who has ultimate authoritiy over IT governance.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All changes to the KaarbonTech software source code are recorded using version-control software GIT, which carries an audit trail showing who has made what change. Access to KaarbonTech code is limited through GitHub Teams, which produces an audit log and restricts permissions as per our configuration. GitHub issues are used to track all change requests and log changes. Code is only be deployed on Production servers following a full testing cycle.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability monitoring tools operate in realtime and any potential threats are assessed using the Common Vulnerability Scoring System (CVSS). All identified vulnerabilities are risk assessed, where remedial action is required this is carried out within our vulnerability management lifecycle. Standard updates are installed monthly or when specific vulnerabilites are identified.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Static source code analysis is performed using Perl::Critic. Github security services monitor for dependency issues and send alerts, or create automatic patches for testing.
All servers run IPTables firewalls locked down to just the ports required. Developers and admins connect to the servers using a Secure Shell and keys. All servers run auditd to monitor system alterations and stream logs to a central log server. We have the ability to activate DDOS protection by enabling Cloudflare proxy protection. Potential compromises that require remediation are dealt with immediately. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Security incidents may be identified through a number of channels: by real-time system monitoring, regular penetration testing or identified by a member of staff. All users of KaarbonTech systems and services are required to report any information security weakness, event, or incident to the Information Security Officer. All incidents are classified into one of three tiers and managed appropriately. Target times for response depend on the severity and classification of the incident and relevant parties will be notified where applicable.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Our environmental management and impact policy provides a process for assessing, measuring, and mitigating the environmental impact of KaarbonTech operations. A copy of this policy is available on request. - Covid-19 recovery
-
Covid-19 recovery
In March 2020 we created a covid-19 risk matrix for all staff to use to mitigate the effect of coronavisus on the business, it proved effective in keeping staff and customers safe and is update annually to ensure readiness should we need to react to the changing environment. A copy of this risk matrix is available on request. - Tackling economic inequality
-
Tackling economic inequality
At KaarbonTech we recognise economic inequality is relevent to various functions within the business, we therefore strive to ensure payments to suppliers are made promptly and our recruitment processes recognise this providing opportunities for training and persoal growth within the business. - Equal opportunity
-
Equal opportunity
KaarbonTech recognises that it is essential to provide equal opportunities to all persons without discrimination. We operate a policy which sets out the organisation's position on equal opportunity in all aspects of employment, including recruitment and promotion, giving guidance and encouragement to employees at all levels to act fairly and prevent discrimination on the grounds of sex, race, marital status, part-time and fixed term contract status, age, sexual orientation, or religion. - Wellbeing
-
Wellbeing
KaarbonTech approach to wellbeing encompasses good mental, physical, financial and social health, we aim to create a workplace culture where employees feel comfortable to talk, seek help and support, provided by a designated member of the team.
We recognise that our employees may encounter events that may affect
them in the workplace including those related to their health, personal or domestic situation as well as work-related problems and aim to support them during these times.
Pricing
- Price
- £995 to £1,295 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No