Digital IoT Tracking and Resource Management
ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.
Features
- Internet of Things (IoT)
- Asset Tracking and Location Services
- Conditional Monitoring of Assets and Equipment
- Asset and Configuration Management
- Secure by Design Infrastructure
- Exploitation of Cloud/ICT Technologies
- Web and Mobile App Interfaces
- Security Assurance and Device Encryption
- Information Segregation and Management
- Digital Transformation
Benefits
- Delivers Value for Money and Cost Benefit to the Customer
- Enables Decision Making
- Delivers Operational Understanding and Digital Visualisation
- Delivers Business Process Efficiencies
- Short Deployment to Benefit Timeframe
- Knowledge and Skills Transfer to Enhance Customer Team
- Security Assurance and Asset Protection
- Common Operating Picture
- API Interfaces to Customer Systems to Leverage Existing Investments
- Exploitation of Digital Technology
Pricing
£4,975 an instance a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 5 5 0 5 2 3 3 3 8 5 6 1 1 9
Contact
ishelp.co.uk Ltd
Phil Wheeler
Telephone: 07703098420
Email: phil.wheeler@ishelp.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- System service and operational support requirements are dependent on the service level requirements to be agreed with the Customer.
- System requirements
-
- System License
- Device License
- API License
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times vary depending on the agreed service level with the customer. Typically, during office hours, we aim to respond to high priority support requests "within one hour" but this can be reduced to "within five minutes" if the customer has requested this level of support within an agreed service level . Similarly, Out of Office hours support can vary from "not available" to "within five minutes" depending on the agreed service level with the customer.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our system and operational support levels vary depending on each individual customer's support requirements. Our standard system and operational support availability is between 09:00 - 17:00 Monday to Friday excluding public holidays. This standard level of support is included with the license costs for the system and devices.
We can bespoke our system and operational support levels to various degrees based upon each individual customer's support requirements.
Each customer will be allocated a customer support manager as the point of contact for all system and service requirements. Each customer will have access to our support desk which shall operate under the terms of a mutually agreed service level agreement. Our support desk will allocate system or operational support engineers as required to manage and close support request calls. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We can provide training via digital documentation, online or on-site sessions whichever is preferred by the customer. Both online and onsite training may incur additional costs.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- The customer data can be provided as an export in various formats depending on how each individual customer wishes to receive the data. Typically, the data can be provided in an XML or CSV format.
- End-of-contract process
- The customer will own any infrastructure, asset tracking, or sensor devices that they have purchased during the period of the contract. At the end of the contract, the customer's system access license will expire and the customer-owned devices and associated customer user accounts will no longer have access to our system. Customer data residing on our system can be exported if required in an agreed format at no additional cost. Any residual customer data shall be securely destroyed. All data services for any devices or equipment will be terminated.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile device application has reduced functionality compared with the desktop web application. The mobile application has been designed to provide the functionality and mobility required by a user on a mobile device.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The web application and mobile application service interfaces provide users with the functionality of the system allocated to their individual user profile.
- Accessibility standards
- None or don’t know
- Description of accessibility
-
Our web application and mobile applications services are accessed via a secure HTTPS connection that auto-scale to fit the user's display settings. The user interface, components, and navigations are presented to users in a way that can be understood, perceived, operated, and robust enough for a wide range of user agents, including assistive technologies.
The application functionality of each individual user is dependent on each individual user's system user profile. - Accessibility testing
- Our system functionality operates with the standard functionality provided by the OEM operating system. We continually test our application interfaces to ensure that they meet the requirements of users of assistive technology.
- API
- Yes
- What users can and can't do using the API
- Users are not permitted to make any changes to the API. The API is designed to permit connectivity to other systems and is securely managed and operated.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Commercial Branding and Labelling can be customised on request.
Scaling
- Independence of resources
- All our systems are built to be fully scalable, and resources are continually monitored, with load balancing and virtualised services where resources are increased automatically to meet additional loadings within agreed parameters.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Dependant on the user requirement and SLA, usage metrics can be supplied as part of the service.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export some data
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Standard SLA for system availability is 98%, with manned helpdesk support 09:00-17:00 on normal working days. Availability will be measured on a monthly basis and will exclude any scheduled downtime and any unavailability caused as a result of actions outside the control of ISHelp, such as a fault with the Data Centre infrastructure or the loss of the Data Centre internet network connection.
Enhanced out of Office Hours SLA support can be purchased, to provide on-call support service to support high priority (level 1 and 2) calls. - Approach to resilience
-
All our systems support high availability, scalability, and resilience. The actual solution is dependent on specific customer requirements and operational needs, as well as the location of services, and deployment on either native cloud, virtualized or physical hardware platforms.
More details are available on request. - Outage reporting
- The use of a dedicated monitoring service provides detailed health status monitoring and error capture logging with email alerts. The services are monitored by third-party Uptime Robot utilities to confirm system availability.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access control is in accordance with our IS027001 policies and procedures.
Company policy enforces system administrators to use a hardened “bastion host” to connect to the system. The hardened bastion host is only accessible within the network security boundary via separate administrative access and only via a dedicated admin VPN connection. This policy ensures a high level of segregation and access control within the network security boundary. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 14/07/2023
- What the ISO/IEC 27001 doesn’t cover
- Entire company within scope of ISO certification without exclusion.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
- Security policies, processes and procedures are followed in accordance with our ISO 27001 Information Security Policy. All our services conform with the National Cyber Security guidelines and best practices.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our configuration control and change management processes are controlled via our dedicated configuration control and change management system. We have fully auditable configuration and change control procedures with workflow linked to our source control and management system. We fully test all our software for potential threats prior to rollouts and subscribe to the National Cyber Security Centre (NCSC) Web check service.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Vulnerability management process is adhered to in accordance with our ISO 27001 certification.
We are subscribed to the National Cyber Security Centre (NCSC) Web check service, which scans all services for any identifiable issues and provides proactive alerting in case of possible problems detected by NCSC.
We operate within National Cyber Security Centre (NCSC) guidelines and align our security patching to meet potential threats defined by NCSC alerts and recommendations. From current NCSC advice, we implement any security patches within seven days of release. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Protective monitoring process is in accordance with our ISO27001 policies and procedures.
Regular Nessus VA scanning and reporting is undertaken to identify potential compromises. From these reports, any identified issues are remediated per the established company patching policy within seven days. Additional downtime and patching windows are agreed upon with customers in advance so as not to impact live operations. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Incident Management process is in accordance with our ISO27001 policies and procedures.
We have a dedicated system for the management of incidents including support calls, fault calls, route cause analysis, and requests.
Once a call is raised by our operators, users will be emailed with a ticket number, description, and priority, and are then updated on the status of the call and any updates in accordance with the customer SLA.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
ISHelp is committed to managing its business impact on the environment in a responsible and ethical manner. The Company does this by identifying all significant environmental impacts and putting processes in place to prevent, reduce and mitigate them in line with the Company’s Carbon Reduction Plan and Environmental Policy.
ISHelp has achieved net zero on scope 1 and scope 2 emissions and is committed to calculating and reporting scope 3 emissions by January 2027 and achieving Net Zero on scope 1, 2 and 3 emissions by December 2030.
We undertake carbon reduction initiatives such as UK tree planting as trees are essential to maintaining our climate and biodiversity. Trees contribute to the global environment by improving air quality, conserving water, preserving soil, and supporting wildlife.Tackling economic inequality
ISHelp recognises that its employees are its principal asset and the Company is committed to treating employees with fairness, respect and integrity. In accordance with our Human Rights and Labour Standards Policy, we commit to principles-based outcomes which include the provision of a living wage at a minimum. Pay must be (at the very least) sufficient to cover an employees’ basic needs and provide employees with the opportunity to improve their skills, capabilities, or economic prosperity. The Company operate remuneration policies and practices to ensure employees are fairly rewarded for the work that they do. The Company regularly monitors this and reviews all employee pay annually at the minimum.Equal opportunity
In accordance with our Human Rights and Labour Standards Policy, our Equality, Diversity and Inclusion Policy, and our Corporate Social Responsibility Policy. We are committed to promoting equality, diversity and inclusion among our workforce and eliminating unlawful discrimination. Employees and any job applicants will receive equal treatment regardless of age, disability, gender identity, marital or civil partner status, pregnancy or maternity, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation.Wellbeing
We are committed to protecting the health, safety and wellbeing of our employees and we recognise the importance of identifying and tackling the causes of work-related stress. We also recognise that personal stress, while unrelated to the workplace, can adversely affect the wellbeing of staff at work. We want to support the mental wellbeing of all our staff and will provide appropriate support for staff who are suffering from stress or mental ill health, on a confidential basis where appropriate, regardless of its source.
Pricing
- Price
- £4,975 an instance a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Access to a demo instance and associated service/hardware for a time limited period.