Ctrl Hub
Ctrl Hub is an easy-to-use cloud software application for managing compliance, competency, and risk across your business. It generates efficiencies in the field and the office, reducing risk exposure and increasing data quality. Our mission is to ensure your people get home safely at the end of each day.
Features
- Live compliance risk status across all people & projects
- Field data capture using custom forms and workflows
- Asset and personnel competence status
- Fleet and equipment compliance management
- Project Governance - field access to documentation and work allocation
- Workforce management
- Real-time dashboards
- Cloud application available on any online device
- API and CSV data access for reporting and analysis
Benefits
- A cloud-based solution designed to digitise your operations
- Custom forms and workflows built to your business requirements
- Confidence that all works and resources are competent and compliant
- Cost effective solution to generate a significant return on investment
- Version controlled document management with audit trail
- Visibility of your people’s roles, responsibilities, performance and certificates
- Visibility of certifications and allocations for your assets
- Requirement Matrices allow training requirements to be identified and managed
- Access to project documentation from your worksites
- Evidence of certifications at the click of a button
Pricing
£15 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 0 7 0 6 1 3 5 9 9 4 4 7 2
Contact
CTRL HUB LIMITED
Mark Lisgo
Telephone: 07770339900
Email: mark@ctrl-hub.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- There are no constraints. Our service is a SAAS (Software as a Service) offering.
- System requirements
-
- Internet browser
- Internet connection from users' devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support requests are acknowledged within the working day (Monday to Friday).
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide a full support service from implementation to BAU (business as usual). We will guide and advise you on setting up your Ctrl Hub system as well as providing ongoing support for any questions you or your users have whilst using the system.
After initial onboarding and go-live, the same team will continue to manage your account on a day to day basis so we can provide prompt responses to your support requests, whether they be bug reports, feature requests or user training requests. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- As part of the onboarding process we provide handholding to populate data, review requirements and develop configured form templates, and up to 8 hours of training, with the option to purchase additional time as required. We also provide a free online Help Centre.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Word / Google Docs
- PowerPoint / Google Slides
- Excel / Google Sheets
- Online Help Desk
- End-of-contract data extraction
- Data can be exported to CSV and / or PDF. These can be generated via API calls. Our standard terms and conditions address the provision of customer data at the end of the contract’s stated term.
- End-of-contract process
- Upon termination of the contract, Ctrl Hub will provide the customer with all customer data upon written request from the customer. The licence will terminate and the customer will no longer be able to access the Ctrl Hub platform.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The service is the same whether accessed via a mobile or desktop device. The UI (User Interface) favours desktop and mobile tablet devices, over mobile phones, however there is no difference in the feature set between device types.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- We have an API (Application Programming Interface) covering the entities within our application.
- Accessibility standards
- None or don’t know
- Description of accessibility
-
There are two interfaces - (1) via an API and (2) a client dashboard.
The API is RESTful which allows authenticated requests to perform operations on the underlying data and system. It is a secure and authenticated endpoint with the privileges which are assigned to the token. The API is versioned appropriately to the functionality.
The dashboard is also authenticated and uses the same permissions system as the API. - Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- The API offers the same functionality as the UI. It allows users to control the data in their system and the configuration of the features as required by the user.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Data Capture Forms; (1) Fully configurable form content and layout, (2) Custom workflow, steps and transitions
Other customisable system areas include: (3) Dashboard widget content, (4) Document storage folder structure, (5) Personnel statuses, occupations, conditions and teams, (6) Project, Site and Task statuses and types, (7) Vehicle and Equipment categories, statuses, makes, models and owners, (8) Qualification and Certification types, renewal periods and providers, (9) Custom requirement matrices allowing configuration of dedicated training plans and learning pathways for personnel, and certification matrices for assets.
Access to make customisations is managed through roles and permissions. All customisations are made through your own ctrl-hub web application.
Scaling
- Independence of resources
- Auto-scaling is enabled to respond to user demand and infrastructure is isolated and segmented.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Front end tools are available to export data to CSV files and / or PDF where applicable.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our SLA provides a 99.9% uptime guarantee. In more than seven years of trading, we have never fallen below this threshold on a monthly basis. We monitor availability using Pingdom. If our performance falls below the SLA level, we offer a sliding scale of refund linked to the actual availability of the platform. This would be refunded from the following month’s subscription invoice.
- Approach to resilience
- We use cloud infrastructure, based in London, to provide our core infrastructure. We run kubernetes across multiple zones in the region which provides geographic resiliency. Our workloads run on at least two instances to provide redundancy in different zones. We also utilise autoscaling to provide enough resources to meet the demands of transient traffic changes.
- Outage reporting
- We report outages via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
Support is managed via email, so a manual verification of the sender is performed against known, registered users. Where we receive a request for support from an unknown source, this is verified with the respective customer contact before proceeding.
There are no management interfaces that grant us privileged access to the system, we use the same string security methods which we provide to our customers by default. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau / UKAS
- ISO/IEC 27001 accreditation date
- 18 May 2018 and re-certified on an annual basis since then
- What the ISO/IEC 27001 doesn’t cover
- Our ISO 27001 certification has no exclusions
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Ctrl Hub is ISO 27001 certified and has been since May 2018. Information security is reviewed on an ongoing basis and our platform has software monitoring services built in. Information security is reviewed on a monthly basis. The company’s MD (Managing Director) is the designated individual responsible for information security.
All of Ctrl Hub’s operational data (held in the operational database) is encrypted to AES-256 encryption standards. We maintain strong referential integrity within the operational database, including proper referential cascading and indexing.
Ctrl Hub uses Probely to penetration test our system. This tests a wide range of attack vectors. We can provide a penetration test and associated report upon the provision and implementation of Ctrl Hub and it’s associated infrastructure for the client.
Ctrl Hub’s disaster recovery testing procedures are inline with our ISO27001 management system policies. These briefly include ad-hoc termination of instances and triggering of failover processes between compute / data replicas in the various physical locations.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The company has a formal change control procedure using SCM technologies. In conjunction with this the company utilises GitHub software to monitor development progress.
The company has a standalone Project Security Policy which governs how configurations, including security configurations, of hardware, software, services and networks are established, documented, implemented, monitored and reviewed. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We carry out weekly penetration tests using Probely. We also employ a range of monitoring software to our platform, such as Falco (CNCF) and Grafana. Any other threats would be raised in the weekly management meeting and addressed as such.
For patch deployment we operate on a Hotfix basis, deploying extremely fast turnaround fixes. Depending on the issue, these fixes are deployed without causing downtime. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Because we have a containerised workload, our applications deploy in read only mode. That limits the potential attack surface. Any attempts within the cluster to gain privileged access are reported through Falco. Because we use the public cloud and rely on the vendor to manage the underlying node infrastructure, there is no requirement to check for malware within the stack.
Responding to an incident where access has been made possible would involve shutting down the affected workload and starting the audit process.
Incidents are reported in real time and actioned immediately. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Responding to an incident where access has been made possible would involve shutting down the affected workload and starting the audit process.
Incidents are reported in real time and actioned immediately.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our cloud application and digitised workflows reduce the travel miles needed to manage site and fields operations by providing real time status information to any online device, so reducing the need to be on site.
Pricing
- Price
- £15 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We provide access to trial our application for a defined period, usually a maximum of 2 weeks.