Sypro Risk Manager
Sypro RM - Sypro Risk Manager - a solution for identifying and ensuring an organisations' assets/documents and procedures are compliant, managing statutory compliance (inc. asbestos & legionella) and assessing and mitigating risk (assessing likelihood .v. impact) - links to Sypro Contract Manager-Sypro CM, NEC, NEC3, NEC4 contract management, social value
Features
- Transparent, top down view of organisational estate & asset structure
- Assessing, recording and managing compliant, compliance and organisational risk
- Ensuring consistent health & safety policies across the organisation
- Simple processes for ensuring statutory compliance
- Maintaining accident, incident and near misses registers
- Managing your EU and Non-EU supply chain compliance
- Visibility and control of all externally held contracts and documents
- Easy to manage admin and preference settings
- 360º view on all organisational estates and assets
- Easy to use, simple to implement graphical governance tools
Benefits
- Safeguarding your organisations' assets, stakeholders and staff
- Ensuring your organisation is legally compliant
- Prevent expensive auto-contract renewals and rollovers
- Give the organisation an effective and engaged supply chain
- Simple and full transparent governance
- Risks are identified earlier and managed more robustly
- A single repository for all organisational policies and procedures
- Configurable and easy to use dashboard based reporting tools
- Time and date stamped actions to provide full audit trail
- Promotes responsibility and accountability across the organisation
Pricing
£500 to £4,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 5 2 1 5 4 7 4 0 4 2 1 0 0 7
Contact
Sypro Management Limited
Simon Hunt
Telephone: 07970699193
Email: simon.hunt@sypro.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- Our solution is cross browser compatible, industry standard and requires no additional plug-in software for operation. All planned maintenance and enhancement releases are scheduled for testing and deployment outside of standard working hours. All users are notified of scheduled maintenance a minimum of 30 days in advance.
- System requirements
-
- Access to the internet (mobile or network)
- Up to date and current web browsers
- No additional software plug-ins are required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Monday - Friday 08:30 - 17:00 - acknowledged immediately, actioned within 60 minutes and resolved within 8 working hours.
Weekend/Bank Holidays - acknowledged immediately, actioned and resolved next working day.
Critical or complete system downtime would be actioned 24/7. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- 1st and 2nd Line support is provided as part of our licence fee and does not carry an additional charge. In the unlikely event of on-site being required, our Operations Manager would either present or delegate this task to a member of their Technical Team to resolve any issues. This event would be charged as per our SFIA rate card. It is worth mentioning that we have never provided on site technical support as this has never been requested by any Client.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We have a specific implementation (on-boarding) process, that includes documentation requirements, excel (.csv) uploads and off/on-line tools.
Full training is available either 1:1 or a 'train the trainer' model.
An on-line 'knowledge-base' including documentation, FAQs etc is provided with the subscription. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
-
- In-applicaiton Knowledge-Base
- Video and e-Learning materials
- End-of-contract data extraction
-
Sypro Total Risk Manager, manages the organisations complete document policy, information and all relevant actions and asset details. Users can download all relevant documents (in any standard format) and either archive or retain these for their own use should they decide to terminate the use of our software solution.
Where a client requires assistance in doing this we will provide all necessary support. - End-of-contract process
-
When a termination date has been agreed, and end of contract process that agrees responsibilities for both parties will exchanged and actioned.
Our software solution is a pay as you go (PAYG) SaaS model therefore payments finish as the contract determines and there are no additional penalties upon termination.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Optimised for mobile and handheld screen sizes and device functionalities.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
- Customers can brand/personalise the access portal. Reports and dashboards can also be modified to meet specific organisational or people requirements. Any requests are co-ordinated through the customer nominated contact. Categories and drop down lists are pre-set but can be changed to suit.
Scaling
- Independence of resources
- Our hosting solution with Amazon Web Services (AWS) provides automatic and instantaneous upscaling of server requirements in-line with users access demands. During busy periods our hosting solutions maximise their architecture to ensure our users notice no difference in system performance.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Customers can brand/personalise the access portal. Reports and dashboards can also be modified to meet specific organisational or people requirements. Any requests are co-ordinated through the customer nominated contact.
- Data export formats
-
- CSV
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- All of our solutions are provisioned on an availability of 99.5% uptime. In a scenario where there has been an impactful outage, refunded downtime will be identified and paid back. This would exclude a scenario where withdrawal of service is planned due to system upgrade or maintenance. In these scenarios we provide all users with a contracted minimum of 30 days prior notice. In addition, these outages for essential work/upgrade are performed at weekend/bank holidays to reduce project impact.
- Approach to resilience
- All data is held within a recognised, industry leading datacentre supported by robust Disaster Recovery solutions and full system backups every 15 minutes throughout the day (24 hours). Further information is available upon request.
- Outage reporting
- Any planned outages are scheduled and reported by: 1. In browser notification dashboard 2. User email alerts 3. Direct communication to organisational lead person
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access to company master accounts are restricted to department heads and the Board of Directors. This includes hosting provision, system configuration portals and software solution databases.
These processes are protected by restricting access to specific IP addresses within our Head Office, doing this prevents any accidental or deliberate access attempts.
All support channels can only be accessed by defined client users and the appropriate internal support manager. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 7th |March 2024
- What the ISO/IEC 27001 doesn’t cover
- Exclusions from the Statement of Applicability include clauses 11.1.6 and 11.2.2
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have always adopted best practise and have established and robust processes in place to ensure good Information Security governance. Sypro Management Limited has implemented ISO27001 to formally support information security requirements for both public and private sector clients.
- Information security policies and processes
- Annually the company handbook is reviewed by the Board of Directors with all agreed amendments being ratified. All department leads are equipped with a current company handbook outlining all company processes and procedures. Allied to this the on- boarding process of new starters focusses on information security and the established processes we have in place. At monthly company board meetings, quality, H&S and information security policies are considered, discussed and where appropriate modifications are agreed and communicated to all staff. A decision record and key event board minutes are recorded.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following:
1. Full visibility of the status, location and configuration of all service components.
2. Life cycle road map to ensure all components are tracked.
3. Our Agile development methodology ensures that changes/modifications when reviewed always consider potential security impacts. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following:
1. Possible threats, vulnerabilities or related techniques are considered thoroughly through regular external conferences, peer learning and domain knowledge; this includes severity and priority.
2. Our Agile development methodology assesses vulnerabilities as part of the process, and we ensure any potential vulnerabilities are considered and appropriate preventative measures are set in place. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following:
1. Hardware and software alarm monitoring tools notify the development team of any suspicious network activity.
2. The development team can quickly react and prioritise accordingly and where necessary relevant action are immediately executed and any stakeholders informed. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following:
1. There is robust help desk and issue management/tracking that ensures priorities are flagged and actioned, and customers have full transparency.
2. Common help desk issues are responded to quickly and standard responses are provided, and more complex issues are fully researched prior to issuing of responses.
3. SLA's are timely and clearly communicated.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Provides a simple mechanism to reduced organisational risk and therefore promote positive mental health and wellbeing.
Pricing
- Price
- £500 to £4,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- This is a version of our existing system that the user is given trial access to for 2 weeks (max). Access to the relevant modules are granted on request and setup session is required. Data uploaded into the system pretrial is optional on request