Sentinel PiNG
An independent communication and collaboration tool designed to replace social media chat applications. It is a corporate chat application that maintains records of all chats on central cloud servers for compliance with point to point encryption and encryption of stored chats. Used by senior management and crisis management teams.
Features
- Familiar chat interface but no external data collection
- Tamper-proof audit log of chats and file sharing
- Real-time anti-virus scanning of any files uploaded
- Encrypted over the wire and encrypted at rest.
- Communicate in real-time and share critical files
- Permission controls to set up new channels
- Single-Tenant Architecture for best cyber protection
- Use with modern web browsers, apps on iOS and Android
- Contact directory ring-fenced and GDPR compliant
- Biometric ID to access apps
Benefits
- Share documents, videos and images safely - virus scanned.
- Collaborate and solve problems remotely from any device
- Create and close channels. All interactions logged
- Connect your team with SMS & calls from the directory
- See push notifications for new chats
- Camera to capture situations and share securely
- Backup system works when your servers are down
- Avoid staff mixing work and private messaging
- Improve decision making
- Simple on boarding and intuitive use.
Pricing
£950 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 5 6 0 1 2 2 0 8 3 2 2 5 8 4
Contact
YUDU Sentinel
Charlie Stephenson
Telephone: +44 7960252055
Email: enquiries@sentinelresilience.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- No.
- System requirements
-
- Access via Microsoft Edge browser and other modern browsers
- IOS 15 and/or Android 6 or higher (option apps)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are set out in the Sentinel Service Level Agreement and deals with critical responses with a 2 hr 24/7 response time and tiered for lower level responses. Automatic alerts are 24/7. General queries about the system and training plans are dealt with within the same working day. We currently do not offer support for training and general enquiries at weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Undertaken by Hubsopt
- Onsite support
- Yes, at extra cost
- Support levels
-
Response times are set out in the Sentinel Service Level Agreement and deals with critical responses with a 2 hr 24/7 response time and tiered for lower level responses. Automatic alerts are 24/7. (Full detail available)
All clients have an account manager who can help them with technical issues and a further support from the Technical Support Team. This customer support team is UK-based and highly knowledgeable. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The onboarding process will train any customer operatives The system will be fully tested with the Client's environment before release. The Apps can be downloaded from the iOS and Google Play Store with special credentials to gain access. This is a fully developed process and is designed to get clients operational in the shortest possible time.
Sentinel PiNG is designed from the start to be intuitive and easy to use and the user interface kept as simple as possible. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- As a downloadable csv file or agreed secure digital media.
- End-of-contract process
- At the end of the contract all outstanding licence and usage fees due up to the termination date are settled by the customer. YUDU will accept instructions from the client at no cost to the customer for the return or destruction of any content, intellectual property and remove any apps installed on 3rd part sites that have been managed by YUDU.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- All the functions that are available on the desktop is able to be accessed on any mobile device. The Console is fully responsive are resizes to the mobile device. Incidents can be managed entirely from any remote location. The mobile app has a library of critical documents and contacts that can be accessed off-line when no signal is available. Access can be controlled with biometric authentication.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
The mobile app displays documents, downloads, contacts and messages in a simple user interface.
The backend dashboard offers that and more analytics, permissions control, contact/document groups etc through a simple to use platform. - Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- The app has been tested using the iOS and Android accessibility features.
- API
- Yes
- What users can and can't do using the API
-
Access to the API requires a full Sentinel system which will be available from a url provided to you by YUDU at the time of deployment.
Through our API, you can:
Requesting the App directory
Creating a user
Creating a contact
Creating a group
Assigning a user to a group
Getting a groups users
Assigning a contact to a group
Requesting a list of documents
Assigning a document to a user
Getting a users documents
Creating a broadcast
Sending a broadcast
Checking recipients and broadcast status
Checking system activity
Some API activities require an API token for access. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The Chat Application is available in a white-labeled version with customise screens at the time of set up.
Scaling
- Independence of resources
- Single-tenant server architecture means that each instance of Sentinel is entirely separate to other clients' and our own servers and therefore any disruption, outages, cyber attacks on other clients will not impact other clients. CPU monitoring and alerts on all systems to ensure server performance is adequate for each client.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
A full audit can be provided of:
- All messages/broadcasts sent (in-app, email, SMS)
- Telephony, minutes used, call made, files storage MB
- Optional voice recordings of conference calls.
- All actions taken by staff times-stamped.
- Responses to yes/no questions broadcasted and other inbound communications, including voicemails
-Chat users
No of user and contacts on the system - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- As a downloadable csv file. Users can also access their account through a login page, enter their own data and choose if they want to make it accessible to others in their organisation or just admins.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We can guarantee a 99.99% SLA for Sentinel .The SLA allows for financial reimbursement if the uptimes are not complying with the SLA terms.
- Approach to resilience
-
Our server architecture is single-tenant, making it as independent and secure as possible. Servers are mirrored with redundant servers in multiple zones with automatic fail-over. Data is backed daily. The database can be rolled back at 5 minute intervals.
For Chat Channel users, documents and action cards video and any file type can be shared ensuring that people have their own copy of important information. - Outage reporting
-
1. When downtime or service degradation that will negatively affect sentinel or publisher clients is detected, initial updates will be provided on the Sentinel status page and Sentinel operations twitter account. The operations team will update the hotline ticker-tape status through our internal sentinel system which will be embedded on the yudu status page webpage. Support@Sentinelresilience.com com email address should customers wish to raise a support ticket to discuss the issue further.
2. If system is affected for longer than 2 hours, we initiate an outward communication from the sentinel system to the affected group via email and SMS channels.
3. We keep communicating updates on system outage every couple of hours from then on with progress on remediation.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- Biometric ID
- Access restrictions in management interfaces and support channels
- Sentinel is a cloud based service that has multiple levels of management access controlled by permissions and strong password policies. A restricted and named number of security cleared YUDU developers have admin access to maintain and fix issues on the system.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- Biometric ID
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- Originally accredited on 6th September 2019, and renewed in 2020,2021,2022 and 2023
- What the ISO/IEC 27001 doesn’t cover
- A.10.1 Cryptographic controls: A.10.1.1: Policy on the use of cryptographic controls A.10.1.2: Key management A.11 Physical and environmental security: A.11.1.5: Working in secure areas A.11.1.6: Delivery and loading areas A.14.2 Security in development and support processes A.14.2.7: Outsourced development A.18.1 Compliance with legal and contractual requirements A.18.1.5: Regulation of cryptographic controls
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 01/01/2016
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- We are with AWS, who are CSA STAR accredited.
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Data privacy is managed by the Data Protection Office who reports directly to the CEO. Security Policies are reviewed quarterly by the Board and updated using version control system. All updated policies are available to employees in the company app. Penetration testing is conducted at least every 12 months.
The INFOSEC policies are created and enforced by the Yudu Information Management Security Group which forms part of our ISO 27001 audit. Quarterly Business Continuity Plan tests are conducted quarterly and reports generate with lessons learned. YUDU runs an online security incident reporting system and change management system which are reviews on a 6 month basis.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- The processes are set out in the Sentinel Secure Development Policy. Any change to the configuration of the system requires change management authorisation and any changes are logged on the online change management system. Software releases go through an automated test suite including DAST and SAST tools followed by manual interface test and peer review. Software releases are made every 2 months on average.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
AWS Guard Duty is deployed across the Sentinel server estate which monitors unusual activity. We use AWS Cloudtrail to monitor AWS access and usage with the requisite alerts.
Github's Dependabot tool is used to alert for any known vulnerabilities.
Patches are deployed with assessed critical patched are deployed immediately.
Laravel Enlightn which is used in the internal development environment.
Potential threats are also reviewed as part of the ISMS team. Cyber threats are assessed and advice from multiple sources including our cyber consultants network and the National Cyber Security Centre. Critical patches are deployed within 24hrs of notification or discovery. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our development team run network scans which may identify a potential compromise. The data is encrypted at rest and access is by 2 factor authentication: any unusual activity including data transfer is monitored. When a potential compromise is identified, the in-house YUDU Sentinel crisis management system is activated and used to immediately alert the incident team and set up a conference call with the response team. The next steps and responsibilities are decided on the call and the actions monitored on the system throughout the incident. Response times vary from minutes for a cyber attack to 4 hours.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The YUDU Incident Management Process document sets out the framework of the incident response. Our in-house YUDU Sentinel system is used to alert staff of a problem and check the status of all employees. The actions taken next will follow the protocols set out in the IMP document and Business Continuity Plan. Staff have off-line access to through our Sentinel App. The senior leadership team communicate next steps through Sentinel communication channels.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Chat Channels if a paperless system of communications saving trees and energy. It is hosted on data centres that will be running on 100% renewable energy by 2025
Pricing
- Price
- £950 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 1 month trial of unlimited channels