Skip to main content

Help us improve the Digital Marketplace - send your feedback

EDGEBITS

EDGEALERT Panic Button and Business Intelligence Solution

EDGEALERT was developed to meet the needs of Primary Care following the removal of EMIS's panic button feature. EDGEALERT is the more affordable answer to GP practices' panic button needs. Our option helps deal with emergency situations, reduces the risk to personal safety and supports the NHS Zero Tolerance Policy.

Features

  • User friendly Panic Button is displayed on the user’s desktop.
  • Fully compliant with Windows 10 and 11.
  • Supports all clinical systems including: EMIS, TPP/SystmOne and Vision.
  • Works on any Wi-Fi.
  • Developed in .NET7.
  • Hosted in Microsoft Azure - UK South Data Centre.
  • Compatible with Software Deployment Systems such as SCCM, Cetero, Intune,etc.
  • Functionality supports both PCs/laptops onsite and offsite for remote users.

Benefits

  • EDGEALERT is easily accessible through a Hover Desktop Button icon.
  • Responder Feature means simultaneous raising and responding to multiple alerts.
  • Real-Time User Location Visibility (who is logged in - room/location)
  • Incident Reporting: supports CQC serious incident reporting.
  • Digital Asset Audit: Real-Time Serial No, Make/Model & IP address.
  • EDGEALERT can be preconfigured with all practice locations.
  • Software available with on premise and Wi-Fi/remote/VPN Networks Services.

Pricing

£195.00 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Ryan.Edridge@edgebits.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 6 4 0 6 6 3 3 6 4 7 7 0 7 7

Contact

EDGEBITS Ryan Edridge
Telephone: 07800609391
Email: Ryan.Edridge@edgebits.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No.
System requirements
Window 10/11 Operating Sytem

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are normally within 24hrs Monday to Friday, excluding Bank Holidays.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our Contract/SLA includes the delivery of a 24 hour response time covering Monday-Friday (excluding bank holidays). Status updates are provided every 4, 8 and 16 hours depending on the severity of the incident i.e. Minor, Major or Critical. This is included as part of the core solution offering. Technical account management, and access to support engineers, are included within our standard support offering. 24/7 support is available at an additional cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We follow an installation process which includes a document framework that defines every customer's solution integration requirements. This framework outlines how our team will work with our customers to achieve a successful installation. Part of our approach to sucessful installation and usage includes training on the basic operations of the system so that all our customers can take full advantage of our technology. Training can be remote, face to face and can include personalised documentation. We also provide each customer with a trouble shooting guide with useful hints and tips for resolving the most common post installation queries.
Service documentation
Yes
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction
The data store is reporting data only e.g. Fire drill or asset information and users can export their data locally at any time to a word document.
End-of-contract process
• While in Contract = User data is deleted every 24 hours. Report Data is regularly updated in Realtime so will be stored until end of contract or unless requested to be deleted.

• End Of Contract = 30 days on termination of Contract.

• On contract termination we initiate a deletion process that utilises Azure's deletion mechanisms. For Azure Blob Storage, we first enable a soft delete, where the data is marked for deletion and is recoverable for a set retention period, which complies with our operational and legal requirements. After this period, or if an immediate hard delete is requested and legally permissible, we proceed with a hard delete action.
Azure's hard delete ensures that the data is permanently removed from the storage media. Additionally, we follow Azure's best practices for purging data from the recycle bin and clearing all system caches that may contain data remnants. The deletion process is documented and auditable to comply with our data governance policies.

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
All our services run through the Microsoft azure services so are full dynamically scalable in terms of resource requirements.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users export their data by clicking export from within the application
Data export formats
  • CSV
  • Other
Other data export formats
Word
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our data is hosted in the Microsoft Azure -UK Data Centre that hosts the IT infrastructure for our Software as a Service (SaaS) solution and which guarantees 99.95% up time. In addition, Microsoft put high availability into their hosting infrastructure and application architecture that typically delivers above 99.95% availability from a SaaS perspective. Our solution also provides offline availability.
Approach to resilience
Our Software as a Service (SaaS) solution has been designed to ensure high availability. We use Microsoft Azure resilience services, Load Balancing to ensure we deliver both high availability and Disaster Recovery. Additional information is available upon request should it be required.
Outage reporting
In the unlikely event of a service outage, our internal monitoring systems will alert our support team to respond and escalate as necessary. Our customers will be notified of outages through the use of phone, text and/or email.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
• Microsoft Azure Active Directory Premium Subscription with Advance Security Features
• 2FMA - With Conditional Access for all Admin accounts
• Directory Identity Protection - Used for monitoring Admin accounts
• WAF Application Gateway - Prevention with OWASP 3.1
• Antivirus - Microsoft Defender for Cloud
• Azure Backup – Operational with Versioning
• Azure Security Benchmark – Fully Compliant
• Local Software requires domain authentication.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our Information Security Governance aims to set strategic measures to protect our organisation’s information.
Information security policies and processes
Our Information Security Governance approach aims to set the strategic measures necessary to protect our organisation’s and our customers' information and to ensure that it is protected from a loss of confidentiality, integrity and availability.

Our Information Security Policy details the requirements and responsibilities for maintaining the security of information within EDGEBITS.

The purpose of this data security policy is to protect restricted, confidential or sensitive data from loss, to avoid reputation damage and to avoid adversely impacting our customers. The protection of data is a critical business requirement whilst also ensuring flexibility to access data and to work effectively.

It is supported by other policy documents including: Data Protection By Design & Default, Privacy Policy, Data Quality Policy, Record Keeping Policy, IG Security Training Policy and by other guidance documents which support putting these policies into practice day-to-day

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration and change management is managed and achieved using our internal governance processes. Our configuration management processes focus on managing the configurable items and the state of the system while our change management processes focus on managing the changes that affect the configurable items and the system. These processes include creating, authorising, monitoring and implementing changes within our secure software development lifecycle. All changes are reviewed and assessed for potential security impacts and approved depending on the outcome of the security impact assessments.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All of our infrastructure is patched on a monthly cycle in line with best practice. Our development team use OWASP vulnerability assessment and threat modelling. We also use a variety of Cyber best practices within our day to day running of the business, which includes receiving and implementing as necessary updates from the National Cyber Security Centre. In addition, we have scheduled vulnerability scanning with our Cyber Partner, Dionach, to ensure we keep our patches and security fully updated at all times.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All breaches and/or suspected breaches and other information security incidents are reported to the Managing Director and DPO immediately. Depending on the size and seriousness of the breach, data is isolated to facilitate forensic examination and an investigation into the circumstances surrounding the incident carried out. Investigations may include examination of our systems and procedures and could lead to a recommendation to inform data subjects about a security breach incident. Findings are reported to the Managing Director and DPO. Our risk register and relevant policies are updated if required to reduce the risk of a similar incident re-occurring.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management framework defines the roles and responsibilities and processes for the detection, escalation, response and communication of incidents. Incident reporting forms are available and must be completed by the relevant staff member. Incidents are recorded in the Security Incident Log and investigated to establish their cause and impact with a view to avoiding similar events. Our team monitors the system and classifies, escalates and coordinates the response as per the documented procedures.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • NHS Network (N3)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our company promotes the use of public transport by the team when possible. We also encourage working from home to reduce the impact of transport on the environment. We look to procure sustainable products from our suppliers. We encourage and promote the use of recycled materials wherever possible.

Covid-19 recovery

EDGEBITS recognises the impact that COVID-19 has had on the individual, their personal circumstances and the wider economy.

EDGEBITS will work with its partners, customers and team wherever possible to support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.

Our company aims to recruit locally whenever possible and will identify possible opportunities for employment with in the company for those left unemployed as a result of the pandemic. The company supports initiatives that promote mindfulness and positive mental and physical wellbeing, which are particularly important for recovery from COVID-19

During the pandemic EDGEBITS actively encouraged working from home and made every effort to support staff and improve their working conditions during this time. Post pandemic the company continues to encourage the team by promoting a hybrid work model which also supports a better life balance for the team.

Tackling economic inequality

As an SME EDGEBITS recognises the importance of supporting small local suppliers of services to foster local business development and growth. It is often difficult for SMEs to fully participate in and benefit from national government frameworks. Our approach is to collaborate with other similar organisations whenever possible so that we can share skills and experiences and to develop effective partnerships so that we are better able to meet the needs of our clients and fully participate in government frameworks.
We believe that it is vitally important to recruit staff locally where ever possible to support local economic and environmental sustainability.

Equal opportunity

EDGEBITS is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally. We believe that having a diverse workforce is essential for the development of a healthy and successful company.

EDGEBITS takes all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.

We also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.

EDGEBITS does not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with EDGEBITS.

EDGEBITS has a zero-tolerance approach to modern slavery, and we are committed to acting ethically and with integrity in all our business dealings and relationships and to implementing and enforcing effective systems and controls to ensure modern slavery is not taking place anywhere in our own business or in any of our supply chains.

Wellbeing

Our company supports initiatives that promote mindfulness and positive mental and physical wellbeing amongst our team. We encourage staff to work remotely whenever possible in a bid to help them to achieve a better work life balance. We routinely get together to socialise and for team building activities. Fostering a strong team spirit is a vital part of our company's approach to company development.

Pricing

Price
£195.00 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We can offer a free trial of EDGERALERT so that customers can experience the benefits of our product in a 'live' environment. We are very happy to discuss this option with our customers and further details can be made available on request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Ryan.Edridge@edgebits.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.