EDGEALERT Panic Button and Business Intelligence Solution
EDGEALERT was developed to meet the needs of Primary Care following the removal of EMIS's panic button feature. EDGEALERT is the more affordable answer to GP practices' panic button needs. Our option helps deal with emergency situations, reduces the risk to personal safety and supports the NHS Zero Tolerance Policy.
Features
- User friendly Panic Button is displayed on the user’s desktop.
- Fully compliant with Windows 10 and 11.
- Supports all clinical systems including: EMIS, TPP/SystmOne and Vision.
- Works on any Wi-Fi.
- Developed in .NET7.
- Hosted in Microsoft Azure - UK South Data Centre.
- Compatible with Software Deployment Systems such as SCCM, Cetero, Intune,etc.
- Functionality supports both PCs/laptops onsite and offsite for remote users.
Benefits
- EDGEALERT is easily accessible through a Hover Desktop Button icon.
- Responder Feature means simultaneous raising and responding to multiple alerts.
- Real-Time User Location Visibility (who is logged in - room/location)
- Incident Reporting: supports CQC serious incident reporting.
- Digital Asset Audit: Real-Time Serial No, Make/Model & IP address.
- EDGEALERT can be preconfigured with all practice locations.
- Software available with on premise and Wi-Fi/remote/VPN Networks Services.
Pricing
£195.00 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 6 4 0 6 6 3 3 6 4 7 7 0 7 7
Contact
EDGEBITS
Ryan Edridge
Telephone: 07800609391
Email: Ryan.Edridge@edgebits.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No.
- System requirements
- Window 10/11 Operating Sytem
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are normally within 24hrs Monday to Friday, excluding Bank Holidays.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Our Contract/SLA includes the delivery of a 24 hour response time covering Monday-Friday (excluding bank holidays). Status updates are provided every 4, 8 and 16 hours depending on the severity of the incident i.e. Minor, Major or Critical. This is included as part of the core solution offering. Technical account management, and access to support engineers, are included within our standard support offering. 24/7 support is available at an additional cost.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We follow an installation process which includes a document framework that defines every customer's solution integration requirements. This framework outlines how our team will work with our customers to achieve a successful installation. Part of our approach to sucessful installation and usage includes training on the basic operations of the system so that all our customers can take full advantage of our technology. Training can be remote, face to face and can include personalised documentation. We also provide each customer with a trouble shooting guide with useful hints and tips for resolving the most common post installation queries.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- The data store is reporting data only e.g. Fire drill or asset information and users can export their data locally at any time to a word document.
- End-of-contract process
-
• While in Contract = User data is deleted every 24 hours. Report Data is regularly updated in Realtime so will be stored until end of contract or unless requested to be deleted.
• End Of Contract = 30 days on termination of Contract.
• On contract termination we initiate a deletion process that utilises Azure's deletion mechanisms. For Azure Blob Storage, we first enable a soft delete, where the data is marked for deletion and is recoverable for a set retention period, which complies with our operational and legal requirements. After this period, or if an immediate hard delete is requested and legally permissible, we proceed with a hard delete action.
Azure's hard delete ensures that the data is permanently removed from the storage media. Additionally, we follow Azure's best practices for purging data from the recycle bin and clearing all system caches that may contain data remnants. The deletion process is documented and auditable to comply with our data governance policies.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- All our services run through the Microsoft azure services so are full dynamically scalable in terms of resource requirements.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users export their data by clicking export from within the application
- Data export formats
-
- CSV
- Other
- Other data export formats
- Word
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our data is hosted in the Microsoft Azure -UK Data Centre that hosts the IT infrastructure for our Software as a Service (SaaS) solution and which guarantees 99.95% up time. In addition, Microsoft put high availability into their hosting infrastructure and application architecture that typically delivers above 99.95% availability from a SaaS perspective. Our solution also provides offline availability.
- Approach to resilience
- Our Software as a Service (SaaS) solution has been designed to ensure high availability. We use Microsoft Azure resilience services, Load Balancing to ensure we deliver both high availability and Disaster Recovery. Additional information is available upon request should it be required.
- Outage reporting
- In the unlikely event of a service outage, our internal monitoring systems will alert our support team to respond and escalate as necessary. Our customers will be notified of outages through the use of phone, text and/or email.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
-
• Microsoft Azure Active Directory Premium Subscription with Advance Security Features
• 2FMA - With Conditional Access for all Admin accounts
• Directory Identity Protection - Used for monitoring Admin accounts
• WAF Application Gateway - Prevention with OWASP 3.1
• Antivirus - Microsoft Defender for Cloud
• Azure Backup – Operational with Versioning
• Azure Security Benchmark – Fully Compliant
• Local Software requires domain authentication. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Our Information Security Governance aims to set strategic measures to protect our organisation’s information.
- Information security policies and processes
-
Our Information Security Governance approach aims to set the strategic measures necessary to protect our organisation’s and our customers' information and to ensure that it is protected from a loss of confidentiality, integrity and availability.
Our Information Security Policy details the requirements and responsibilities for maintaining the security of information within EDGEBITS.
The purpose of this data security policy is to protect restricted, confidential or sensitive data from loss, to avoid reputation damage and to avoid adversely impacting our customers. The protection of data is a critical business requirement whilst also ensuring flexibility to access data and to work effectively.
It is supported by other policy documents including: Data Protection By Design & Default, Privacy Policy, Data Quality Policy, Record Keeping Policy, IG Security Training Policy and by other guidance documents which support putting these policies into practice day-to-day
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configuration and change management is managed and achieved using our internal governance processes. Our configuration management processes focus on managing the configurable items and the state of the system while our change management processes focus on managing the changes that affect the configurable items and the system. These processes include creating, authorising, monitoring and implementing changes within our secure software development lifecycle. All changes are reviewed and assessed for potential security impacts and approved depending on the outcome of the security impact assessments.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- All of our infrastructure is patched on a monthly cycle in line with best practice. Our development team use OWASP vulnerability assessment and threat modelling. We also use a variety of Cyber best practices within our day to day running of the business, which includes receiving and implementing as necessary updates from the National Cyber Security Centre. In addition, we have scheduled vulnerability scanning with our Cyber Partner, Dionach, to ensure we keep our patches and security fully updated at all times.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All breaches and/or suspected breaches and other information security incidents are reported to the Managing Director and DPO immediately. Depending on the size and seriousness of the breach, data is isolated to facilitate forensic examination and an investigation into the circumstances surrounding the incident carried out. Investigations may include examination of our systems and procedures and could lead to a recommendation to inform data subjects about a security breach incident. Findings are reported to the Managing Director and DPO. Our risk register and relevant policies are updated if required to reduce the risk of a similar incident re-occurring.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management framework defines the roles and responsibilities and processes for the detection, escalation, response and communication of incidents. Incident reporting forms are available and must be completed by the relevant staff member. Incidents are recorded in the Security Incident Log and investigated to establish their cause and impact with a view to avoiding similar events. Our team monitors the system and classifies, escalates and coordinates the response as per the documented procedures.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our company promotes the use of public transport by the team when possible. We also encourage working from home to reduce the impact of transport on the environment. We look to procure sustainable products from our suppliers. We encourage and promote the use of recycled materials wherever possible.Covid-19 recovery
EDGEBITS recognises the impact that COVID-19 has had on the individual, their personal circumstances and the wider economy.
EDGEBITS will work with its partners, customers and team wherever possible to support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
Our company aims to recruit locally whenever possible and will identify possible opportunities for employment with in the company for those left unemployed as a result of the pandemic. The company supports initiatives that promote mindfulness and positive mental and physical wellbeing, which are particularly important for recovery from COVID-19
During the pandemic EDGEBITS actively encouraged working from home and made every effort to support staff and improve their working conditions during this time. Post pandemic the company continues to encourage the team by promoting a hybrid work model which also supports a better life balance for the team.Tackling economic inequality
As an SME EDGEBITS recognises the importance of supporting small local suppliers of services to foster local business development and growth. It is often difficult for SMEs to fully participate in and benefit from national government frameworks. Our approach is to collaborate with other similar organisations whenever possible so that we can share skills and experiences and to develop effective partnerships so that we are better able to meet the needs of our clients and fully participate in government frameworks.
We believe that it is vitally important to recruit staff locally where ever possible to support local economic and environmental sustainability.Equal opportunity
EDGEBITS is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally. We believe that having a diverse workforce is essential for the development of a healthy and successful company.
EDGEBITS takes all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.
We also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability.
EDGEBITS does not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with EDGEBITS.
EDGEBITS has a zero-tolerance approach to modern slavery, and we are committed to acting ethically and with integrity in all our business dealings and relationships and to implementing and enforcing effective systems and controls to ensure modern slavery is not taking place anywhere in our own business or in any of our supply chains.Wellbeing
Our company supports initiatives that promote mindfulness and positive mental and physical wellbeing amongst our team. We encourage staff to work remotely whenever possible in a bid to help them to achieve a better work life balance. We routinely get together to socialise and for team building activities. Fostering a strong team spirit is a vital part of our company's approach to company development.
Pricing
- Price
- £195.00 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We can offer a free trial of EDGERALERT so that customers can experience the benefits of our product in a 'live' environment. We are very happy to discuss this option with our customers and further details can be made available on request.