Digital Identity Management
Digital Identity Management. Businesses must synchronise customer information across different systems and applications to create a single digital identity for every customer. Only then can they deliver an uninterrupted omnichannel
customer experience that is seamless, smooth and secure.
Features
- Single Platform
- Biometrics
- Multi Factor Authentication
- Contextual Signal Collection
- User Driven Analytics
Benefits
- Time to market decreased
- Integrated registration
- Secure registration
- Feature rich applications
Pricing
£0.04 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 1 4 0 7 4 5 4 8 3 7 8 5 8 9
Contact
GCI Network Solutions Ltd
Mike Ayres
Telephone: 03450030000
Email: tenders@nasstar.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- N/a
- System requirements
-
- Windows PCs-Windows 10, Chrome V76, Firefox ESR68, Edge V42
- Mac OSX, Chrome V76, Firefox ESR68
- Chromebook-Chromium V73, Chrome V76
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 15 minute response time
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Faults support is obtainable 24 hours 7 days a week
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Nasstar provide a range of solution documentation, onsite & online training and implementation services for customers. Nasstar onboards customers by gathering all key information required to bring the service in-life. Service information and supporting documentation is developed and distributed to the customer as part of the onboarding process. Service documentation is provided following user acceptance testing.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The DIM allows enterprise Customers to export User-Generated Information using APIs provided with the Service (except for recordings). There are several ways enterprise Customers and consumer users may export their personal data from the platform including CSV reports and API's.
- End-of-contract process
- Upon termination or expiration of subscription, customer data is subject to the following conditions: - If requested by the customer, the data is exported to an industry standard format and shared with the customer; - A portion of the data or meta data that is required for billing and audit purposes is retained and all other data is securely deleted from the primary and backup locations
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/a
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
The DIM is accessed through a Web browser. The Portal provides access to WCC modules that enable authorised users to view real-time and historical contact centre data, silently monitor interactions (calls, chats, emails) directed to destination sites, create agent accounts and other contact centre resources, and control
contact treatment and distribution by creating and editing scheduled contact routing strategies and team capacity strategies. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- N/a
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Dedicated service
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Forgerock
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There are several ways enterprise Customers and consumer users may export their personal data from the platform including CSV reports and API's
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Standard availability level is 99.99% or above
- Approach to resilience
- Available upon request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The measures implemented in order to manage and restrict access can be divided into six sub-categories: 1) Physical Access Control; 2) Logical Access Control; 3) Access Administration; 4) Authentication and Authorisation; 5) Data Access Control; 6) Data Transfer.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- United Registrar of Systems
- ISO/IEC 27001 accreditation date
- 14/06/2021
- What the ISO/IEC 27001 doesn’t cover
- The Registered Scope is as follows: Information security management system for the delivery of communications and associated technologies, products and services provided by the Group. The scope also covers the supporting functions within Nasstar Group Services and activities carried out at Data Centres and Switch Sites throughout the UK including Hull, Reading, Bristol and Leeds in accordance with the Group Statement of Applicability Issue 7, dated December 2014.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- NCC Group
- PCI DSS accreditation date
- 12/12/2016
- What the PCI DSS doesn’t cover
- Our certification covers requirements 9 &12 for our Reading and Global Switch data centres and our HMRC Autopayments service. PCI DSS compliance is designed, built and assessed on a service by service basis. Nasstar is experienced in providing consultancy to help customers to design and deliver PCI DSS compliant solutions on cloud platforms.
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO27018
- PSN
- ISO20000
- ISO27017
- CISPE Code of Conduct Certification
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Nasstar's approach to Security forms part of our overall Integrated Business Systems Management scheme. The Company Secretary is responsible at Board level for Information Security and ensuring that our ISO/IEC 27001 accreditation is maintained and enforced. The Information Security policy is a top down approach within Nasstar with Business Areas having responsibilities for Information, Network and Customer Data relating to their operational areas. The policies and procedures define access restrictions to all of our IT systems, networks and stored data. The practical policies and processes start with our Integrated Business Management Systems Manual which defines the Information Security Management system as a key part of our business. The Information Security Awareness process requires that all staff and contractors are periodically trained and assessed on their familiarity with Nasstar's ISO27001 Information Security policies and processes. Individual contracts and services will have a specific Security Plan defining the specific measures which will apply to the contract or service. All employees are responsible for Information Security and are trained in reporting suspected breaches to our IMS team who will identify risks and actions to minimise any such breaches.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Conforms to ISO20000-1, ISO27001 and SSAE-18.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Conforms to SSAE18 and ISO27001.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Conforms to ISO27001.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Conforms to SSAE18, ISO20000-1 & ISO27001.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Nasstar is committed to creating innovative Technology with a positive impact by working with your organisation to ensure that opportunities under the contract deliver agreed Policy Outcomes and Model Award Criteria. Nasstar is committed to becoming Net Zero by 2050. Nasstar commits to working with your organisation to ensure that opportunities under the contract deliver agreed Policy Outcomes and Model Award Criteria. Nasstar understand our buyers have commitments in this area and will work with them at implementation stage. We routinely work to ensure delivery of meaningful positive input in this important area. Our initial discovery workshop will include a clear method statement stating how we will achieve Policy outcomes and how our commitment meets the Award Criteria, a timed project plan and process (detailing how we will implement agreed commitments and by when), and how we will monitor, measure and report on our commitments/the impact of our proposals. Related to ‘Fighting climate change’ we will focus on implementing effective measures to deliver any/all of the following benefits through the contract: • MAC 4.1 Deliver additional environmental benefits in the performance of the contract including working towards net-zero greenhouse gas emissions. • MAC 4.2 Influence staff, suppliers, customers, and communities through the delivery of the contract to support environmental protection and improvement which as part of our Social Value Commitment, this product offering will also be integrated into the company's Continuous Improvement Plan and will be scrutinised to identify, monitor, measure and achieve the MAC 4.2 measures. Example reporting metrics of benefits delivered under the contract may include: People-hours spent protecting/improving the environment under the contract, Number of green spaces created under the contract, reduction in emissions of greenhouse gases, reduction in water use, and reduction in waste to landfill.Covid-19 recovery
Nasstar commits to working with your organisation to ensure that opportunities under the contract deliver agreed Policy Outcomes and Model Award Criteria. Nasstar understand our buyers have commitments in this area and will work with them at implementation stage. We routinely work to ensure delivery of meaningful positive input in this important area. Our initial discovery workshop will include a clear method statement stating how we will achieve Policy outcomes and how our commitment meets the Award Criteria, a timed project plan and process (detailing how we will implement agreed commitments and by when), and how we will monitor, measure and report on our commitments/the impact of our proposals. Related to ‘Covid-19 recovery’ we will focus on implementing effective measures to deliver any/all of the following benefits through the contract: • MAC 1.1: Creation of employment, re-training, and other return to work opportunities for those left unemployed by COVID-19, particularly new opportunities in high-growth sectors. • MAC 1.2: Support for people and communities to manage and recover from the impacts of COVID-19, including those worst affected or who are shielding. • MAC 1.3: Support for organisations and businesses to manage/recover from the impacts of COVID-19, including where new ways of working are needed to deliver services. • MAC 1.4: Support for the physical and mental health of people affected by COVID-19, including reducing the demand on health and care services. • MAC 1.5: Improvements to workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions Example reporting metrics of benefits delivered under the contract may include: Number of FTE employment for those made redundant due to COVID-19, people-hours supporting local community integration related to COVID-19, and percentage/number of the supply chain to have implemented the 6 standards in the Mental-Health-at-Work commitment.Tackling economic inequality
Nasstar commits to working with your organisation to ensure that opportunities under the contract deliver agreed Policy Outcomes and Model Award Criteria. Nasstar understand our buyers have commitments in this area and will work with them at implementation stage. We routinely work to ensure delivery of meaningful positive input in this important area. Our initial discovery workshop will include a clear method statement stating how we will achieve Policy outcomes and how our commitment meets the Award Criteria, a timed project plan and process (detailing how we will implement agreed commitments and by when), and how we will monitor, measure and report on our commitments/the impact of our proposals. Related to ‘Tackling Economic Inequality’ we will focus on implementing effective measures to deliver any/all of the following benefits through the contract: • MAC2.1: Create opportunities for entrepreneurship and help new organisations grow. • MAC2.2: Create employment/training opportunities for people who face barriers to employment, are located in deprived areas, and in industries with known skills shortages or high growth sectors. • MAC2.3: Support educational attainment including training schemes • MAC 3.1: Create a diverse supply chain including new businesses/entrepreneurs/start-ups/SMEs/VCSEs/mutuals. • MAC 3.2: Support innovation and disruptive technologies throughout the supply chain to deliver lower cost, higher quality goods/services. • MAC 3.3: Support the development of scalable and future-proofed new methods to modernise delivery and increase productivity. • MAC 3.4: Demonstrate collaboration and a fair/responsible approach to working with supply chain partners. • MAC 3.5: Demonstrate action to identify/manage cyber security risks in the delivery including in the supply chain. Example reporting metrics of benefits delivered under the contract may include: Number of FTE employment/apprenticeship/training opportunities created, learning interventions delivered, start-up/SME/VCSE/mutuals opportunities awarded, and relevant supply chain metrics e.g. Cyber Essentials certification and adoption of NCSC 10 steps.Equal opportunity
Nasstar commits to working with your organisation to ensure that opportunities under the contract deliver agreed Policy Outcomes and Model Award Criteria. Nasstar understand our buyers have commitments in this area and will work with them at implementation stage. We routinely work to ensure delivery of meaningful positive input in this important area. Our initial discovery workshop will include a clear method statement stating how we will achieve Policy outcomes and how our commitment meets the Award Criteria, a timed project plan and process (detailing how we will implement agreed commitments and by when), and how we will monitor, measure and report on our commitments/the impact of our proposals. Related to ‘Equal opportunity’ we will focus on implementing effective measures to deliver any/all of the following benefits through the contract: • MAC 5.1: Demonstrate action to increase the representation of disabled people in the contract workforce. • MAC 5.2: Support disabled people in developing new skills relevant to the contract, including through training schemes resulting in recognised qualifications • MAC 6.1: Demonstrate action to identify/tackle inequality in employment, skills, and pay in the contract workforce. • MAC 6.2: Support in-work progression to help people, including those from disadvantaged/minority groups, to move into higher-paid work by developing new skills relevant to the contract. • MAC 6.3 Demonstrate action to identify/manage the risks of modern slavery in the delivery of the contract, including in the supply chain. Example reporting metrics of benefits delivered under the contract may include: Percentage/number of FTE disabled/under-represented people employed as a proportion of the total FTE including apprenticeships/training schemes, percentage/number of companies in the supply chain to have committed to the five foundational principles of good work, percentage of supply chain mapping completed, and people-hours devoted to supporting victims of modern slavery.Wellbeing
Nasstar commits to working with your organisation to ensure that opportunities under the contract deliver agreed Policy Outcomes and Model Award Criteria. Nasstar’s Wellbeing policies are aligned to the UK Government’s Good Work Plan (satisfaction, fair pay, participation and progression, well-being, safety and security, voice and autonomy). Nasstar understand our buyers have commitments in this area and will work with them at implementation stage. We routinely work to ensure delivery of meaningful positive input in this important area. Our initial discovery workshop will include a clear method statement stating how we will achieve Policy outcomes and how our commitment meets the Award Criteria, a timed project plan and process (detailing how we will implement agreed commitments and by when), and how we will monitor, measure and report on our commitments/the impact of our proposals. Related to ‘Wellbeing’ we will focus on implementing effective measures to deliver any/all of the following benefits through the contract: • MAC 7.1: Demonstrate action to support health and wellbeing, including physical/mental health, in the contract workforce. • MAC 7.2: Influence staff, suppliers, customers, and communities through the delivery of the contract to support health and wellbeing, including physical and mental health. • MAC 8.1: Demonstrate collaboration with users and communities in the co-design and delivery of the contract to support strong integrated communities. • MAC 8.2: Influence staff, suppliers, customers, and communities through the delivery of the contract to support strong, integrated communities. Example reporting metrics may include: Percentage/number of the supply chain to have implemented measures to improve the physical and mental health and wellbeing of employees including the 6 standards in the Mental Health at Work commitment and mental health enhanced standards in ‘Thriving at Work’, and people-hours supporting local community integration e.g. volunteering/community-led initiatives and Mental Health First Aiders.
Pricing
- Price
- £0.04 an instance
- Discount for educational organisations
- No
- Free trial available
- No