Apex Patient Transport Software
Fully comprehensive cloud based Patient Transport software package for a flexible monthly subscription, including: control room dispatch, driver app, route planner, web booking portal, vehicle tracking, fleet management, HR, Business Stats, SMS Messaging App, Medicine box management, events management, invoicing.
Features
- Control Room Dispatch: Full control over every booking
- Driver App: New jobs and updates directly to drivers' phones
- Vehicle Tracking: Real-time tracking for you and your customers
- Route Planning: Automatically allocate single or multi routes planned routes
- Web booking portal: Customers book jobs and receive updates online
- Fleet Management: Mileage, Fuel, MOT, services, tax and insurance
- SMS Messaging: Send individual or group messages from the system
- Event First Aid App: Record first aid assistance electronically
- Medicine box management: keep track of usage and replenishing
- HR: Manage rotas, absences, holidays, licenses, training.
Benefits
- All information records of a job stored in one place
- Reliable audit trail of all information and documents
- Monthly subscription, no min contract - highly flexible
- Cloud based – no additional hardware required
- UK based 24/7 helpdesk
- Secure systems – ISO27001 certified
- Dedicated resource for onboarding and training
Pricing
£200 a licence
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 1 9 4 1 2 3 5 5 4 9 2 7 9 5
Contact
APEX NETWORKS LIMITED
Jan Pieter Dekker
Telephone: 0203 195 6757
Email: jpdekker@apex-networks.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Software updates are scheduled 3 to 4 times per year. An update requires minimal downtime and will rarely interfere with operational activities
- System requirements
- Optimised for Google Chrome
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We try to respond to all tickets within 4 hours. Weekend and out of hours support for emergencies only
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide a single all-inclusive support, which is included as part of the overall software subscription package. We have a dedicated support team to look after all customer queries during working hours (9am - 5.30pm) on weekdays and out of hours and weekend support for emergency cases.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We provide all new customers with a dedicated onboarding and training resource. This includes the initial set up of users, employees, vehicles and customers. We also provide detailed set up documentation, as well as "how to" videos.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We provide full data extraction via CSV files. We will also provide post termination access to the system at a small fee, to give customers time to extract their data.
- End-of-contract process
- Our cancellation term is 30 days. There are no costs involved in termination. We continue to provide access to our customers' data, once the contract has been terminated, for up to 3 months.
Using the service
- Web browser interface
- Yes
- Supported browsers
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- We have created dedicated Android apps for mobile users (eg ambulance crew, first aid crew). Online portals for customers and employees are platform agnostic. The main software package is optimised for desktop usage, specifically in the Google Chrome browser, but can be accessed in other browsers and devices.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
-
Software is hosted on Amazon Web Services.
AWS continuously monitors service usage to deploy infrastructure to support our availability commitments and requirements. AWS maintains a capacity planning model that assesses our infrastructure usage and demands at least monthly. This model supports planning of future demands and includes considerations such as information processing, telecommunications, and audit log storage.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Customers have access to a range of dedicated reports and also have the ability to create their own data extracts. Data will be extracted in the form of CSV files.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We host our PTS software on a best-efforts basis and also provide a public statuspage for users to monitor previous availability metrics
- Approach to resilience
- We can provide an overview of how we host and secure our platform within Multiple AWS availability zones and manage offsite backup of customer data.
- Outage reporting
- A public dashboard is available for users to subscribe to for notifications.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- User rights access and management is controlled through the implementation of granular RBAC (role based access controls) which are mapped per user to provide the required level of access across the organisation.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 12/09/2022
- What the ISO/IEC 27001 doesn’t cover
-
A.14.2.7 OUTSOURCED DEVELOPMENT
A.11.1.5 WORKING IN SECURE AREAS - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Our ISMS standard operating procedures are managed within our QMS as controlled documents.
Internal Policy Approvals are the responsibility of the Senior Management team (CEO and CTO).
Our Policy and Procedures documentation includes (but is not limited to):-
* Information Security Policy
* Information Security Incident Management Policy
* Information Security Risk Management Policy
* Operating Procedures for IT Management
* Supplier Management Policy
* Access Control Policy and Procedure
* Communications Security Policy
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
The first step is to identify all assets in the ISMS scope
The second step is to define the context of the organisation. This considers internal and external
factors and their impact on the achievement of objectives.
The third step is to identify, classify and list all information and privacy risks using an asset-based or
risk scenario-based approach. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Automated monthly vulnerability scans are performed to ensure that any CVSS rated vulnerabilitys can be triaged in a timely manner.
We release new major versions of the software every 3-4 months and provide additional bugfix patches live during that period if required. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use an SIEM package to monitor infraatructure and security logging which proactively scans for events/incidents according to our ISO 27001 incident management process
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We have an Incident management policy document that defines our process for servicedesk tickets realting to information security events.
Users can request incident reports if required for compliance purposes.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We are very focussed on providing a service that ensures a high degree of efficiency for our customers, eg by minimising journey distances or optimising fuel usage.Covid-19 recovery
Our customers are able to amend their user licences, with a 30 day notice period. As such, during the Covid pandemic and lock down, our customers were able to reduce their spend with us, in line with reduced activity for their own services.Tackling economic inequality
We operate our offices from Thanet, Kent, an area that is widely regarded as economically deprived. We offer a highly secure job environment in this area and continuously grow our team.Equal opportunity
We offer employment to people of all backgrounds, including all minorities.Wellbeing
We offer a range of employee perks to our staff, including, but not limited to, a six hour work day, 40 days of holiday and other perks, to ensure the wellbeing of all our staff.
Pricing
- Price
- £200 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- On request a test system can be made available for a period of up to 7 days to assist the buyer in being able to assess the functionality and user experience.