Vizst Technology

Vizst Technology Digital Signage Service (Creative, Design & Publishing)

Digital Signage solutions offering visual communication to convey key messaging and relevant content for organisations delivered via cloud based signage software.

Display content for text, images, video, real time data feeds, interactive and embedded content including emergency alerting.

Features

  • Cloud Based Digital Signage
  • Integrated Media Players and Screens
  • Data Integration with API functionality
  • Drag and Drop Editor
  • Sensor Technology to measure interaction
  • Custom templates
  • Interactive Signage
  • Live Data Feeds
  • Bespoke design, support and implementation from Vizst Technology

Benefits

  • Intuitive interface for easy updates
  • Centrally manage multiple screens and locations
  • Deliver professional design and information
  • Secure cloud application meeting the highest security standards
  • Multiple user management
  • Pull real time data from multiple sources to present information
  • Improve communication with visitors, customers or employees
  • Fast updates allow for agile content updates

Pricing

£250 a transaction a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@vizst.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

8 4 5 4 8 7 6 8 2 1 9 2 6 6 3

Contact

Vizst Technology Sonia Krishnan
Telephone: 03333442204
Email: tenders@vizst.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
We deliver the solution around a Wallboard interface.

Using this tool, we are able to connect to various API's, data feeds and web hooks, etc, as well as displaying multimedia.
Cloud deployment model
Private cloud
Service constraints
Service availability of this service is dependent on Wallboard and any 3rd party connections used, SLA’s and availability.
System requirements
  • Service availability is dependent on Wallboards SLA’s and availability.
  • Any webhooks must be Wallboard compatible.
  • For any data feeds, a constant connection must be available.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Vizst provide varied support levels for our customers, as below. Priority SLA Response: Normal = 8 hours, High = 4 hours, Urgent = 1 hour. Service request = 4 hours. Fast Track SLA Response: Normal = 4 hours, High = 2 hours, Urgent = 30 minutes. Service request = 4 hours.
VIP SLA Response Times: Normal = 2 hours, High = 1 hour, Urgent = 15 minutes. Service request = 2 hours. Anything outside of the scope of the support agreement is not covered by the SLAs and will be considered on a case-by-case basis for all support packages.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
All accessibility testing and acceptance has been completed as part of our development programme.
Onsite support
Yes, at extra cost
Support levels
Vizst Technology provide multi-tiered support levels for our customers, these are listed below. Priority SLA Response Times: • Normal = 8 hours • High = 4 hours • Urgent = 1 hour • Service request = 4 hours Priority level support costs – Included with Bronze Package (from £500 per month all inclusive). Fast Track SLA Response Times: • Normal = 4 hours • High = 2 hours • Urgent = 30 minutes • Service request = 4 hours Fast Track level support costs – Included with Silver Package (from £1,000 per month all inclusive). VIP SLA Response Times: • Normal = 2 hours • High = 1 hour • Urgent = 15 minutes • Service request = 2 hours VIP level support costs – Included with Gold Package (from £1,500 per month all inclusive). Anything outside of the scope of the support agreement is not covered by the SLAs and will be considered on a case-by-case basis for all support packages. All customers, regardless of their support package, have access to technical pre-sales account management and support engineers.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onboarding occurs for all managed service customers for the devices and users in scope. Documentation of every element is captured within our secure Configuration Management Database (CMDB) and data is classified to allow for easy support. A risk register is produced to identify and categorise potential service impacting events, how likely the event is, and the impact of the event happening. In addition, a full handover document to both the customer and the service support teams is created to allow the customer to understand how to engage our services, what SLAs are in place and what the escalation processes are. The support team are then provided with a handover document that details specific key information about the customer, what they do, what is supported, what the key services and priorities of those services are, and who the key points of contact are within a contract.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
For ease for the customer, Vizst Technology can simply one-click export all of the data within our secure Configuration Management Database (CMDB) that creates a password encrypted zipped file with all of the data. This is classified in an order the customer can follow.
End-of-contract process
As this is a Managed Network, nothing is excluded from the handover to the customer at the end of the contract process, assuming the contract model is CAPEX. All data and licenses are handed to the customer. If the model is OPEX, a termination agreement will be drafted detailing the specifics of the contract, any termination fees, and options to purchase the equipment.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Microsoft Teams Admin Center allows administrators to manage team collaborations. Think of it as the moderator tool that admins can use to keep things organized and uncluttered. Through it, you can manage channels under each team and assign team owners to keep things orderly. In addition, you can adjust the privacy settings, classifications, and channel settings whenever you like.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
All accessibility testing and acceptance are done as part of our own development
API
No
Customisation available
Yes
Description of customisation
Customers can customise their Microsoft Teams room experience to allow for bespoke technology integration.

Users can customise the solution based on the end equipment requirements, size of the rooms, audio acoustics of the room and integrations into other conference technologies.

The Vizst Technology team can assist with customisations around specific customer requirements.

Scaling

Independence of resources
Our team work to a priority-based system meaning that depending on the severity of any incident, the team would assess the most urgent enquiry and respond accordingly. Additionally, we scale the team based on a number of considerations, such as monthly booked capacity, end points per service desk member under support, and ticket trending. Coupled with close analysis of expected new contracts within the overall business plan, we can predict when we are likely to need new staff and recruit ahead of the curve ensuring users are not affected by increases in demand.

Analytics

Service usage metrics
Yes
Metrics types
• CPU
• Disk
• HTTP request and response status
• Memory
• Network
• Number of active instances
Reporting types
• Real-time dashboards
• Regular reports
• Reports on request
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Wallboard

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported via the Teams Recording function for copies of meetings.
Data export formats
Other
Other data export formats
MP4
Data import formats
Other
Other data import formats
MP4

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Service availability is all backed off by vendor specific SLAs. Due to the nature of our business, service credits are not offered/needed. Service desk services are available 24/7 regardless of vendor support.
Approach to resilience
This information is available upon request as is all backed off to specific cloud-based vendor support.
Outage reporting
As a public dashboard, this is not required, however our service team pro-actively contact customers if monitoring detects outages. On average, the time taken from identification of an outage to notifying customers of the issue is under 1 hour.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Access is restricted in management interfaces and support channels by either limiting or disabling the affected account. By restricting user permissions via limiting access to the account, we can limit the damage that is done if a customer account becomes compromised. RBAC permissions can be applied to achieve this. By disabling the account, users will be unable to use the account locally or remotely, ensuring the safety of the files/information.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISO Accelerator
ISO/IEC 27001 accreditation date
March 2022
What the ISO/IEC 27001 doesn’t cover
There are no limitations to our certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Cyber Essentials Plus Certification
  • IASME GDPR Certification

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
IASME GDPR, Cyber Essentials Plus, and ISO 9001
Information security policies and processes
Vizst Technology follow ISO 27001, 9001, IASME GDPR, and Cyber Essential Plus. All certificates held are current. Governance is achieved through a centralised staff training platform and compliance is achieved through reporting to line management for completion and achievement of that training. Our Operations Director, Dan Warren, will deal with any GDPR related issues that are reported.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
1. Change Request: Request for Change (RFC) documented by the Change Initiator/Requestor within ticketing system by creating a change record. 2. Categorise/Prioritise: change urgency/impact on infrastructure, customer productivity, and budget assessed. 3. Analyse/Justify: develop change justification and identify potential infrastructure impacts (developing technical requirements, reviewing implementation steps, and roll-back plans). 4. Approve/Schedule: RFC submitted for Peer Review or to Change Advisory Board (CAB - including customer contacts) for approval/rejection. 5. Plan/Implement: minimising infrastructure and customer impact in line with RFC. 6. Post-Implementation Review: accepting, modifying, or backing-out the change; contacting customer to validate success; finalising change documentation within Autotask.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Potential threats are assessed through bespoke customer Risk Registers. On-boarding engineers create the RR at service start and continually review at service meetings with the AM/Client Strategy Manager. Notification of potential Common Vulnerabilities and Exposures (CVE) from any vendor is assessed within 1 working day as to who is affected, what stepped changes need to happen to resolve the concern, and the customer contact is made aware. A change record is created assessing risk and peer/management/customer approval is sought before change is implemented. Information about potential threats is taken from the CVE list of publicly disclosed computer security flaws.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our Remote Monitoring Management (RMM) system is configured to allow us to know what is considered ‘normal’ and what is ‘abnormal’ for many specific monitors. If the system detects events outside these identified parameters, it will automatically log a ticket for the affected client, and depending on the type of event, will either: • Automatically run pre-designed automation scripts to remedy the event and automatically close the ticket; • Will log a ticket for a qualified engineer to resolve. Certain event types, such as compromises, are automatically categorised and set a high priority so engineers can act upon those instantly.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management system uses complex workflows to automatically categorise and assess impact for many events, such as pre-defined and agreed thresholds being breached and the system automatically logging a ticket, running a script and the ticket being closed automatically if the threshold returns within normal parameters. End users can log tickets either via phone, web-portal (directly into the ticketing system), email, or using direct communication methods such as Microsoft Teams. Incident reports are provided as part of monthly reports back to the customer and/or as live dashboards that the customer can access.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Vizst Technology is committed to promoting sustainability. Concern for the environment and promoting a broader sustainability agenda are integral to Vizst Technology’s professional activities and the management of the organisation. We aim to follow and to promote good sustainability practice, to reduce the environmental impacts of all our activities and to help our clients and partners to do the same. • Our Sustainability Policy is based upon the following principles: To comply with, and exceed where practicable, all applicable legislation, regulations, and codes of practice. • To integrate sustainability considerations into all our business decisions. • To ensure that all staff are fully aware of our Sustainability Policy and are committed to implementing and improving it. • To minimise the impact on sustainability of all office and transportation activities. • To make clients and suppliers aware of our Sustainability Policy and encourage them to adopt sound sustainable management practices. • To review, annually report, and to continually strive to improve our sustainability performance. Specifically, we are committed, amongst other initiatives, to: • Efficient printing, for example by double-siding all paper used and only printing where necessary. • Reducing the amount of waste produced by the business by encouraging employees to utilise reusable bottles, lunch boxes etc. • Ensuring that water/electricity is used responsibly by our staff by making sure lights, computers, taps etc. are turned off when not in use. • Recycling materials as extensively as possible by making sure we have paper, glass, plastic, and carboard recycle bins throughout the office. • Using technology to lessen the need for travel and reduce our overall carbon footprint and use public transport wherever possible when travelling is unavoidable.
Covid-19 recovery

Covid-19 recovery

N/A
Tackling economic inequality

Tackling economic inequality

We are fully committed to the principle of Corporate Social Responsibility (CSR) and aim to ensure that no relevant policy decisions are made within the business, without first evaluating the potential CSR impact. To tackle economic inequality, Vizst will commit to hiring two apprentices if successful. We recognise that employing apprentices is a valuable way to upskill the local labour market and provide training opportunities with several of our directors developing via the apprenticeship route. Where possible, we hope to drive our recruitment of people from low-income backgrounds, BAME communities and those from the NEET category. As such, we refer all opportunities to local Jobcentres and work with local recruitment agencies and colleges to ensure vacancies are circulated within the area. In the event a skills gap is identified when undergoing monthly employee reviews as part of employee personal development plans, Vizst will actively support the employee(s) to undergo relevant training courses. We utilise a DMAIC approach while developing and implementing social value principles, utilising the Six Sigma DMAIC approach to identify any shortfalls or methods for improvement. Summarised, the DMAIC approach will entail: • Define: the issue/area is defined • Measure: the extent is measured. • Analyse: Root cause analysis is undertaken through investigations, identifying potential causes • Improve: improvement measures are suggested and implemented. • Control: increased frequencies Along with the DMAIC approach Vizst will utilise the ability to collect direct feedback in the form of community surveys or online comment sections. We will be able to identify any trending service shortfalls. The data will be kept safe and secure accessible only by our Head of HR who will review these on a weekly basis.
Equal opportunity

Equal opportunity

Documented in our Equal Opportunities Policy, as well as in staff handbooks, our approach to recruitment, training and promotion has been developed based on best practice and statutory requirements such as the Equality Act 2010 guidance from the Equality and Human Rights Commission. In terms of recruitment, we: • Conduct quarterly reviews of our workforce, striving to ensure it represents the demography of the areas in which we work. • Utilise pre-prepared, anonymous application packs to eliminate potential prejudice from the application process. • Offer guaranteed interview schemes for disabled and protected characteristic individuals should they meet the criteria of a given job. The above are enabled through our Recruitment Policy, in conjunction with our Equal Opportunities Policy. Mandatory equality and diversity training is delivered to all staff, covering: • Our equality and diversity policy and its principles. • What constitutes as discrimination and how to report it. • Protected characteristics under the Equality Act 2010. • Positive equality and language techniques. • Fair recruitment and selection. This is then promoted through our positive equality culture, via: • Noticeboards: Reiterating our commitment to equality and creating positive workspaces, noticeboards provide contact details for senior staff to raise any equality issues with, as well as our commitment to maintaining fair, positive workspaces. • Office talks: We hold equality talks to discuss new initiatives and contributing to a positive equality culture, with focus on topics such as our zero-tolerance policy to discriminatory behaviour and inclusiveness. • Subcontractors: Where utilised, subcontractors are required to evidence their own equality and diversity commitments and adhere to our policies and procedures, with equality training delivered by ourselves as part of our induction. • Reviews: Our Equal Opportunities Policy is reviewed annually, following incidents or changes to best practice to ensure maximum effectiveness.
Wellbeing

Wellbeing

We understand how vital it is to improve the economic, social, and environmental wellbeing in the deliverable area. Therefore, we will strive to meet these areas of social value with the methods outlined below. Our organisation is keen to support and become involved in community initiatives and charitable work. We currently do this in the form of sponsorship and donations to national and local charities, which may be suggested by our staff, and the funding of community projects. Every suggestion is given due consideration. We recognise the importance of education in our community and supporting individuals during this process is key to advancement. We actively encourage our employees to progress professionally, offering training courses which are often funded by ourselves. We also offer a number of work experience placements in partnership with local schools to help reduce the number of those who are Not in Education, Employment, or Training (NEET). We keep our staff fully informed of our policies and procedures and we encourage them to share their ideas with us on both internal processes affecting them, and the way our service is provided to customers/clients. We maintain an open and honest approach to all of our communications, both internally with staff and externally with clients and stakeholders. Copies available online at Terms & Conditions - VIZST Technology, or on request to sales@vizst.com.

Pricing

Price
£250 a transaction a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@vizst.com. Tell them what format you need. It will help if you say what assistive technology you use.