CRBhub Coaching and Mentoring Management System
CRBhub is a comprehensive web-based programme facilitation and management system for coaching, mentoring, and similar interventions. The system is offered on a licensed basis, which includes resilient
and secure web hosting along with friendly, responsive support from the team at CRB Associates.
Features
- Automated profile-driven search and match process
- Full relationship management– schedule sessions, upload and share notes/documents
- Multi-stage evaluation gathering from participants and third parties if required
- Administrative console to manage users, relationships, resources and messaging
- Comprehensive reporting of programme usage, relationship activity and evaluation data
- Coaches/mentors can record and report on CPD, supervision, learning logs
Benefits
- Proven system, used by NHS and public sector since 2011
- Personalised branding / profile questions / evaluation / system settings
- Securely and independently hosted- no internal IT resource required
- Frees up administrative resource, with the associated cost benefits
- Provides accountability and a tangible measure of ROI
- Scope for system enhancement and further development as programmes evolve
- User-friendly system, drives end user engagement
Pricing
£13,000 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 4 6 2 9 3 5 7 7 9 3 5 2 0 7
Contact
CRB ASSOCIATES LTD.
Corin Wakeford
Telephone: 01582 326414
Email: corin.wakeford@crb-associates.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- By default a core service specification is offered, but this may be extended as required, by arrangement.
- System requirements
-
- An internet connection
- A current, standards-compliant web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard response time is within 24 hours, during UK business days. Enhanced support may be provided as an optional extra.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Our standard level of support includes unlimited telephone and email support from a named account manager, or substitute if they are unavailable, during UK office hours, for named top level system administrators. This standard support is included within the annual system licensing fee.
Enhanced support levels are available if required (POA) should additional support be required for sub-administrators (e.g. regional leads) or if assistance with performing administrative tasks is required. Enhanced support would typically incur an additional annual cost of £3k - £5k depending on the level of additional support required.
Technical / cloud support managers and engineers are not allocated as a first point of contact to clients, but may be accessed via the support ticket system or via referral from the nominated account manager. This may result in direct contact from a technical member of staff in a second line support capacity. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
-- Two detailed system training sessions are provided to nominated system administrators, delivered via Teams;
-- Help guides for end users and administrators are available when logged in to the system;
-- We can import existing supplier / client / relationship data, if required (to be supplied in a standard format, i.e. CSV). E-mail notifications can be scheduled to be automatically sent to imported users, containing a welcome message and their initial login details for the system, if required. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- System administrators may extract key user and relationship data in CSV format as and when required, until the system is decommissioned. We will also provide any required client data in machine-readable format within one month following expiration of a system licence. Our data processing agreement specifies that the commissioning client remains the owner of all data uploaded to / aggregated by the system.
- End-of-contract process
-
Should a client not wish to renew their licensing agreement, we will make arrangements with them to provide their data in machine-readable format, at the point of system decommissioning, if required. This is included in the price of the contract.
In accordance with our obligations under the GDPR, client data are deleted from our systems and servers and so are no longer retrievable following system decommissioning.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- All desktop functionality is accessible via mobile, and is optimised for a mobile viewport. The allows the core features of the system to be easily accessed via phone/tablet, particularly for end users. For administrative reports etc we recommend a full-size display, due to the quantity of data displayed on-screen.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The system and support helpdesk are accessed via a web browser over the public internet.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- The system has been assessed by real end users employing assistive technology. As a result, the system has been improved in some key areas to ensure that it is fully accessible by these users.
- API
- No
- Customisation available
- Yes
- Description of customisation
- We differentiate "personalisation" and "customisation". Personalisation is provided as standard -- this includes organisational branding, specification of profile fields, and evaluation question sets and scheduling. Customisation is offered as an optional extra, and is open-ended -- we define this as modification of the system functionality to meet the particular requirements of the commissioning clients's own programme. Customisation may be applied at the time of commissioning and/or subsequently in response to user feedback or evolving programme requirements. In each case, any customisation is subject to a fully costed specification.
Scaling
- Independence of resources
- Systems are distributed across servers which are monitored to ensure appropriate levels of redundancy. We use cPanel server management software with alerts to ensure that no single hosting account can monopolise the resources of a server.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The CRBhub system aggregates key aspects of activity into a top-level real-time dashboard, ideal for management reporting. Various built-in reports provide other metrics ranging from high-level aggregate statistics to highly granular reports which may be exported in CSV format for offline analysis. Additional reports may be commissioned as required in order to meet the requirements of the client's programme.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
End users may export a limited set of data relating to their logged system activity, depending on their assigned user types. The export functions are clearly signposted in the user interface.
Administrative users may export aggregated sets of user and relationship data, as well as generated system reports. - Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
- Data upload is not available as standard to system users.
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Availability is guaranteed at >99.97%. This service level is written into our client contracts, and is also reflected in the SLAs of our hosting provider subcontractors. Service credits for failure to meet these service levels are also written into the client contracts.
- Approach to resilience
- Our servers employ firewalls, intrusion detection systems and DDos migitation services to provide a proportionate level of resiliance as standard. These servers are located in datacentres which are certified to ISO-27001 standard. Specific information on datacentre security measures/policies may be provided on request.
- Outage reporting
- Automated monitoring is in place on our managed servers. We are notified of any outages, and we then pass this information on to affected clients, either via our online ticketing system or by direct contact. Outages are a rare occurrence however, due to the investment that we make in maintaining a secure, robust and monitored infrastructure environment.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- A one-time/single-use access code may be used to gain limited access to the system for providing evaluation feedback.
- Access restrictions in management interfaces and support channels
- System administrators are subject to the standard username and password authentication, but additionally are required to satisfy a second level of authentication before being granted access to the system. Upon successful authentication of username and password, an email containing a one-time code is sent to their registered email address. This one-time code must be entered within 15 minutes in order to achieve a successful login.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- IASME Cyber Assurance Level 1 (GDPR)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
Cyber Essentials
IASME Assurance Level 1 (GDPR) - Information security policies and processes
- Our security policy covers physical, technical and social aspects of data security, and is regularly reviewed to ensure ongoing compliance with Cyber Essentials requirements. Our data protection policy forms a subset of our security policy, and covers the requirements set out in the GDPR. Our information security policy also contains procedures for handling actual or suspected incidents/data breaches, including documentation and notification to the appropriate bodies. Employees are required to adhere to the security policy as a condition of their employment contract, and the Managing Director is ultimately accountable for enforcement of the security policy directives.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Each implemented system is based on an approved codebase version , which has passed through our testing procedures. Once the system has undergone initial build and personalisation/customisation, another full internal test is undertaken before provision to the commissioning client for a review period, when minor changes can be requested. For subsequent change requests, a technical specification is prepared and assessed for security and usability impacts, sometimes resulting in elements of the request being modified. System enhancements are subjected to internal testing before being made available to the client. For fundamental changes, the entire system would undergo a full re-test.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use specialist hosting subcontractors, and our management agreement with them includes vulnerability scanning. Patches are typically deployed monthly, except in the case of critical zero-day vulnerabilities, which are patched at the earliest possible opportunity (once the patch has been issued by the software manufacturer).
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our host servers are continuously monitored for vulnerabilities. Automatic alerts ensure that any new vulnerabilities (including any newly published CVE issues) are notified in a timely manner to our managed hosting providers. For any identified vulnerability, a risk assessment and appropriate remediation schedule is put in place based on the severity of risk determined.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our security policy includes a section on incident management, with which all employees are familiar. Our processes ensure that any actual or suspected incident/breach is isolated at the earliest opportunity, following which it is investigated and, if required, an appropriate remediation plan is put in place. When personal data are involved, we adhere to the ICO's directives regarding notification. Users may report incidents via our support ticketing system, although in view of the perceived urgent nature of such incidents, a client would often choose to contact their account manager directly. All incidents and related assigned actions are documented.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
By streamlining and efficiently automating the processed involved with running and managing a coaching/mentoring programme, in particular removing the need for the majority of manual interventions, our CRBhub system can be shown to reduce carbon emissions associated with the manual processes which would otherwise need to be undertaken, including those related to commuting, office provision, consumables provision, waste processing/recycling, etc.Covid-19 recovery
Our CRBhub system contributes to the ongoing COVID-19 recovery by promoting and efficiently facilitating the delivery of coaching and mentoring services. Coaching and mentoring are among the most effective means of delivering tangible career development and knowledge sharing across all industries which have suffered from staff being forced to work in relative isolation, without the day-to-day exposure to the informal interactions and knowledge sharing which are inherent to office-based working, during and following the COVID pandemic.Tackling economic inequality
Our CRBhub system contributes to tackling economic inequality by promoting and efficiently facilitating the delivery of coaching and mentoring services. Coaching and mentoring are effective means of knowledge and skills sharing, allowing the junior partner to more rapidly advance their career and earning potential, thereby reducing the salary gap between them and their superiors.Equal opportunity
Our CRBhub system offers the facility to capture D&I information such as gender, ethnicity, sexuality, etc, which is then anonymised to produce reports allowing system administrators to focus and ensure equality throughout their coaching and mentoring programmes.Wellbeing
Our CRBhub system contributes to the ongoing COVID-19 recovery by promoting and efficiently facilitating the delivery of coaching and mentoring services. Coaching and mentoring inherently promote wellbeing by allowing participants an open and confidential channel in which to discuss their situation and concerns, and to receive advice and reassurance which they can use to improve their wellbeing, both in their career and in their life in general.
Pricing
- Price
- £13,000 an instance
- Discount for educational organisations
- No
- Free trial available
- No