KPI & Data Integration
The solution helps transforms data across Education, Welfare, and Housing sectors in Local Government. It enables collaboration among Educational Institutions, Welfare Professionals, Housing Officers, and Council Tenants. Key features include streamlined workflows, data reliability, compliance assessment, and efficient KPI data collection.
Features
- Supports highly flexible Data Structures
- Its user-friendly interface allows easy exploration and access to information.
- Data modeling supports reporting and insights with visualisation tools.
- Structured data collection ensures consistent output via KPI Data Product.
- The Rapid Platform prioritises ease of use and data protection.
Benefits
- Streamlines workflows, eliminates the need for multiple systems
- Ensures consistency in data quality, reduces duplication
- Reduces the need for manual data entry
- Robust Security Measures: Safeguarding sensitive tenant and financial data.
- User-Friendly Interface: Easy exploration and access to information.
- Standardised Data Collection: Consistency, reduced duplication, and minimal manual entry
- Consistent Output: The structured data collection method ensures reliable results.
- Insights Through Visualisation: Data modeling supports insights using preferred tools.
Pricing
£5,000 to £30,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 4 9 9 8 9 7 2 8 7 0 7 7 7 4
Contact
Rapid Information Systems Ltd.
Rapid Information Systems
Telephone: +7739998228
Email: info@rapid-is.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- No Specific Requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within one hour 9-5, Monday to Friday. Weekend and out of hours support response will be longer.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Priority 1: Business Critical – The client requires urgent support to
perform its statutory duties.
Priority 2: Material Fault ‐ Interruption to normal service – The client is
still able to perform the majority of the statutory duties.
Priority 3: Cosmetic Fault
Priority 4: Change Request
No additional cost per standard levels. Engineer provided as necessary. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide onsite training, user documentation, and videos. Each new customer receives a minimum of two days consultancy to help their users make best use of the product.
We will also work with customers to complete documentation. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
On a per-request basis. It is also likely the data is already stored on users existing legacy back-office applications and database.
If data is stored on our AWS Database we will work to provide an extract on request. - End-of-contract process
- The contract includes annual support and maintenance. Additional costs can include bespoke build support (requiring investigation into customers' build or data), and any additional consultancy or training.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- We provide mobile clients for Android, iOS, and Windows Phone that allow Rapid apps to run completely offline as well as integrate with local hardware such as camera, GPS, phone, etc. We have also added progressive web app (PWA) support and all hardware integrated services previously available only through the mobile clients are now available though mobile browsers.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- There is a secure administrative area where privileged users can monitor and administrate the service in considerable detail.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Internal Testing Completed Using Google Lighthouse UAT completed from customers for solution to ensure compliance.
- API
- Yes
- What users can and can't do using the API
- There are a number of tools within Rapid to create APIs. In addition existing Rapid actions can be called as webservices. This allows the setup of users, creation of apps, etc.
- API documentation
- Yes
- API documentation formats
-
- HTML
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Rapid is a highly flexible application development platform. Apps are created by adding pages and arranging controls with events that fire actions. Controls can be arranged visually in pages by low-skillset users. Actions are visually added to events in the same easy to use tool. Advanced users can make their own controls and actions by modifying definition files. Actions have an additional Java class which can be programmed to perform any required task on the server backend.
The following customisations can be provided for the Billing System:
- User Defined Costs
- Cost Calculations
- Input Data Retrieval
- Output File Production
- Custom Reports
Scaling
- Independence of resources
- Each Rapid application instance is installed on it's own virtual machine.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Reports can be provided on request of customer. All transaction within the platform are recorded, such as:
- User
- Application
- Page
- Response Time - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There are a variety of ways. Rapid is a flexible solution and can be made be made to export data from any user action. SOAP, RESTful, and JSON APIs are available too.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- DOCX
- XLXS
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- DOCX
- XLXS
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Rapid aims for 99.95 percent uptime. Refunds on downtime can be negotiated.
- Approach to resilience
-
This is dependent on configuration/request. Loadbalancing, clusters, and fail-over are all supported.
Data to be stored on prem of customer or within AWS Datastore. - Outage reporting
- Service outage will be reported through email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Rapid is a flexible solution with various adaptors/plugins. Authentication adaptors can be created that support any mechanism. In addition to username and password IP address and user-agent string can be included in authentication as well as mac address, IMEI, IMSI, and SIMNO on mobile devices
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Bureau
- ISO/IEC 27001 accreditation date
- 23/02/2024
- What the ISO/IEC 27001 doesn’t cover
- All areas covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
The CEO is ultimately responsible for the Information Security and thus also for the implementation of this policy. Responsibility for the implementation may be delegated to a named Information Security Responsible [e.g., Finance/Operations/IT].
The Information Security Responsible is responsible for the determination of which (if any) regulatory or other compliance requirements apply to the Company (e.g., PCI, HIPAA, GLBA, DFARS), as well as maintenance of documentation, implementation of the Policy and fulfilling the regulatory/compliance requirements of the Company.
The individual manager/team leader is responsible for compliance with the Policy, procedures and guidelines within his/her own group of personnel.
The individual employee is responsible for working within the rules of the Policy to protect the Company's data.
Every individual in the Company is tasked with immediately reporting any potential infringement of the Policy to the next available supervisor.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The product produces a report of all files including a hash to compare configurations. These reports are saved at each modification to produce a history. Security impact is considered as part of regular penetration testing.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Operating system security patches are applied automatically. Respective server webpages (generally Apache Tomcat) are monitored for reported on new patched vulnerabilities. Depending on the severity of the vulnerability patches are applied as soon as possible, or regularly every six months.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Tools psad and fail2ban are installed on all servers for automated scanning of log files and blocking of suspect IP addresses. In addition emails are sent which we investigate as soon as possible.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Users report events via our support portal.
Incidents are investigated and users regularly communicated with as to progress.
Reports are provided as the incident is closed.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
T B C The is helping to fight climate change
Pricing
- Price
- £5,000 to £30,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No