Parking Guidance and Parking Management Solutions
Our engineering and development teams offer significant ICT industry and parking industry experience. We create agile proprietary, technology solutions designed to solve parking challenges. These solutions provide a user-friendly parking experience, better management of facilities, industry leading at bay reservation systems and optimised resource management for car park operators.
Features
- Leading parking guidance solution
- Superior wayfinding signage
- Fast installation with minimal facility disruption.
- Reduction of local traffic congestion and delivery of valuable data
- Parking bay sensors: Infrared, LiDAR, Camera, Ultrasonic, Magnetic Resonance
- Highly accurate sensors integrated into one management system
- Management system covers a range of environments and preferences.
- Real-time portal/dashboard status reporting of parking facility
- Area and passage count controllers for all scenarios
- Multiple options for accurate data capture of vehicle movements
Benefits
- Smart real-time data sent to dynamic wayfinding digital signage
- Bespoke wayfinding signage solutions: “any size, any message, any where”
- Signage content updates communicated cabled, WiFi, LoRa, 4G and 5G
- Function rich/infinitely configurable “SenseIQ”, cloud based management system
- Highly resilient/scalable, Microsoft architecture (SQL, IIS, .Net, ASP)
- Online parking facility area or bay reservation capability
- Management system capable of facilitating permanent/visitor/employee parkers
- Management system also allocates specialty bays including EV/DDA
- Extensive integration capabilities using various standards Modbus, XML/JSON API’s
- Seamless integration with access control, building management, business intelligence
Pricing
£94 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 7 2 6 0 5 4 5 8 1 4 7 0 0 5
Contact
M4 Digital Group Ltd
Procurement Team
Telephone: 0292 064 7647
Email: procurement@m4digitalgroup.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Can be a standalone service or highly integrated with other services to deliver enhancements. This includes integration with access control solutions, building management solutions, business intelligence solutions and car lift systems to name a few. Such integrations delivering enhanced services, improved security and or efficiencies to the facilities operations.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No known constraints. Our service comes with full help desk support agreements and SLAs.
- System requirements
-
- 4 vCPU
- 16 GB RAM
- 200 GB of Storage
- MS operating system and IIS deployed
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
With costs built into maintenance and support agreements. Standard SLA involve hours to days subject to the severity of the incident to be investigated or problem to be resolved.
Core support hours are weekdays but response can and will be provided on weekend but at higher rates. Priority of support tickets is determined by reference to guidelines and is negotiable. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support levels would be determined from mutual agreements made with clients.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Provision of user manual, onboarding training and online support as and when required.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- All data can be exported as a CSV data dump or database backup can be provided.
- End-of-contract process
- In 10 years of being business we are yet to have an end of contract scenario; however, we would expect to provide the customer with a copy of their data and final reports then decommission the service for them.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- This would remain reactive by design to the size of the device used.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- We operate extensive API capabilities, with API Documentation provided upon request.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customising options for minimal features as applicable. Users can customise sign message content (for example) however, few features warrant customisation
Scaling
- Independence of resources
- This is guaranteed via a range of methods. We have alerts and monitoring services in place. Often our service will be deployed into customer cloud accounts or dedicated server infrastructure. Where in a shared multi-tenanted environment, we load balance networks and server infrastructure through to providing dedicated servers and services with bespoke deployments for customers as may be warranted or requested.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We have a range of standard reports and service metrics available for example: activity reports providing bay, area and facility occupation statistics. System reports and alerts showing service uptime and a range of standard MS OS and cloud metrics. For solar solutions metric go down to battery status, temperature, charge voltage etc.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Park Agility SA
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data can be exported via API, CSV DUP, or Database Backup.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- API
- Database Backup
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- API
- Database Backup
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The level of availability offered by Microsoft is 99.99 percent; financially backed uptime guarantee. However, agreements can change from standard structure and be negotiated on a case by case basis to meet customer requirements and pricing will change accordingly. Credit for missed SLAs in a stepped structure can be negotiated.
- Approach to resilience
- Deployments can be made to be highly resilient depending upon customer requirements. At lower levels it could involve regular backups of data and simpler architectures that include load balancing across two front end and two back end synchronised database servers. For highly resilient architectures it is possible to deploy the solution to containers and use multiple Kubernetes nodes to scale services to match demand profiles and even stretch the architecture across multiple data centres to ensure a high level of resilience. This becomes more about the perceived risks that we are trying to mitigate and what is the appropriate budget and best way to achieve the outcome.
- Outage reporting
- Our service reports outages via email alerts, following automatic notifications by SenseIQ, our management system, to the Maintenance & Support team.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- The Menu Option Access section informs an Admin level user if a Menu is visible or hidden to another user in the first place, and then if another user has Read or Write rights for that Menu.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- ICT Security is designed into all solutions and deployments from inception and at an appropriate level commensurate with risk assessments and best practices. There is strong knowledge regarding ICT security within the team that stems from ex-military, banking and finance and consulting backgrounds. We have a small but highly experienced information security management team, that is responsible for implementing, operationalising, monitoring, and improving information security controls based on policies, risk and audit findings, and security best practices.
- Information security policies and processes
- Leveraging a combination of Cyber Essentials Plus and ISO 27001 aligned policies and processes, we maintain a comprehensive cybersecurity framework. This ensures the highest level of protection for your data. An experienced internal IT security officer is responsible for overseeing and enforcing these policies and processes. This proactive approach safeguards your organisation from potential cyber threats.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Supplier defined controls - some embedded in ERP boards, knowledgebases and processes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Information comes from Microsoft/Azure. Information is assessed and acted upon as appropriate. OS patches are generally deployed on a monthly basis using automated process for sites where online access exists or quarterly basis for sites that are not online but under a quarterly preventative maintenance agreement. However, patches of an urgent nature can be acted upon immediately.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The systems are monitored for suspicious activity using server-side endpoint monitoring and reporting tools/dashboards. Additionally, there is adherence to industry best practices outlined in Cyber Essentials Plus and ISO 27001 and follow NCSC security protocols for cloud environments. Dependent upon the level of risk/vulnerability identified, services are patched within an appropriate time period with any issues escalated to a dedicated IT security officer. Indicative response and remediation times to incidents are critical/24-48 hrs, high/7 days, medium/30 days, low/60 days.
- Incident management type
- Supplier-defined controls
- Incident management approach
- A SaaS based Enterprise Resource Planning system called ‘Monday’ is configured with an array of interconnected processes, databases and boards including: CRM, Inventory and Finance management, plus multiple knowledgebases. The service desk and ITSM incident management processes are embedded. Customers can advise of an incident, initiate a service request or request a change via a phone call or via email. Service-ID numbers will be assigned to each. Key information will be captured. Categorisation, analysis and task assignments follow and will be tracked through to customer confirmation of resolution. All associated tasks/information is recorded and reports can be generated as applicable.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At M4 Digital, we're committed to making a real difference in the fight against climate change. Our core offerings aren't just about optimising logistics and transportation – they're powerful tools for reducing carbon emissions and creating a more sustainable future.
Here's how we're leading the charge:
• Smart Traffic Flow Management: Our innovative solutions help reduce congestion and idling times, leading to significant reductions in vehicle emissions.
• Driver Behaviour Optimisation: By promoting fuel-efficient driving practices, we empower drivers to minimise their environmental impact on the "last mile" of deliveries.
• Data-Driven Sustainability Insights: We go beyond just tackling the problem – we provide actionable data that helps our partners track progress and refine their sustainability strategies.
This isn't just marketing hype. We've invested heavily in research and authored insightful White Papers that explore the connection between our technology and measurable reductions in carbon footprint.Covid-19 recovery
The global pandemic has fundamentally changed the way we work. M4 Digital Group understands the challenges you face and is here to help your organisation navigate the path to a successful recovery. Here's how we support COVID-19 recovery efforts:
• Remote Working Enablement: We provide the technology and support (inclusive of employee wellbeing policies) needed for a secure and productive remote workforce. From cloud solutions to collaboration tools, we ensure seamless communication and efficient operations – no matter the location.
• Enhanced Cybersecurity: As the cyber threat landscape evolves, M4 Digital Group strengthens your defences. We implement robust security protocols and offer ongoing monitoring to safeguard your data and systems in this increasingly digital world.
• Business Continuity Planning: M4 Digital Group helps you develop a comprehensive business continuity plan to ensure your organisation can weather any future disruptions. We'll work with you to identify potential risks and create a plan for swift recovery.
• Digital Transformation Strategy: M4 Digital Group can assess your current digital infrastructure and develop a strategic roadmap to optimise processes and workflows. This will not only help you recover but also position your organisation for future success in a digital-first environment.
• Our parking solutions support return to work behaviours by providing efficient management of scare resources and create increased user confidence by creating well managed, hygienic and safe working practices.
M4 Digital Group is more than just a technology provider – we're your trusted partner in building resilience and achieving a stronger post-pandemic future.Tackling economic inequality
M4 Digital Group is committed to fostering a more equitable digital landscape. We believe in the power of technology to empower individuals and communities, and we're taking action to tackle economic inequality through local hiring initiatives. Here's how we're making a difference:
• Local Talent Pipeline: M4 Digital Group prioritises hiring from the local communities we serve. This injects valuable skills and perspectives into our workforce, while also creating high-quality job opportunities for local residents.
• Upskilling & Development: We invest in our employees' growth by providing comprehensive training programmes. This equips individuals with the necessary digital skills to thrive in our industry, regardless of their background.
• Mentorship & Support: M4 Digital Group fosters a supportive work environment, offering mentorship opportunities and career development programmes. This empowers local talent to reach their full potential and build successful careers in the tech sector.
By focusing on local hiring and skills development, M4 Digital Group contributes to:
• Economic Growth: Investing in local talent strengthens the communities we operate in, creating a ripple effect that stimulates economic growth.
• Diversity & Inclusion: A diverse workforce fosters innovation and creativity. Local hiring broadens our talent pool and brings valuable new perspectives to the table.
• Building a Future-Ready Workforce: By upskilling our local workforce, we equip them with the tools they need to succeed in the ever-evolving digital economy.Equal opportunity
M4 Digital Group is committed to providing equal opportunities for employees and team members, with us eliminating any potential discrimination from our internal/external working practices, as per our Equality, Diversity & Inclusion (EDI) Policy. The values of our policy are reflected in our inclusive recruitment processes (e.g., assessing technical and professional capabilities/competencies only, and using gender neutral language in our job descriptions), alongside the daily practice of providing a working environment where all members of the team are treated with dignity and respect. This policy's purpose is to: 1. Provide equality, fairness, and respect for all in our employment or involved in our project teams, whether temporary, part-time or full-time. 2. Not unlawfully discriminate because of the Equality Act 2010 protected characteristics of: -Age -Disability -Gender reassignment -Marriage or civil partnership -Pregnancy and maternity -Race (including colour, nationality, and ethnic or national origin) -Religion or belief -Sex -Sexual orientation 3. Oppose and avoid all forms of unlawful discrimination. This includes in: -Pay and benefits -Terms and conditions of employment -Dealing with grievances and discipline -Dismissal -Redundancy -Leave for parents -Requests for flexible working -Selection for employment, promotion, training, or other development opportunities All members of staff are responsible for supporting the aims and spirit of the policy. Our approach to equal opportunities is disseminated to staff during their induction process upon joining the company and with refresher training conducted yearly. All training is monitored by the Company Directors, with training logged on our internal training matrix. The success of our EDI Policy commitment as part of our recruitment process is monitored through anonymised surveys included at the end of our job application forms. This ensures we continue to advertise positions to a diverse range of candidates, including young people not in education, employment, or training (NEET).Wellbeing
M4 Digital Group work with staff and team members to integrate health and wellbeing into day-to-day activities, which enable us to create a positive and healthy working environment. This is achieved through wellbeing initiatives, employee support mechanisms, joint working with staff and their representatives, and our local partners to identify and address areas for improvement. We will work with employees to ensure any issues which may impact negatively on staff health are identified and addressed. We guarantee that managers have the key skills, knowledge, and ability to support employees to improve their health and wellbeing (e.g., encouraging training to first aid and mental health first aid). We will also increase the awareness of our employees as to what is important in ensuring their own health and wellbeing (e.g., via NHS best practice, referrals to wider support/interventions nationally). There are several effective policies and procedures already in place to support employee health and wellbeing, including our Mental Health and Wellbeing Strategy which outlines how we will strive to improve mental health within our organisation (e.g., flexible working, taking effective breaks, maintaining an open-door policy etc.). We will continue to regularly review these annually to ensure that they support this strategy effectively and constantly enhance/improve our focus on wellbeing. M4 Digital Group also support wellbeing in the wider community through our charity work and commitment to corporate social responsibility. Supported schemes include: - A team member undertaking the Jurassic Coast Challenge in aid of Breast Cancer Now, raising £1,030. - Sponsorship of Swansea Schools Rugby Union Under 15's. - Several members of the M4 team running the Royal Parks Half Marathon in aid of Pancreatic Cancer UK, raising a total of £13,673.
Pricing
- Price
- £94 a unit
- Discount for educational organisations
- No
- Free trial available
- No