HEMS Ops - Operational readiness solution for emergency services
Our proven solution empowers emergency services to optimise their operational processes, ensuring readiness for any rapid response scenario. With HEMS Ops, streamline inventory management, enhance asset tracking, and facilitate smooth shift transitions. Manage assets across multiple locations with customisable checklists all while assessing operational preparedness with our live reporting dashboard.
Features
- Service Checklists: Ensure readiness with customisable checklists.
- Stock Checklists: Streamline inventory checks for efficiency.
- Inventory Tracking: Set stock levels, receive expiry alerts.
- Asset Management: Track assets across multiple locations.
- Location Management: Centralise base management.
- Live Dashboard: Real-time monitoring with Ops team alerts.
- Handover Notes: Smooth information transfer between shifts.
- Shift Management: Organise shifts, tasks, and events easily.
- Medical Facility Listings: Tag facilities for streamlined operations.
- Hospital Listings: Access comprehensive hospital and contact information.
Benefits
- Avoid stockouts and minimise waste with timely alerts.
- Improve efficiency and accuracy in inventory management processes.
- Optimise asset utilisation across locations.
- Enhance coordination for effective base management.
- Ensure readiness and improve compliance with customisable checklists.
- Make informed decisions with real-time monitoring.
- Enhance continuity and communication between shifts for smoother operations.
- Improve productivity with optimised scheduling and task allocation.
- Expedite access to critical resources and contacts for faster response.
Pricing
£950.00 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 7 7 0 1 1 2 8 5 9 9 2 3 9 3
Contact
Intelogy Limited
Andrew Tomlins
Telephone: 02037473506
Email: andrew.tomlins@intelogy.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Microsoft 365
- Cloud deployment model
- Public cloud
- Service constraints
-
Being a cloud service, the system relies on access to the internet. All modern browsers are supported.
It does require an Office 365 license and a Power App license to be in place for each user . - System requirements
-
- Office 365 licenses (E1)
- Power Apps Premium licenses (per user)
- Power BI Pro licenses (Admin team)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our help desk operates on UK Office hours only. Our response times are based on the following priority levels (as defined by the ticket raiser): P1 – (Urgent) - 2 hours response; P2 – (High) - 4 hours response; P3 – (Normal) - 10 hours response; P4 – (Low) - 10 hours response times.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide UK Office Hours support as per below: P1 – (Urgent) - 2 hours response; P2 – (High) - 4 hours response; P3 – (Normal) - 10 hours response; P4 – (Low) - 10 hours response times.
We provide a technical account manager and a cloud support engineer as part of the response team. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We run an initial demonstration with the key stakeholders to demonstrate the capabilities and ease of use of the product. The solution is then deployed to the customers environment followed by a series of onboarding workshops, including admin training, data configuration, and user training. As part of a separate paid for engagement we can provide bespoke customer configuration/enhancements of the product.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The customer's data will be stored within their own Microsoft 365 tenant and therefore they have control of it when the contract ends. Therefore there is no data extraction process required on contract end.
- End-of-contract process
- At the end of the contract, our logic apps (the things that process workflows for approval, versioning, naming and publication) will cease to operate, but the library of published content will still operate and be available for searching as before. The user facing application and background automation will be deactivated. Existing data will remain in the customers environment.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile experience is optimised for browsing, searching, and authoring content. Offline not supported on browser but enabled on mobile devices.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The solution enables the ability to use out of the box data verse connectors to undertake basic CRUD operations. We follow the recommended path that Microsoft setout to authenticate and interact with data via the APIs.
- API documentation
- No
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Meta data can all be customised as part of the deployment which in turn will customise inventory items, checklists, and overall application behaviour.
Scaling
- Independence of resources
- The HEMS Ops solution uses the Power Platform which is managed by Microsoft on the Microsoft cloud. Resources will be scaled automatically by Microsoft to meet service demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Suite of Power BI dashboard and out of the box Power Platform usage reporting.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Should owners of the content wish to export data from the solution with an operator with sufficient permission or with the assistance of their IT team (as it is their own Microsoft 365 tenancy).
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- CSV file (meta data, filenames etc)
- Excel file (.xlsx)
- Dataverse API
- Power BI
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- CSV file for meta data mapping
- Excel file (.xlsx)
- Dataflow import
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- As per Microsoft's own SLAs for Microsoft 365 services - currently 99.99% uptime
- Approach to resilience
- As per Microsoft own resilience plans for Microsoft 365 and Azure services
- Outage reporting
- Microsoft 365 outage reports: https://status.office365.com/
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is limited to named users within an Active Directory Group, as defined by tenancy admins.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 07/02/2017
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- The certification covers the underlying Azure platform but not the application.
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We hold Cyber Essentials Plus certification as an organisation. We are working towards ISO27001 standard, therefore all our security governance procedures are aligned to that. We set up all our systems on a least trust basis so only people who need access are provided it and only to the level required. Only a small subset of staff have admin access. Our support staff have undergone background checks by a third party (DBS).
- Information security policies and processes
- We are working towards ISO27001 accreditation so we adopt the "Plan-Do-Check-Act" (PDCA) model, which is applied to all Information Security Management Systems (ISMS). We have a set of policies defined at a Board level and all staff are contracted to follow them. They are available via our internal ISMS and any breeches of policies should be reported to our Operations Director who will decide on the course of action. Our policies are reviewed and adapted annually. All changes are highlighted to staff via internal meetings.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes are applied via standard processes. i.e. A set of potential changes are assessed for inclusion in a point release of a new version. Assessment of risk, value to the end users, technical feasibility and complexity are taken into account and changes batched into priorities as a result. Changes are conducted on an internal development environment and tested with pre-defined scripts. The changes to application or configuration are then deployed by an authorised platform administrator to a staging environment, tested and signed off by a product manager, before repeating the process on a production environment in Azure.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Intelogy have configured the service through Azure Security Center to have constant monitoring and logging turned on for all nodes (web VMs and databases). Any high priority threats are notified to our platform team instantly and action will be taken if possible and applicable at the soonest opportunity. In addition, customers can access the following public status page: https://azure.microsoft.com/en-gb/status
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Yes, we have a defined process for common events: 5.2 Detection * Identification and reporting of the incident. * Incident details must be captured. * Categorization of incident. * Classify the incident. High, Medium, Low * Identification of stakeholder who all should be involved for managing the incident 5.3 Response * Preventive action of the incident minimize the re-occurrence of the incident * Corrective Action 5.4 Analysis * Data collection * Root Cause Analysis of the incident 5.5 Report * Preventive action of the incident minimize the reoccurrence of the incident * Learning communicated to either whole organisation and stakeholders
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users can report incidents via phone, email and the helpdesk service. Detection * Identification and reporting of the incident. * Incident details must be captured. * Categorization of incident. * Classify the incident. High, Medium, Low * Identification of stakeholder who all should be involved for managing the incident Response * Preventive action of the incident minimize the re-occurrence of the incident * Corrective Action Analysis * Data collection * Root Cause Analysis of the incident Report * Preventive action of the incident minimize the reoccurrence of the incident * Learning communicated to either whole organisation and stakeholders
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
As well as encouraging less travel to work and use of physical consumables (like paper), the main way that our cloud services can help reduce carbon emissions is by lowering the energy consumption of IT infrastructure. According to a study by Microsoft, cloud computing can reduce the energy use and carbon footprint of IT operations by up to 93% compared to traditional on-premises data centres. This is because cloud providers can optimize the utilisation of their servers, use more efficient cooling systems, and leverage renewable energy sources. By contrast, on-premises data centres often have low utilization rates, inefficient cooling systems, and rely on fossil fuels for power generation. By moving to the cloud, businesses and individuals can save energy and reduce their environmental impact.
Pricing
- Price
- £950.00 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No