Skip to main content

Help us improve the Digital Marketplace - send your feedback

Intelogy Limited

HEMS Ops - Operational readiness solution for emergency services

Our proven solution empowers emergency services to optimise their operational processes, ensuring readiness for any rapid response scenario. With HEMS Ops, streamline inventory management, enhance asset tracking, and facilitate smooth shift transitions. Manage assets across multiple locations with customisable checklists all while assessing operational preparedness with our live reporting dashboard.

Features

  • Service Checklists: Ensure readiness with customisable checklists.
  • Stock Checklists: Streamline inventory checks for efficiency.
  • Inventory Tracking: Set stock levels, receive expiry alerts.
  • Asset Management: Track assets across multiple locations.
  • Location Management: Centralise base management.
  • Live Dashboard: Real-time monitoring with Ops team alerts.
  • Handover Notes: Smooth information transfer between shifts.
  • Shift Management: Organise shifts, tasks, and events easily.
  • Medical Facility Listings: Tag facilities for streamlined operations.
  • Hospital Listings: Access comprehensive hospital and contact information.

Benefits

  • Avoid stockouts and minimise waste with timely alerts.
  • Improve efficiency and accuracy in inventory management processes.
  • Optimise asset utilisation across locations.
  • Enhance coordination for effective base management.
  • Ensure readiness and improve compliance with customisable checklists.
  • Make informed decisions with real-time monitoring.
  • Enhance continuity and communication between shifts for smoother operations.
  • Improve productivity with optimised scheduling and task allocation.
  • Expedite access to critical resources and contacts for faster response.

Pricing

£950.00 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andrew.tomlins@intelogy.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 7 7 0 1 1 2 8 5 9 9 2 3 9 3

Contact

Intelogy Limited Andrew Tomlins
Telephone: 02037473506
Email: andrew.tomlins@intelogy.co.uk

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Microsoft 365
Cloud deployment model
Public cloud
Service constraints
Being a cloud service, the system relies on access to the internet. All modern browsers are supported.
It does require an Office 365 license and a Power App license to be in place for each user .
System requirements
  • Office 365 licenses (E1)
  • Power Apps Premium licenses (per user)
  • Power BI Pro licenses (Admin team)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our help desk operates on UK Office hours only. Our response times are based on the following priority levels (as defined by the ticket raiser): P1 – (Urgent) - 2 hours response; P2 – (High) - 4 hours response; P3 – (Normal) - 10 hours response; P4 – (Low) - 10 hours response times.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide UK Office Hours support as per below: P1 – (Urgent) - 2 hours response; P2 – (High) - 4 hours response; P3 – (Normal) - 10 hours response; P4 – (Low) - 10 hours response times.

We provide a technical account manager and a cloud support engineer as part of the response team.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We run an initial demonstration with the key stakeholders to demonstrate the capabilities and ease of use of the product. The solution is then deployed to the customers environment followed by a series of onboarding workshops, including admin training, data configuration, and user training. As part of a separate paid for engagement we can provide bespoke customer configuration/enhancements of the product.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The customer's data will be stored within their own Microsoft 365 tenant and therefore they have control of it when the contract ends. Therefore there is no data extraction process required on contract end.
End-of-contract process
At the end of the contract, our logic apps (the things that process workflows for approval, versioning, naming and publication) will cease to operate, but the library of published content will still operate and be available for searching as before. The user facing application and background automation will be deactivated. Existing data will remain in the customers environment.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile experience is optimised for browsing, searching, and authoring content. Offline not supported on browser but enabled on mobile devices.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
The solution enables the ability to use out of the box data verse connectors to undertake basic CRUD operations. We follow the recommended path that Microsoft setout to authenticate and interact with data via the APIs.
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Meta data can all be customised as part of the deployment which in turn will customise inventory items, checklists, and overall application behaviour.

Scaling

Independence of resources
The HEMS Ops solution uses the Power Platform which is managed by Microsoft on the Microsoft cloud. Resources will be scaled automatically by Microsoft to meet service demand.

Analytics

Service usage metrics
Yes
Metrics types
Suite of Power BI dashboard and out of the box Power Platform usage reporting.
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Should owners of the content wish to export data from the solution with an operator with sufficient permission or with the assistance of their IT team (as it is their own Microsoft 365 tenancy).
Data export formats
  • CSV
  • Other
Other data export formats
  • CSV file (meta data, filenames etc)
  • Excel file (.xlsx)
  • Dataverse API
  • Power BI
Data import formats
  • CSV
  • Other
Other data import formats
  • CSV file for meta data mapping
  • Excel file (.xlsx)
  • Dataflow import

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
As per Microsoft's own SLAs for Microsoft 365 services - currently 99.99% uptime
Approach to resilience
As per Microsoft own resilience plans for Microsoft 365 and Azure services
Outage reporting
Microsoft 365 outage reports: https://status.office365.com/

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Access is limited to named users within an Active Directory Group, as defined by tenancy admins.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
07/02/2017
CSA STAR certification level
Level 2: CSA STAR Attestation
What the CSA STAR doesn’t cover
The certification covers the underlying Azure platform but not the application.
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We hold Cyber Essentials Plus certification as an organisation. We are working towards ISO27001 standard, therefore all our security governance procedures are aligned to that. We set up all our systems on a least trust basis so only people who need access are provided it and only to the level required. Only a small subset of staff have admin access. Our support staff have undergone background checks by a third party (DBS).
Information security policies and processes
We are working towards ISO27001 accreditation so we adopt the "Plan-Do-Check-Act" (PDCA) model, which is applied to all Information Security Management Systems (ISMS). We have a set of policies defined at a Board level and all staff are contracted to follow them. They are available via our internal ISMS and any breeches of policies should be reported to our Operations Director who will decide on the course of action. Our policies are reviewed and adapted annually. All changes are highlighted to staff via internal meetings.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All changes are applied via standard processes. i.e. A set of potential changes are assessed for inclusion in a point release of a new version. Assessment of risk, value to the end users, technical feasibility and complexity are taken into account and changes batched into priorities as a result. Changes are conducted on an internal development environment and tested with pre-defined scripts. The changes to application or configuration are then deployed by an authorised platform administrator to a staging environment, tested and signed off by a product manager, before repeating the process on a production environment in Azure.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Intelogy have configured the service through Azure Security Center to have constant monitoring and logging turned on for all nodes (web VMs and databases). Any high priority threats are notified to our platform team instantly and action will be taken if possible and applicable at the soonest opportunity. In addition, customers can access the following public status page: https://azure.microsoft.com/en-gb/status
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Yes, we have a defined process for common events: 5.2 Detection * Identification and reporting of the incident. * Incident details must be captured. * Categorization of incident. * Classify the incident. High, Medium, Low * Identification of stakeholder who all should be involved for managing the incident 5.3 Response * Preventive action of the incident minimize the re-occurrence of the incident * Corrective Action 5.4 Analysis * Data collection * Root Cause Analysis of the incident 5.5 Report * Preventive action of the incident minimize the reoccurrence of the incident * Learning communicated to either whole organisation and stakeholders
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents via phone, email and the helpdesk service. Detection * Identification and reporting of the incident. * Incident details must be captured. * Categorization of incident. * Classify the incident. High, Medium, Low * Identification of stakeholder who all should be involved for managing the incident Response * Preventive action of the incident minimize the re-occurrence of the incident * Corrective Action Analysis * Data collection * Root Cause Analysis of the incident Report * Preventive action of the incident minimize the reoccurrence of the incident * Learning communicated to either whole organisation and stakeholders

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

As well as encouraging less travel to work and use of physical consumables (like paper), the main way that our cloud services can help reduce carbon emissions is by lowering the energy consumption of IT infrastructure. According to a study by Microsoft, cloud computing can reduce the energy use and carbon footprint of IT operations by up to 93% compared to traditional on-premises data centres. This is because cloud providers can optimize the utilisation of their servers, use more efficient cooling systems, and leverage renewable energy sources. By contrast, on-premises data centres often have low utilization rates, inefficient cooling systems, and rely on fossil fuels for power generation. By moving to the cloud, businesses and individuals can save energy and reduce their environmental impact.

Pricing

Price
£950.00 a licence a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andrew.tomlins@intelogy.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.