Skip to main content

Help us improve the Digital Marketplace - send your feedback

Orbis Protect Ltd

Lone Worker Protection Services

Orbis Protect's BS8484 lone worker service provides life-line protection to at-risk lone workers, 24/7/365. We offer a range of devices, smartphone apps and bespoke solutions. The system provides individuals with discreet SOS functionality, welfare checks, location positioning, mandown and pre-emptive alerting, backed up by full access to Police URN system.

Features

  • 24/7/365 Wholly-owned Alarm Receiving Centre with Police URN
  • Real-Time Lone Worker Location Information
  • One-Touch SOS Functionality on all solutions
  • 2-Way Audio Communication
  • Roaming SIM Cards to ensure best Connectivity
  • Bespoke Training
  • Fully-Managed Implementation and Mobilisation
  • Welfare Check Pre-Emptive Alerting Service - Amber Timer
  • Compliance to BS8484: 2016, BS5979 Cat II, ISO27001, BS7858
  • Secure Cloud-Based Management Portal

Benefits

  • Fastest possible Police response
  • Accurate location information during an incident for responder
  • Covertly raise an alarm by pressing one button
  • Two way conversation through the device/app to the ARC operator
  • Automatically selects best network giving best possible network coverage
  • Maximising user engagement ensuring ongoing high usage & compliance
  • Bespoke device setup dependant on user needs.
  • Checks on user welfare even in zero signal locations
  • Confirmation that you are procuring a audited compliant system
  • Management information securely accessed via any browser

Pricing

£1.05 to £9.95 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidteam@orbisprotect.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 8 2 6 9 0 7 6 7 5 3 9 5 5 0

Contact

Orbis Protect Ltd Bid Team
Telephone: 01895465500
Email: bidteam@orbisprotect.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Workforce Management and Job Scheduling Solutions for most workforce management platforms.

Also compatible with Office365 Outlook Calendar integration and single sign on option
Cloud deployment model
Hybrid cloud
Service constraints
Supported Devices and Apps
System requirements
  • Android
  • IPhone/iOS
  • Non-Smartphones

User support

Email or online ticketing support
Email or online ticketing
Support response times
1st Line Support Available 24/7/365 2nd Line Support Available Mon-Fri 9am - 5pm (ex Bank Holidays & Weekends)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Webchat developed by Zopim
Onsite support
Onsite support
Support levels
All Lone Worker Protection Services are monitored 24/7/365, meaning 1st Line End-User Support is available 24/7/365.

This includes full solution Technical Support and Remote Diagnostic Assistance. 2nd Line Administrative Support is available via the Customer Service Desk 9am - 5pm Monday to Friday (exc Bank Holidays and Weekends).

This includes non-service critical Support, Change Management and Account Management. All Support is included with the package pricing.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a range of onboarding options from Fully-Managed to Self-Service and everything in between. Input of User Data can be done either by the customer via the Sentry Management Portal, or by our Customer Support Team using bulk upload templates. Our approach to implementation and deployment is to provide a bespoke service which best meets the needs and resources of the individual customer. Training options are flexible and can be carried out on-site or via Webinar. We also provide a full eLearning Module which is SCORM compliant. Service Users and End Users are also provided with User Guides and Training Video's. Our Training Video's are contextual as opposed to being purely function, which greatly assists with helping Users understand how our products and services operate both functionally but also practically in a day-to-day scenario. Training formats are also flexible. We can provide classroom training, tool-box talks and field-based training, as well as Train-The-Trainer and Lone Worker 'Champion' Training.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • SCORM eLearning
  • Contextual Training Videos
  • Tutorials
  • User Guides
  • All the above are also accessible via the web portal
End-of-contract data extraction
We can provide CSV export of all users records and zipped copies of all recordings in mp3 format.
End-of-contract process
If a customer chooses not to continue using the service then there are no additional charges once the service ends. For smartphone application customers, User Licenses will be removed from the system upon contract termination and will no longer be connected to the service. Users will be advised to the delete the application from their phones. For dedicated device customers, SIM Cards will be disconnected from the service upon contract termination and ALL contracted Devices must be returned to Orbis

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The Orbis RedAlert Smartphone Applications are developed to run on Android and iOS operating systems.

The Sentry Management Portal is available on Desktop applications via a secure browser and is also optimised for use on Tablets
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
The Sentry Management Portal is available via a secure https:// web interface.

Integrations are also available via a Secure XML SOAP Interface
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
3rd Party Verification
API
Yes
What users can and can't do using the API
Create, View, Modify and Remove Users and Devices

Create Events and Alarms

Exchange Data including Location, Date, Time, Event type, Unique ID
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The Sentry Management Portal provides Service User with the ability to customise some Portal, Device, App and API settings, including;

Portal - Customisable by Customer Administrator or Orbis Administrator

Access Permissions
Access Rights
Account Access Hierarchy
Add, Edit, Delete Permissions
Reporting Access

Devices - Customisable by Orbis Administrator ONLY

GPS Frequency
Amber Timer (on/off)
Amber Timer (frequency)
Fall Alert (on/off)
Fall Alert (sensitivity)

Smartphone Applications - Customisable by End User or Orbis Administrator

GPS Frequency
Amber Timer (on/off)
Amber Timer (frequency)
Fall Alert (on/off)
Fall Alert (sensitivity)
SOS Keypad Over-ride (on/off)
SOS Keypad Over-ride (sensitivity)

Scaling

Independence of resources
We actively manage the capacity of the system and use our 20 years of experience delivering the service to ensure that availability requirements are met. We regularly monitor call volumes and adjust staffing levels accordingly.

Analytics

Service usage metrics
Yes
Metrics types
Number of Active Instances
Device Utilisation
Alarm Volume
Alarm Type/Cause Analysis
Alarm Response Times
Last Known Location
Last Known Activity
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported via csv or pdf via our portal
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Excel
Data import formats
  • CSV
  • Other
Other data import formats
SQL

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Service availability is 99.9%. Any failure beyond this within a given month will result in a full month credit.
Approach to resilience
Available upon request
Outage reporting
Customers can access our Service Status website to see full live status updates. https://status.orbisprotect.com Service status reports are also made available via email upon request

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access into management interfaces and support channels is both logically and physically seperated. Control of the systems is restricted to within secure controlled areas
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcamus ISOQAR
ISO/IEC 27001 accreditation date
21/07/2017
What the ISO/IEC 27001 doesn’t cover
The scope is limited to

The Information Security Management System for the provision and management of remote security monitoring services and contact centre services at Orbis Protect Ltd, Dock Road South, Bromborough, Wirral CH62 4SQ in accordance with the Statement of Applicability.

This includes:

• All Physical and Information Assets owned by Orbis Protect Ltd

• Services and Support provided to Clients.

• Data provided for Clients.

• All Staff.

This scope takes account of the organisational context and needs and expectations of interested parties.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • BS5979 Cat II
  • BS8484: 2016
  • BS7858
  • ISO27001: 2013
  • ISO9001
  • ISO14001
  • ISO45001
  • BS9518

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
The Company’s overall objective is to provide assurance to its existing and potential clients regarding its information security capabilities. In order to achieve this objective further, detailed Information Security Management System (ISMS) objectives are listed in DOC A3.

To achieve the stated objectives, the company has implemented an Information Security Management System (ISMS) in accordance with the international standard ISO/IEC 27001:2013.

The purpose of this policy is to protect Company’s information and related assets from all relevant threats, whether internal or external, deliberate or accidental.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The following changes are considered routine or insignificant and are therefore not subject to this procedure:

• Malware updates
• Operating system vulnerability patching and hot fixes
• Other Third party software vulnerability patching and upgrades

Changes are identified on the Change Request form (REC 12.3). The Change request is then passed to the ISM where the details are logged using the Change Control log (REC 12.2).

The originator obtains sufficient information to complete the Change Request and obtains the Technical Manager’s approval for the change, taking into account any technical considerations, the costs of the exercise, the potential benefits.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Anti-Virus is set to be patched automatically by the centralised Antivirus management system.

Operating System patches are pushed down via ManageEngine, users are given the option to update. If the patch is critical an update is forced as well as forced restarts.

The technical department reviews the machines to ensure patches have been applied. Server patching is planned by Technical Manager and rolled out according to this plan.

The Technical Manager reviews software supplier sites as appropriate to ensure that technical vulnerabilities are understood.

Automatic updates for critical software are enabled as appropriate.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The following are typical weaknesses and/or incidents that fall within the scope of this procedure:

• Personal accident
• Breach of Physical security
• Breach of information security
• Loss or theft of property
• Data/information missing, lost or incorrect
• Financial irregularities
• Violence, abuse or harassment

Information Security weaknesses, events and incidents are reported immediately they are seen or experienced to the Operations Manager, on form REC 16.1A which is kept on the internal network.

The Operations Manager ensures that the appropriate action is taken and recorded in the Incident Recording System (using form REC IRL1).
Incident management type
Supplier-defined controls
Incident management approach
The following are typical weaknesses and/or incidents that fall within the scope of this procedure:

• Personal accident
• Breach of Physical security
• Breach of information security
• Loss or theft of property
• Data/information missing, lost or incorrect
• Financial irregularities
• Violence, abuse or harassment

Information Security weaknesses, events and incidents are reported immediately they are seen or experienced to the Operations Manager, on form REC 16.1A which is kept on the Company internal network.

The person making the report will email a copy of the completed form to the Operations Manage

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

We are committed to helping improve the environments in which we work. We work collaboratively with colleagues, and other stakeholders, to deliver a range of initiatives including improving the utilisation of scarce resources, recycling and re-using materials and actively working with and support a range of local charities.
• Diverting Waste from Landfill - We have recycled or reused 4,297 tonnes of waste generated from our business activities which equates to 97% of our total waste being diverted from landfill.
• Use of environmentally friendly materials i.e., non-toxic and non-corrosive environmentally safe.
• Green Suppliers - The majority of products are sourced primarily on the basis of their green credentials from environmentally credible suppliers that have been approved via our rigorous vetting process.
• Green Fleet - Any new vehicles acquired meet the minimum mandatory standards for Co2 emissions for the relevant vehicle category based on Government Buying Standards.
• Travel Reduction - We employ staff members that live in regions that will be serviced under this contract.
• Utilisation of PDAs by operatives reduces vehicle travel and carbon emissions i.e., all job details are available electronically, therefore operatives do not have to return to the branch to pick up paperwork for the next job.
• Our Business planners plan work to reduce unnecessary travel locating jobs adjacent to each other.

Equal opportunity

To ensure that equality and diversity is embedded within the Company, we have an Equal Opportunities Policy that is effectively implemented and communicated to all employees. We embrace sensible employment practices throughout the Company that promotes equality and diversity. We want to help by reducing inequalities and promote fairness in everything that we do.

In line with the agency workers regulations, any agency staff employed for 12 weeks or more on this contract would be entitled to the same pay, underlying employment terms and conditions, rewards and career development opportunities as those employed directly.

Wellbeing

Our employees have access to range of health related services, which are available through our smart health services mobile app:
• Mental Health support – Support for employees on issues such as stress, anxiety, trauma, depression or bereavement
• 24/7 Virtual GP – Unlimited access to a GP, via phone or video call. Provision of medical advice, prescriptions and specialist referrals
• Health Checks – Online support to help manage health and lifestyle
• Nutritional consultations – Phone or online support from a team of specialist nutritionists, to give advice on matters such as weight loss, fertility, pregnancy and food intolerances
• Workout programmes – Online support to help create health and fitness goals through diet and exercise routines.
These measures demonstrate the commitment we have towards the well-being of our staff, and evidence the support we provide for the challenging circumstances our operatives have to work in.

Pricing

Price
£1.05 to £9.95 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Our Trial Service provides organisations with the ability to review and assess our products and service before buying.

Trials include the full service provision and End Users are treated the same as Live customers Trial Setup and Training is provided.

Trial Analysis Reports and Review Meetings held throughout trial
Link to free trial
https://redalert.orbisprotect.com/contact-us/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidteam@orbisprotect.com. Tell them what format you need. It will help if you say what assistive technology you use.