Skip to main content

Help us improve the Digital Marketplace - send your feedback

Tekwurx Limited

EasyVista EV Discovery (DDM)

In the fast-paced world of digital technology, accurately mapping and managing your IT assets and their interdependencies is crucial.

EasyVista's EV Discovery module is here to take on this challenge, empowering your organisation with tools designed to enhance efficiency, compliance, and operational integration.

Features

  • 360-Degree IT Asset Visibility - Discover and manage every asset
  • Automated Efficiency - manage updates and track assets in real-time
  • Integrated IT Management
  • Regulatory Compliance Made Simple with automated documents and audits
  • Scalable Solutions - EV Discovery grows with your business

Benefits

  • Improved service awareness through rapid asset discovery across IT infrastructure
  • Reduced costs through constant evaluation of IT assets
  • Lowered risk by identifying and remediating vulnerabilities quicker
  • Improved productivity thanks to automated asset discovery, reducing manual effort

Pricing

£0.74 to £3.70 a device a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at keith@tekwurx.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 4 1 8 4 3 9 0 6 2 5 2 6 2 6

Contact

Tekwurx Limited Keith Pound
Telephone: +44 208 148 3717
Email: keith@tekwurx.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
EasyVista EV Service Manager
Cloud deployment model
Public cloud
Service constraints
No specific constraints. The service is available according to the SLAs.
System requirements
No specific requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
S1: 24x7, 1 clock hour
S2: 7:00-19:00, Mon-Fri (excluding public holidays), 4 business hours
S3: 7:00-19:00, Mon-Fri (excluding public holidays), 8 business hours
S4: 7:00-19:00, Mon-Fri (excluding public holidays), 12 business hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
S1: 24x7, 1 clock hour
S2: 7:00-19:00, Mon-Fri (excluding public holidays), 4 business hours
S3: 7:00-19:00, Mon-Fri (excluding public holidays), 8 business hours
S4: 7:00-19:00, Mon-Fri (excluding public holidays), 12 business hours

We will provide a named Customer Success Manager
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All new customers receive administrator and user training as part of the Tekwurx EasyStart implementation service. This is usually delivered remotely, but can be on-site if preferred.
All configuration changes are documented
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
At the end of the contract, data is returned to the client on DVD, in the form of an SQL Server backup of the Service Engine database in the version used by the hosted platform at that time. This backup includes the configuration database associated with the production account and acceptance account.

The backups in our possession are then destroyed once the client has confirmed safe receipt and reading of this data.
End-of-contract process
The following are not included by default but can be requested for a fee:

Delivery in any other format or on any other media.
Assistance in using and understanding this data.
Integration of this data into a third party tool.
Backups of test databases (sandbox).

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The product is HTML5-based on the desktop and mobile, so the differences are minimal.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Via a web browser
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Unknown
API
No
Customisation available
No

Scaling

Independence of resources
The EV Discovery architecture is scalable. It can be reviewed and modified based on changes in your requirements. You can, therefore, start your project with a well-defined scope (modules used, number of users, etc.) and extend it to fit your needs. Our teams will manage this extension, working closely with you to ensure the process is as transparent as possible.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
EasyVista

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
An export consists of extracting data from records in the Service Manager database.
The export takes into account all records included in the active filter currently applied when the export is run.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
Firewall, WAF, IPS/IDS, Antivirus

Availability and resilience

Guaranteed availability
This service is available 7 days a week and 24 hour a day outside of the maintenance periods specified below.

We guarantee 99.9% availability (calculated over a quarter, excluding scheduled maintenance periods).

Scheduled maintenance periods must not exceed 2 hours per month
Approach to resilience
Available on request
Outage reporting
Incident Detection: Continuous monitoring alerts the operations team to disruptions.
Customer Notification: Affected customers are promptly notified via email or support tickets.
Regular Updates: Updates are provided until the issue is resolved.
Post-Mortem Analysis: A detailed report is shared with customers after resolving the outage, explaining the cause and the resolution process.

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
Service Engine has the following means of authentication:

Authentication via the application's internal employee database.
Authentication via your LDAP/AD directory(ies).
Authentication via an SSO compatible with our services.
Access restrictions in management interfaces and support channels
Access to the data of Service Manager is secure and is based on the following concepts:

profiles: restriction of access to areas of the interface;
domains: restriction of access to data;
management of employee access: identification of employees with access to the application, by assigning them a login/password and a profile;
password management: securing resources and services to which access is limited and protected; the encryption of passwords is performed with the EasyCrypt utility.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
Authentication via the application's internal employee database.
Authentication via your LDAP/AD directory(ies).
Authentication via an SSO compatible with our services.
MFA

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
Unknown
CSA STAR certification level
Level 5: CSA STAR Continuous Monitoring
What the CSA STAR doesn’t cover
Unknown
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • SOC2 Type 2
  • SOC3 Type 2
  • ISAE 3402

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow the NIST security governance standards.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We use procedures to perform configuration and change management according to level of criticity and impact of the change or incident.
All the changes of the components are tracked on our Configuration Management Database (CMDB). The components are permanently scanned to find vulnerabilities
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Regular Vulnerability Scans: Weekly scans with tools like Qualys to detect vulnerabilities.
Penetration Testing: Regular tests based on OWASP guidelines to identify potential security weaknesses.
Patch Management: Swift application of security patches to fix vulnerabilities.
Third-Party Audits: External audits to verify the effectiveness of security measures.
Continuous Monitoring: Ongoing monitoring to detect and respond to new security threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The platform is automatically monitored by various tools for this purpose. Alerts are also automatically sent to the EasyVista SOC team.

Aspects covered by monitoring are:

The data integration process.
The users connected to the service.
The workload coming from application services.
The slowest requests executed on the platform.
The use of disk space allocated under the contract.

Availability of the service, IP addresses and the database is automatically checked every 30 seconds
Incident management type
Supplier-defined controls
Incident management approach
The Prepare phase involves implementing controls to prevent incidents from occurring in the first place.

The next phase of Detect and Identify kicks off the Observe, Orient, Decide, and Act (OODA) loop.

From the OODA loop, the Contain and Eradicate phases are next.

The Recovery phase is the process of implementing mitigations against the incident that has taken place and making sure that the threat is fully eradicated.

The final phase is Lessons Learned. Be sure all employees and involved individuals know where the organization made improvements and why those improvements will help protect the network in the future.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Tekwurx cloud solutions and services assist in COVID-19 recovery efforts by:
1. Facilitating remote work setups, allowing businesses and organisations to continue operations while adhering to social distancing measures.
2. Tekwurx Cloud services offer scalability and flexibility, enabling organisations to quickly scale up or down their IT resources based on fluctuating demands

Covid-19 recovery

Tekwurx cloud solutions and services assist in COVID-19 recovery efforts by:
1. Facilitating remote work setups, allowing businesses and organisations to continue operations while adhering to social distancing measures.
2. Tekwurx Cloud services offer scalability and flexibility, enabling organisations to quickly scale up or down their IT resources based on fluctuating demands

Tackling economic inequality

Tekwurx Cloud Solutions and Services can tackle economic inequality by fostering inclusive practices within the company, investing in communities, and advocating for policies that promote economic justice and opportunity for all.

Equal opportunity

TekWurx Cloud Solutions and Services promotes equal opportunities in several ways:
1. We implemented diverse hiring practices that ensure our workforce represents various backgrounds, including gender, race, ethnicity, and socio-economic status. This promotes equal opportunities within the company itself.
2. We offer training and development programs that help all our team develop the skills they need to advance within the company
3. We ensure that promotions and opportunities for advancement within the company are based on merit rather than factors such as gender or ethnicity. This creates a level playing field for all employees.

Wellbeing

By focusing on efficiency, flexibility, security, collaboration, customer satisfaction, and employee development, TekWurx's cloud solutions and services can significantly promote well-being within its team and customer base.

Pricing

Price
£0.74 to £3.70 a device a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at keith@tekwurx.com. Tell them what format you need. It will help if you say what assistive technology you use.