Skip to main content

Help us improve the Digital Marketplace - send your feedback

SAFE365 GLOBAL (UK) LTD

Safe365

We aid safety leaders in preemptively minimising harm. Our digital tool fosters collaboration, consistency, accessibility, and scalability in assessing safety risks. Users gauge safety culture maturity, identify strengths and weaknesses, and utilize data visualisation to enhance engagement and showcase continuous improvement impact.

Features

  • Diagnostic survey simplifies regulatory language and bestpractice theory intosimplified questions
  • Automated, visual, quick to interpret data summaries, highlight strengths weaknesses
  • Readymade targeted actionplan reflective of current strengths and weaknesses identified
  • Benchmarking showing score relativeto peers, other industries, geographies, organisational size
  • Individual businessunit and aggregate maturity profiles by division, region, country

Benefits

  • Reduced time and cost of maturity diagnosis
  • Improved accuracy ofcurrent performance at any one time, live dashboard
  • Supports team capability development
  • Enables nonsafety leadership to connect lead indicators with tangible action
  • Avoids complacency dueto assumptions of excellence vs real comparative data
  • More targeted work streams, increasingly likelihood of impact/change

Pricing

£15,000 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at pele.tanuvasa@safe365global.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 9 5 5 9 0 5 1 7 5 3 1 9 6 7

Contact

SAFE365 GLOBAL (UK) LTD Pele Tanuvasa
Telephone: +64211275290
Email: pele.tanuvasa@safe365global.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No
System requirements
  • Internet Connection (SaaS)
  • Web Browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
First Response SLA of 120 minutes for Business Hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Full support provided as part of Software Subscription. Account Manager assigned as point of contact for clients.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite or Online training, according to user requirements. Help Centre/Knowledge Center available 24/7 with comprehensive how-to-guides. 1:1 support from Customer Enablement specialist assigned to client. Micro-credentials available through Safe365 University, an interactive system walk through.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Via our Help Centre, Support Team or Account Manager, and online CSV extracts available from the platform.
End-of-contract process
System is designed as a continual improvement tool to support organisations on a long term basis. In the event of a contract being discontinued, data can be extracted/cleansed as required/requested. System access decommissioned. No further action required.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Scale and image/interactive element placement
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Users can set up API interface by contacting support.

Detailed API documentation provided online at https://be.safe365global.com/api/docs/index
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
We monitor how users interact with the application. By analysing usage patterns, we can gain insights into user behaviour and identify any bottlenecks or performance issues. We use Azure based
Auto scaling in most resources that support it, it is a service that automatically adds or removes resources based on the load the application experiences.

Analytics

Service usage metrics
Yes
Metrics types
Benchmarking insights against comparitive organisations/industries to allow client to understand relative maturity. BI dashboard. Client reports provided throughout the period of service engagement. Detail available on change history.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
In platform export options for all data by Admin users.
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
System maintained to provide greater than 99.9% monthly system uptime calculated over a calendar year.

Should the Service fail to meet the guaranteed monthly uptime of 99.9%, Safe365 will provide the affected customers with a service credit as follows:
- 99.0% - 99.9% Uptime: 5% of pro-rated monthly subscription credited.
- 98.0% - 98.9% Uptime: 10% of pro-rated monthly subscription credited.
- Below 98.0% Uptime: 20% of pro-rated monthly subscription credited.

Service credits will be issued as a monetary refund or a discount applied to future payments, at the discretion of the customer.
Approach to resilience
Platform built on Azure architecture. More information on resilience can be found here: https://learn.microsoft.com/en-us/dotnet/architecture/cloud-native/infrastructure-resiliency-azure
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Via 2 factor Auth on a super admin access account.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We have a governance framework in place, with defined security policies and standards, and formally assigned roles and responsibilities. Risk assessment and management processes, security measures and controls, and awareness through training and 3rd party assessment. We monitor and audit, have incident management and regularly review and update at a board level.
Information security policies and processes
Comprehensive policy framework in place, aligned to ISO27001. Back end access based on RBAC. VPN utilised for added access security. Disaster recovery managed through BCP and Incident Response Procedures. Access audited. Endpoints managed by Microsoft Intune, Configuration Profiles rolled out enforced by Compliance Policies. Status reporting rolled up to weekly/monthly KPIs.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Regarding configuation and change management processes, we have a detailed inventory of components used within our platform, whether libraries, or 3rd party cloud applications, we use version control, dependency mapping and have automated tracking tools that monitor the status. Changes in potential security impacts, we regularly assess risk for each, consult with our partner IT tech security firm, test and update our policies and controls and training material. We follow ISO27001 standards for change management.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
With our vulnerability management process, potential threats are assessed using automated scanning tools, penetration testing, and threat intelligence. Patches for vulnerabilities are deployed swiftly, typically within 24 hours for critical issues, using a CI/CD pipeline and automated deployment tools to minimize downtime. Information about potential threats is gathered from security advisories, the security research community, industry partnerships, and subscription services to ensure comprehensive coverage and timely responses to emerging threats.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We use Azure Front Door, and Azure Sentinel services. We have multi stage severity response govnerned by our IMS manual.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have an IMS that defines processes in the case of an incident. Users can report through our helpdesk. Incident reports depending on severity again are controlled by our IMS manual, which is aligned to ISO27001

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Safe365 is on a mission to proactively reduce harm globally with a goal of having 100 Million workers covered by a proactive risk environment. Through our solutions, we change cultures and ways of valuing risk across organisations, helping them to improve their safety leadership, address lead risk indicators, and ultimately improve health and wellbeing outcomes and reduce harm in the workforce.

Pricing

Price
£15,000 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at pele.tanuvasa@safe365global.com. Tell them what format you need. It will help if you say what assistive technology you use.