Safe365
We aid safety leaders in preemptively minimising harm. Our digital tool fosters collaboration, consistency, accessibility, and scalability in assessing safety risks. Users gauge safety culture maturity, identify strengths and weaknesses, and utilize data visualisation to enhance engagement and showcase continuous improvement impact.
Features
- Diagnostic survey simplifies regulatory language and bestpractice theory intosimplified questions
- Automated, visual, quick to interpret data summaries, highlight strengths weaknesses
- Readymade targeted actionplan reflective of current strengths and weaknesses identified
- Benchmarking showing score relativeto peers, other industries, geographies, organisational size
- Individual businessunit and aggregate maturity profiles by division, region, country
Benefits
- Reduced time and cost of maturity diagnosis
- Improved accuracy ofcurrent performance at any one time, live dashboard
- Supports team capability development
- Enables nonsafety leadership to connect lead indicators with tangible action
- Avoids complacency dueto assumptions of excellence vs real comparative data
- More targeted work streams, increasingly likelihood of impact/change
Pricing
£15,000 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 9 5 5 9 0 5 1 7 5 3 1 9 6 7
Contact
SAFE365 GLOBAL (UK) LTD
Pele Tanuvasa
Telephone: +64211275290
Email: pele.tanuvasa@safe365global.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- Internet Connection (SaaS)
- Web Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- First Response SLA of 120 minutes for Business Hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Full support provided as part of Software Subscription. Account Manager assigned as point of contact for clients.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite or Online training, according to user requirements. Help Centre/Knowledge Center available 24/7 with comprehensive how-to-guides. 1:1 support from Customer Enablement specialist assigned to client. Micro-credentials available through Safe365 University, an interactive system walk through.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Via our Help Centre, Support Team or Account Manager, and online CSV extracts available from the platform.
- End-of-contract process
- System is designed as a continual improvement tool to support organisations on a long term basis. In the event of a contract being discontinued, data can be extracted/cleansed as required/requested. System access decommissioned. No further action required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Scale and image/interactive element placement
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Users can set up API interface by contacting support.
Detailed API documentation provided online at https://be.safe365global.com/api/docs/index - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
-
We monitor how users interact with the application. By analysing usage patterns, we can gain insights into user behaviour and identify any bottlenecks or performance issues. We use Azure based
Auto scaling in most resources that support it, it is a service that automatically adds or removes resources based on the load the application experiences.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Benchmarking insights against comparitive organisations/industries to allow client to understand relative maturity. BI dashboard. Client reports provided throughout the period of service engagement. Detail available on change history.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- In platform export options for all data by Admin users.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
System maintained to provide greater than 99.9% monthly system uptime calculated over a calendar year.
Should the Service fail to meet the guaranteed monthly uptime of 99.9%, Safe365 will provide the affected customers with a service credit as follows:
- 99.0% - 99.9% Uptime: 5% of pro-rated monthly subscription credited.
- 98.0% - 98.9% Uptime: 10% of pro-rated monthly subscription credited.
- Below 98.0% Uptime: 20% of pro-rated monthly subscription credited.
Service credits will be issued as a monetary refund or a discount applied to future payments, at the discretion of the customer. - Approach to resilience
- Platform built on Azure architecture. More information on resilience can be found here: https://learn.microsoft.com/en-us/dotnet/architecture/cloud-native/infrastructure-resiliency-azure
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Via 2 factor Auth on a super admin access account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have a governance framework in place, with defined security policies and standards, and formally assigned roles and responsibilities. Risk assessment and management processes, security measures and controls, and awareness through training and 3rd party assessment. We monitor and audit, have incident management and regularly review and update at a board level.
- Information security policies and processes
- Comprehensive policy framework in place, aligned to ISO27001. Back end access based on RBAC. VPN utilised for added access security. Disaster recovery managed through BCP and Incident Response Procedures. Access audited. Endpoints managed by Microsoft Intune, Configuration Profiles rolled out enforced by Compliance Policies. Status reporting rolled up to weekly/monthly KPIs.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Regarding configuation and change management processes, we have a detailed inventory of components used within our platform, whether libraries, or 3rd party cloud applications, we use version control, dependency mapping and have automated tracking tools that monitor the status. Changes in potential security impacts, we regularly assess risk for each, consult with our partner IT tech security firm, test and update our policies and controls and training material. We follow ISO27001 standards for change management.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- With our vulnerability management process, potential threats are assessed using automated scanning tools, penetration testing, and threat intelligence. Patches for vulnerabilities are deployed swiftly, typically within 24 hours for critical issues, using a CI/CD pipeline and automated deployment tools to minimize downtime. Information about potential threats is gathered from security advisories, the security research community, industry partnerships, and subscription services to ensure comprehensive coverage and timely responses to emerging threats.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We use Azure Front Door, and Azure Sentinel services. We have multi stage severity response govnerned by our IMS manual.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have an IMS that defines processes in the case of an incident. Users can report through our helpdesk. Incident reports depending on severity again are controlled by our IMS manual, which is aligned to ISO27001
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Safe365 is on a mission to proactively reduce harm globally with a goal of having 100 Million workers covered by a proactive risk environment. Through our solutions, we change cultures and ways of valuing risk across organisations, helping them to improve their safety leadership, address lead risk indicators, and ultimately improve health and wellbeing outcomes and reduce harm in the workforce.
Pricing
- Price
- £15,000 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No