HFX Limited

Imperago Visitor Registration

Imperago Visitor Registration enables everyone, anywhere to register their presence and location using cloud based/enabled devices including mobile, telephony, proximity and biometric technology.

It can record the visitor, host, company, car registration and contact email (optional) as well as card number if badges are also provided.


  • Immediate visitor attendance recording.
  • Automatic notification to host.
  • Real time reporting and management statistics.
  • Mobile and remote access.
  • Track visitor attendance.
  • Real time muster/ location view
  • Mobile and messaging options.
  • Group & location views
  • Management dashboard
  • Full audit capability.


  • Accurate recording of visitor attendance
  • Visibility on visitor attendance for GDPR compliance.
  • Reduce staff costs and overheads
  • Real time management reporti.
  • Interfacing with other business systems.
  • Reduce administration overhead.
  • Rapid low cost deployment.
  • Immediate return on investment.
  • No local IT infrastructure required.
  • Easy to use, minimim training requirement.


£100.00 to £100.00 per instance per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

1 1 0 0 1 9 3 6 0 6 0 1 3 4 0


HFX Limited

Alex Boa

03333 44 7872


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Imperago Access Control
Imperago Time & Attendance
Cloud deployment model
Public cloud
Service constraints
System requirements
Will work on any internet connected device

User support

Email or online ticketing support
Email or online ticketing
Support response times
The priority of the call will naturally dictate the most appropriate action for any given support call, ensuring the minimum of disruption to users. However they will fall in in line with the four call statuses outlined below:
• Priority P1 – Resolution time 8 hours
• Priority P2 – Resolution time 2 days
• Priority P3 – Resolution time 3 days
• Priority P4 – Resolution time 5 days
• Priority P5 – Resolution time 10 days
During the process of resolving a fault there may be a change of call Priority.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Onsite support
Support levels
Hfx provide the following support services included at no additional cost:

Perform first and second level support for all supported hfx software and hardware products to authorised customer personnel
Provide detailed technical support direct to the customer as escalated
Provide support on customer’s site where escalated and
Process scheduled/planned work requests (installations, upgrades etc.)
Process and manage faults with Development
Support available to third parties

Onboarding and offboarding

Getting started
Hfx has developed a standardised approach to configure the solution to support our customers. The approach is both collaborative and iterative, designed to build relationships between hfx and the customer to ensure that the configured solution delivered meets the customer’s needs. hfx will also assist and support its customers in aligning/realigning their business processes to enable them to maximise the benefits of the solution.

The solution also requires system users’ role-based access (RBAC) rights to be set up, either individually or in groups, to ensure that individuals’ permissions are applicable to their roles within the organisation, and that sensitive personal/clinical information is only accessible to those that need to see it.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
At the end of the contract term, hfx will work with the customer to agree an exit plan, including the migration of data from the system and the decommissioning of any locally sited hardware provided under the contract. The customer can usually extract its own data from the system for migrating into the new/replacement system using the tools provided. Additional consulting and support services can be provided at additional cost if these are required.
End-of-contract process
At the end of the contract term, hfx will work with the customer to agree an exit plan, including the migration of data from the system and the decommissioning of any locally sited hardware (if any) provided under the contract. The customer can usually extract its own data from the system for migrating into the new/replacement system using the tools provided, and additional consulting and support services can be provided at additional cost if these are required.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Full functionality is offered on both a mobile and desktop device.
Service interface
What users can and can't do using the API
The interface has the ability to:
Upload people.
Time clockings,
Download absences, people, time to pay, shifts.

It is commonly used to interface with third party applications, i.e. HR & Payroll providers.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
A degree of customisation is available though the ability to add in company logo's to the sign in and home screens.

Users can also add in working patterns and templates specific to both the organisation and employee.

Users can customise the dashboard to individual preferences.


Independence of resources
The SaaS platform has significantly greater resources than are required for current use.

The database design uses a distributed, resilient system so data is distributed amongst a number of nodes to provide resilience as well as performance.

All web servers are load balanced therefore additional servers can be commissioned with 24 hours to ensure optimal user performance.


Service usage metrics
Metrics types
Service uptime. Support calls taken, resolved, outstanding by priority and against SLA.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Imperago offers users the ability to export data via the menu facility including CSV, Excel and PDF.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats
WebServices via HFX RAPID Tools

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9% availability.

For each outage below this level a daily pro-rata refund is made.
Approach to resilience
This information is available on request.
Outage reporting
E-mail alerts and also core services dashboard will keep users informed of availability.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
The system has a highly configurable permissions architecture that allows each data item to be separately configured if desired. However, in reality, this is rarely required, and grouped fields are generally used. Permission access is RBAC based. Roles are completely configurable, although the system comes preconfigured with a number of useful templates such as Group Administrator, Manager and HR Staff.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials.
Information security policies and processes
An internal policy is in force which covers the way data is accessed, stored and managed during the whole lifecycle. This is followed by the support teams and cloud service team and is owned by the CTO.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Proposed changes are documented and risk assessed. Roll-back processes and procedures are documented and tested. Customer notified of risks, rollbacks and timelines for approval
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability testing is carried out on a regular basis using commercial tools. Subscriptions from vendors and third parties also alert to vulnerabilities which the tools do not yet identify.
Patches and updates are applied within 24 hours of being available, or if no solution is available from a vendor, alternative action will be taken to mitigate or negate the risk.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Automated reporting of intrusion attempts and unusual activity is via multiple hardware and software systems which report by e-mail in real time to multiple addresses. All authentication logs and machine alerts are kept off-site so can not be deleted by attacker.
Escalation process is immediate in the event and engineers and Director will be alerted. Engineers are on call 24/7.
Incident management type
Supplier-defined controls
Incident management approach
Incident Management is controlled by a process which guides the team through the assessment of the incident, evaluation of risk, loss and services affected.
Users can either ring, e-mail or report via the support portal. Incidents are prioritised as P1 (highest priority).
All incidents are followed up with a report detailing the root cause, immediate resolution and the changes to be implemented to prevent reoccurrence.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£100.00 to £100.00 per instance per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑