SDS HomeMatch focuses on property sales process management in the social housing sector. It streamlines the process for shared ownership and outright sale properties. HomeMatch automates the financial assessment and matching of people with properties, and digitises the documentation required. HomeMatch incorporates Workflow and includes the Regulator's affordability calculator.
- Document/Data storage for all elements of the sales process
- User configurable Workflow (track/manage your sales process in real time)
- Dashboard alerts when tasks fall behind schedule (configurable)
- Manage Documents and Property Viewings
- Incorporated Homes England Affordability calculator for Shared Ownership
- Automatically find suitable applications for any property & vice-versa
- Define, collect, validate applicant data through web portal
- Automate emails, chasers, documents etc to applicants & other stakeholders
- Integration with SDS Sequel Project Management software
- Import / export data to CSV or Excel
- Streamlines the property sales process for Social Housing providers
- Centralises the repository for all sales related data and documents
- Frees up staff time to focus on value add activities
- Accessible on mobile devices
- Standardises the sales process within the organisation
- Allows real time tracking & reporting of sale status/progress
- Reduces compliance risk
- Improves Customer experience via better management of sale process
- Improves cashflow forecasting accuracy when synchronised with SDS Sequel
- Automates Data collection, validation, and storage.
£10000 to £20000 per instance per year
Shelton Development Services Limited
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Support is provided during business hours.
Critical support tickets we have a 4 hour initial response SLA with a 5 day resolution unless it involves a fix to be implemented in the application in which case it's a 20 day resolution.
Lower support levels vary with the lowest importance having an 3 day response and 20 day resolution unless it involves a fix to be implemented in the application in which case it's 2 months
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
We offer the same level of support to all our customers. If a customer logs a call it defaults to 'Urgent' which requires a 4 business hours response.
Initial support tickets are created via email to firstname.lastname@example.org, via a phone call to 01483 278444 or existing users can create their own ticket in our Support application Freshdesk.
Support calls are dealt with in the order they arrive by the next available support team member enabling calls to be triaged and prioritised accordingly.
We do not provide a technical account manager for an organisation but we do allocate technical managers for specific projects - system upgrades etc.
|Support available to third parties||Yes|
Onboarding and offboarding
On-site training is provided for any number of individuals, run on a day basis for up to 6 people at a time.
We also provide an E-Learning solution which offers a virtual classroom experience where up to 8 users can attend over a number of 1.5 hour sessions.
End user documentation is provided on our website.
|End-of-contract data extraction||This can be downloaded using either reports or exported via CSV by the client from their user interface|
|End-of-contract process||The price will be determined by the service required. There will be the rental cost of the software. Typically there will also be an initial training cost and potentially (depending on the size and requirement of the client), consulting costs to provide implementation support. At the end of the contract the client will have the option to extend the software rental on an annual basis. This pricing will be determined at the time of renewal.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Functionally there are no differences however there will be navigation differences due to screen size|
|Description of service interface||Web browser|
|Accessibility standards||WCAG 2.1 AAA|
|Accessibility testing||Only automated compliance checking tools are used.|
|Description of customisation||The software is configurable (or customisable) by the Client. Training will be provided on the various set up and admin functions which enable the data, workflow and document areas to be tailored to the client's specific needs. This would typically be undertaken by the business owner (rather than IT). For additional charge, SDS can undertake this process on behalf of the client (see pricing for more details).|
|Independence of resources||
The database backend is Google Cloud Firestore which has been designed to scale automatically with demand.
The web server front end is Google AppEngine which auto-scales with demand.
Each running server instance has its own queue for incoming requests. If App Engine detects that queues for an application are getting too long due to increased load, it automatically creates a new instance of the application to handle that load within a few seconds.
|Service usage metrics||Yes|
The number of entities in each database table is reported on screen.
Each user's activity is logged and reported on a daily, weekly, monthly and annual basis. Administrators can thus identify inactive (or non-productive) user accounts, and spot anomalous behaviour by looking at the frequency and pattern of actions performed by users.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||EU-US Privacy Shield agreement locations|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Other data at rest protection approach||
Google Cloud Platform encrypts customer content stored at rest, without any action required from the customer, using one or more encryption mechanisms.
Data for storage is split into chunks, and each chunk is encrypted with a unique data encryption key. These data encryption keys are stored with the data, encrypted with ("wrapped" by) key encryption keys that are exclusively stored and used inside Google’s central Key Management Service. Google’s Key Management Service is redundant and globally distributed.
Data stored in Google Cloud Platform is encrypted at the storage level using either AES256 or AES128.
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Users export their Application or Scheme data by using a button and field filter which generates a 'csv' file|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||See https://cloud.google.com/appengine/sla|
|Approach to resilience||
Google operates a global network of data centers to reduce risks from geographical disruptions. The link below includes the locations of our data centers:
Google does not depend on failover to other providers and builds redundancy and failover into its own global infrastructure.
Google performs annual testing of its business continuity plans to simulate disaster scenarios that simulate catastrophic events that may disrupt Google operations.
Public dashboard with service availability and service issues here:
API: JSON Feed, RSS Feed
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Your administrators authorise which of your users can take action on specific resources, giving you full control and visibility.
Support services are only provided to authenticated users. SDS access has to be granted by the user for each incident and is logged for auditing purposes. This log is available to your administrators.
|Access restriction testing frequency||At least once a year|
|Management access authentication||Identity federation with existing provider (for example Google Apps)|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||GDPR|
|Information security policies and processes||https://cloud.google.com/security/compliance/#/regions=Europe|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Our source code is managed in GIT version control system. Committing new/changed code the repository triggers an automated build, test and deploy (if tests pass) process. In addition to this, deployed versions can be rolled back to last ten versions within seconds.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||See https://cloud.google.com/security/overview/whitepaper#vulnerability_management|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||See https://cloud.google.com/security/overview/whitepaper#monitoring|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||See https://cloud.google.com/security/overview/whitepaper#incident_management|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£10000 to £20000 per instance per year|
|Discount for educational organisations||No|
|Free trial available||No|