Avane IoT Cloud Staff Roll Call Analytics and Rules Engine
Avane IoT Analytics and Rules Engine is robust IoT platform that enables the efficient adoption of IoT technology for your organisation.
The Roll Call application enables an organisation to monitor attendance, access, and emergency evacuation of staff and visitors.
The platform is supported by mobile applications.
Features
- Flexible Cloud IoT Platform As a Service
- Find out where are your staff, patients and visitors
- Person Tracking, Rules and Reporting Engine
- Mobile Phone devices as an alternative IoT device
- Web and SMS Alerting Service
- API Interface for incoming / outgoing orchestration
- Multi-Tenancy and Multi-Hierarchy Management framework
- AWS Scalable Environment
- Cloud as Standard; On-Premise Option / Siloed Databases
- Mobile Networking, Analytics, Alerts, API Library
Benefits
- Fire Assembly Point Cloud IoT Platform
- Customisation Services for fit to purpose
- Analyse incoming data in real time
- Carry out On-location Roll Call Check
- Highly Secure Data Structure Framework
- Affordable Licensing Model
- Design and Architecture Services available
- Provide Real time location of Staff, Patients and Visitors
Pricing
£5 to £10 a person a month
- Education pricing available
- Free trial available
Service documents
Framework
G-Cloud 12
Service ID
2 4 1 0 8 7 7 2 4 9 2 7 6 5 4
Contact
Holhooja Ltd.
Government Cloud Team
Telephone: 07736552007
Email: gcloud@holhooja.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
-
You will need to provide your own IoT device and architect their sensory requirements; then you will require an IoT Gateway to route IoT sensory data to our platform; then all you need is a web browser to manage the environment.
Holhooja can assist in the design and architecture service based on business requirements and suitability to the environment. We can also use staff mobile devices as your IoT sensory devices with integrated gateway using Avane.ai mobile application gateway. - System requirements
-
- Web Browser
- IoT Devices
- IoT Gateway
- Mobile Phone devices as an alternative IoT device
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 8 working hours. Support is provided by us.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our baseline support is based on the following:
P1 : Critical Incidents, Initial Response Goal : 4 Business Hours,
P2: Major Incidents, Initial Response Goal : 2 Business Days,
P3 : Minor Incidents : 2 Business Days.
Support Available : 09:00 ‐ 17:00
A Customer Success /technical account manager may be available subject to feasibility and at a mutually agreed price
For On Premise, a discussion is required to determine the scope and is subject to feasibility. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We will help you review the requirements and suitability of the standard solution. We offer at an additional charge architecture and design service to prepare you to implement an IoT based solution within your organisation.
IoT devices are a key item to ensure that functionality and adoption of the service. Holhooja can help you select the most appropriate IoT devices or the adoption of mobile phone devices as an IoT device in the short term.
We can also assist you in the design and network integration for mobile IoT devices to associate with a dedicated or shared wireless access point (WAP / BLE / RFID).
We offer you a comprehensive on-boarding experience which includes training the administrator, monthly customer service calls, documentation, and support. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Video documentations
- Learning Guides
- End-of-contract data extraction
- Reports are available on the Administration dashboards and can be reproduced from customised reports for a specific day, period, etc. Report can be download the report data as CSV files
- End-of-contract process
- Access to the Cloud Platform will be disconnected; Customer Data is securely wiped from Avane.ai Data Centres.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile version is application based based on service
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- REST API
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Service is built on the highly scalable AWS infrastructure
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Both:
- Phishing Reports
- Training Reports
can be reviewed through the Admin Dashboard. - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Avane.ai
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- User Training Reports can be exported by trainees and training administrators using the web interface.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- Manual importing of trainee email addresses
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99.9% availability
In the unlikely event of non-SLA compliamce, non-availability would be refunded by compensation time. - Approach to resilience
- Service is built on a highly resilient infrastructure
- Outage reporting
- By email to customers
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Undisclosed
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
-
Avane.ai has the following Cyber Security Management Structure:
- Head of Cloud Security, Compliance and Certifications
- Cloud Compliance and Certification Manager
- Cloud Security Technical Manager
- Cloud Security and Compliance Sales Support Manager
Security Policies:
Our Cloud tenants are hosted at Amazon Web Services (AWS). AWS has been certified according to ISO 27001, DSS and other standards (http://aws.amazon.com/compliance/). It features extensive physical security measures and is independently audited. Audit reports can be obtained directly at AWS Compliance
(http://aws.amazon.com/compliance/contact/).
Avane.ai ensures that Customer data stays confidential and cannot be tampered with through an end-to-end implementation of HTTPS from devices to applications
All functionality of Avane.ai is implemented with secure REST APIs.
Detailed Auditing and retention is agreed with the customer based on storage and real-time capacity.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- In line with ISO 20000 process
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- In line with ISO 27001.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
A number of SIEM best practices are employed in safeguarding and monitoring information service such as:
o Compliance
o Access control
o Perimeter Defences
o Resource Integrity
o Intrusion Detection
o Malware Defence
o Acceptable Use - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- In line with ISO 20000
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £5 to £10 a person a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- For serious interest, Avane.ai can offer a limited time and device setup as a "Proof of Concept" to enable the organisation to evaluate its requirements and start its IoT Journey.
- Link to free trial
- Please contact us to arrange