Gatehouse Visitor and Contractor Management Database controls Visits to your Site(s) by Visitors and Contractors who are undertaking Works at your site.
Gatehouse manages Supplier On-Boarding, H&S Questionnaires, Bookings, Inductions, Risk Assessments, Method Statements and Emergency Plans, Site Fire Registers and Audit for evidence-based compliance.
- Supplier On-boarding and automated H&S Questionnaires & Renewals
- Centralised Approved Contractor Database
- Secure storage and retrieval of compliance documents
- Automated renewals of compliance documents
- Daily view of contractors due on site
- Access for Staff, Reception, and Security
- Unlimited Internal and External Users
- Inductions through Supplier Portal off-site
- RAMS Approval and Tracking
- Live Site Fire Register
- 24/7/365 access to all information
- Configurable to meet your policies, processes and procedures
- Aligns with your incumbent IOSH/NEBOSH procedures
- Centralised Contractor control database for internal and external audit
- One version of the truth around your visits and contractors
- Save significant time through automation
- Detailed and automatically renewed Contractor Compliance documents
- Mitigate incidents caused by non-compliant contractors to:
- Prevent damage to your reputation
- Avoid H&S fines and prosecutions
£14750 to £24500 per instance
- Education pricing available
Target Information Systems Limited
07702 248 948
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||Gatehouse has unlimited internal and external users and each instance is restricted to 50GB data storage. Additional storage is available on request.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||In FY2019 we responded to 99.7% of all support emails within the first hour.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
All support matters are to be first raised to the support email: email@example.com
Target provides application support between the hours of 9.00am and 5.30pm Monday to Friday excluding Bank Holidays.
A support matter emailed to the support email can be followed up with a call in office hours to: 01226 212 056.
Support incidents are split into three priorities:
This is where an application is unavailable and users are unable to access the system. This will be responded to in one hour in business hours and have a resource dedicated to the problem until it is resolved. Target will work 24/7 on this problem until it is resolved.
This is for intermittent, non-critical support matters where the application is available and an error is occurring which does not affect normal usage of the system.
Priority two matters will be responded to within four business hours, and typically resolved within 72 hours.
For minor matters such as layout issues, spelling mistakes in graphical text or minor amends; these will either be resolved within seven working days or scheduled for an agreed date/time.
|Support available to third parties||Yes|
Onboarding and offboarding
Gatehouse is very easy to onboard. We are able to help with data migration, installation and training.
Risk is minimised as your Site(s) will have an incumbent method for control of visitors and contractors and Gatehouse is not put to live until fully tested and accepted by the client.
|End-of-contract data extraction||
Client will need to have their data exported into their preferred format at time of terminations.
Details on cost are available on request.
The contract end date is agreed and requirements for exporting the data are discussed with the Account Manager.
Where development work is required for recovery of the data this is clearly documented, communicated, and controlled via our ISO9001 Quality Management Processes
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The available screen size of smaller devices can limit visibility of the information|
|Description of customisation||
Clients are able to customise their instance of Gatehouse to meet their specific policies, processes or procedures.
This configuration is undertaken by Gatehouse at the time of mobilisation.
Gatehouse is a highly flexible and configurable platform.
|Independence of resources||Gatehouse instances are on high-end server infrastructure with immediate access to CPUs, scalable memory and server storage.|
|Service usage metrics||Yes|
|Metrics types||User defined.|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with CSA CCM v3.0|
|Data sanitisation process||No|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Clients export their data through their requirements to their Account Manager.|
|Data export formats||CSV|
|Data import formats||Other|
|Other data import formats||Import not available to users, only at time of mobilisaton|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Approach to resilience||Available on request.|
|Outage reporting||Planned and unplanned outages are communicated via email.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
Gatehouse is configured to clients requirements where the permissions to access the database are configured at time of mobilisation.
Certain users have permission to set what access Users have to the database.
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Gatehouse is a product of Target Information Systems Limited who are operating to ISO27001 with accreditation expected in November 2019.|
|Information security policies and processes||Available on request.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Configuration of Gatehouse happens upon mobilisation which is supported by a project roadmap listing any out of scope items for future consideration.
Changes are managed through a Change Request procedure as part of our ISO9001 Quality Management System
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Available on request.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Available on request.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Available on request.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£14750 to £24500 per instance|
|Discount for educational organisations||Yes|
|Free trial available||No|