All Services Hub
The All Services Hub provides Councils with a searchable information Hub bringing all community service information into one place for Adult Social Care, Family & Childcare Services, SEN and other community services to meet Care Act and Children's Act reforms. The All Services Hub is a SaaS solution.
Features
- Easy upgrade option from either ASC or FIS Hub
- Advanced data harvesting function
- Advanced REST API for case management integration
- Support and wellbeing planning, triaging and assessment tools
- Data Sharing module
- Advanced Ofsted Feed Manager for Ofsted registered providers
- Search Widget options for projecting content to partner sites
- Providers manage their listings via secure login
- Advanced reporting module option
- Care Accounts module available
Benefits
- Use the UK leading solution for Information Advice and Guidance
- Be fully compliant with the Care Act
- Be fully compliant with the Childrens Act
- No duplication of content across channels
- Integrates seamlessly with you corporate web site
- Integrates with call centre CRM’s including Lagan and Microsoft Dynamics
- SLA provides fast track turnaround of support requests
- Consolidates technology and admin functions into single solution
- Improved usability for users with advanced search and browse options
- Easily projects your content to partners using the Search Widget
Pricing
£66110 per unit
Service documents
Framework
G-Cloud 11
Service ID
329784917556315
Contact
Service scope
Software add-on or extension | Yes, but can also be used as a standalone service |
What software services is the service an extension to | Idox Open Objects Datastore Platform |
Cloud deployment model | Hybrid cloud |
Service constraints | No |
System requirements |
|
User support
Email or online ticketing support | Email or online ticketing |
Support response times | According to our published SLA (Service Definition) |
User can manage status and priority of support tickets | Yes |
Online ticketing support accessibility | WCAG 2.1 A |
Phone support | Yes |
Phone support availability | 9 to 5 (UK time), Monday to Friday |
Web chat support | No |
Onsite support | Yes, at extra cost |
Support levels | According to our published SLA (Service Definition) |
Support available to third parties | Yes |
Onboarding and offboarding
Getting started | Onboarding on-site training and support services. |
Service documentation | Yes |
Documentation formats |
|
Other documentation formats | Training video clips for core functions |
End-of-contract data extraction | As structured CSV |
End-of-contract process | Data is provided to customer |
Using the service
Web browser interface | Yes |
Supported browsers |
|
Application to install | No |
Designed for use on mobile devices | Yes |
Differences between the mobile and desktop service | None |
Accessibility standards | WCAG 2.1 AA or EN 301 549 |
Accessibility testing | Screen reader's have been tested with presences. |
API | Yes |
What users can and can't do using the API | Can: Extract all data on demand, and iterate to extract specific data records or sets of records. |
API documentation | Yes |
API documentation formats | |
API sandbox or test environment | Yes |
Customisation available | Yes |
Description of customisation | Service can be customised to adopt any banding with local configuration options and controls via web admin GUI. |
Scaling
Independence of resources | High redundancy and load balancing and scalable bandwidth on demand. |
Analytics
Service usage metrics | Yes |
Metrics types | Usage statistics and database reporting |
Reporting types | Real-time dashboards |
Resellers
Supplier type | Not a reseller |
Staff security
Staff security clearance | Other security clearance |
Government security clearance | Up to Baseline Personnel Security Standard (BPSS) |
Asset protection
Knowledge of data storage and processing locations | Yes |
Data storage and processing locations | United Kingdom |
User control over data storage and processing locations | No |
Datacentre security standards | Complies with a recognised standard (for example CSA CCM version 3.0) |
Penetration testing frequency | Less than once a year |
Penetration testing approach | Another external penetration testing organisation |
Protecting data at rest | Physical access control, complying with another standard |
Data sanitisation process | Yes |
Data sanitisation type | Deleted data can’t be directly accessed |
Equipment disposal approach | A third-party destruction service |
Data importing and exporting
Data export approach | Via the admin user console |
Data export formats | CSV |
Data import formats | CSV |
Data-in-transit protection
Data protection between buyer and supplier networks | TLS (version 1.2 or above) |
Data protection within supplier network | TLS (version 1.2 or above) |
Availability and resilience
Guaranteed availability | 98% availability per 30 day period |
Approach to resilience | We provide a highly redundant, load balanced environment with scalable bandwidth on demand. |
Outage reporting | Outages are reported via the Idox Service Desk. |
Identity and authentication
User authentication needed | No |
Access restrictions in management interfaces and support channels | Public web is open access. The service provides open access web browsing, secure access for administrator access and professional. Management access is permitted only from internal networks, themselves requiring two factor authentication to access. Access control lists restrict access. |
Access restriction testing frequency | At least every 6 months |
Management access authentication |
|
Description of management access authentication | Authentication is via centrally controlled accounts where possible. |
Audit information for users
Access to user activity audit information | Users have access to real-time audit information |
How long user audit data is stored for | At least 12 months |
Access to supplier activity audit information | Users have access to real-time audit information |
How long supplier audit data is stored for | At least 12 months |
How long system logs are stored for | At least 12 months |
Standards and certifications
ISO/IEC 27001 certification | Yes |
Who accredited the ISO/IEC 27001 | QMS International Ltd |
ISO/IEC 27001 accreditation date | 18/06/2016 |
What the ISO/IEC 27001 doesn’t cover | N/A |
ISO 28000:2007 certification | No |
CSA STAR certification | No |
PCI certification | No |
Other security certifications | Yes |
Any other security certifications | Cyber Essentials |
Security governance
Named board-level person responsible for service security | Yes |
Security governance certified | Yes |
Security governance standards | ISO/IEC 27001 |
Information security policies and processes | Idox Software Ltd has an ISO 27001-accredited information security management policy that applies to the business functions within the scope of the Information Security Management System and covers the information, information systems, networks, physical environment and people supporting these business functions. Internal audit and information security awareness training is conducted to ensure policies are followed. Risks raised through internal and external audits are reviewed at management meetings by the information security manager, the appropriate head of business and a board representative. |
Operational security
Configuration and change management standard | Supplier-defined controls |
Configuration and change management approach | Changes requests are raised, risk assessed and then deployed to a test system/environment as applicable. It will then be passed to production following a succesful sign-off by QA. |
Vulnerability management type | Supplier-defined controls |
Vulnerability management approach | We monitor a variety of sources for new software vulnerabilities and vulnerability reports, and software vendors for patches and new releases. Major releases of public facing applications undergo internally and/or externally conducted penetration testing. New vulnerabilities are risk assessed and deployed to the environment accordingly. |
Protective monitoring type | Supplier-defined controls |
Protective monitoring approach | A variety of IDS systems monitor activity and raise alerts accordingly. All systems are monitored for unusual activity above this. Security personnel are alerted 24x7 for any concerning activity. Any potential compromised raised in line with our security incident reporting procedure. |
Incident management type | Supplier-defined controls |
Incident management approach | Security incident reporting process summary: incidents or suspected incidents are raised to internal service desk and reviewed by information security manager. They are allocated a risk reference, entered into the information security risk log and tracked until closure. In the case of major incidents a major incident report will be produced. |
Secure development
Approach to secure software development best practice | Conforms to a recognised standard, but self-assessed |
Public sector networks
Connection to public sector networks | No |
Pricing
Price | £66110 per unit |
Discount for educational organisations | No |
Free trial available | No |