Bromcom Computers Plc

Bromcom MAT Vision

MAT Vision provides an online portal for viewing and aggregating data from multiple schools, partnered together in a Multi Academy Trust. It combines data on attendance, behaviour and attainment as well as staff absence, which can be interrogated with embedded BI dashboards and advanced reporting tools.


  • Logon at anytime from anywhere
  • Intuitive secure user interfaces
  • Cross school reporting
  • Powerful reporting and analysis with drill down capabilities
  • Sophisticated reports with grouping, charts and summary calculations
  • Automated integration across multiple school MIS databases
  • Compare pupil behaviour, assessment, attainment and attendance, and staff absence
  • Contextual filters
  • Embed commercial BI software e.g. MS Power BI or Tableau
  • Can present data graphically


  • Connects strategic objectives at the group level
  • Improves data ownership and quality
  • Deeper understanding of member school relative performance
  • Facilitate the sharing of best practice
  • Quick identification of strengths and weaknesses.


£15000 per instance per year

  • Education pricing available

Service documents

G-Cloud 10


Bromcom Computers Plc

Sales Office

020 8290 7171

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints The service is subject to planned maintenance, which is scheduled outside of normal UK school operational hours. Users are always given advance noticed of planned maintenance.
System requirements Web browser: Google Chrome, Microsoft Internet Explorer/Edge or Apple Safari

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our helpdesk is driven by SLAs which are shared with the customer. The priority of the call determines the response and resolution times.
System Down - Respond within 1 hour - Resolve in 4 hours
Critical - Respond within 2 hours - Resolve in 12 hours
High - Respond within 4 hours - Resolve in 24 hours
Medium - Respond within 8 hours - Resolve in 48 hours
Low - Respond within 16 hours - Resolve in 96 hours
Very Low - Respond within 32 hours - Resolve in 192 hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Costs are in the service pricing document, which shows the standard range of services offered. Each customer has a nominated lead support agent and an account manager. This enables Bromcom to provide a service to our customers, which is second to none in the industry. Typically Bromcom provides the Service Desk services for 1st, 2nd and 3rd lines and these are included in the costs contained in the pricing document. All staff working on Bromcom’s Service Desk are both product and technically trained helpdesk engineers and our aim is to resolve the majority of calls at first contact. Bromcom has a standard SLA to cover support service levels. Bromcom can also adapt the support function if the customer wishes to take on aspects of the support themselves. Multi Academy Trusts, Federation and Local Authorities may wish to take on the 1st line service desk, and sometimes also the 2nd line, for all or parts of the solution. Bromcom can provide specialist training and accreditation services to support third parties with this and can support integration of the respective service desks to ensure efficient escalation channels.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started A Project Manager is appointed to manage the on-boarding process from start to finish in consultation with the schools to make transition pain free. Once the Vision account is created, data integration can be set up. Training is provided using on-site and/or webinar methods supported by videos and user guides. The Group administrator is guided on which aspects of the service can be configured to their group’s needs. Typically the process of integration and training from Vision account creation to ‘Go Live’ takes less than a week. The group will be asked to decide on which reports and analysis functions are required to get started, which will be based on the harmonisation or not of the use of services such as pupil progress tracking and behaviour management across multiple schools.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats MP4 (video)
End-of-contract data extraction Customers can export any data at any time using built in functions, and therefore can extract data prior to the contract end. Vision is a reporting and analysis tool and as such the master data is read from the individual schools attached to the service.
End-of-contract process Customers can export any data at any time and therefore can export data manually prior to contract termination. The Vision account is decommissioned on expiry of the contract and no further access is available. All links to the associated school MIS databases will be switched off.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Certain web pages can render differently to take account of the screen size and having a touch interface or a keyboard.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Bromcom test the solution with web accessibility evaluation tools Powermapper and FAE Functional Accessibility Evaluator. The solution is compatible with the range of accessibility tools (magnify, zoom, high contrast, text to speech) as well as functioning with third party accessibility tools such as JAWS™ and Naturally Speaking by Dragon.
What users can and can't do using the API Bromcom’s Vision API is a secure web service that supports automatic data transfer from the School MIS to Vision. When MIS data is received it can be pushed securely to Vision. The API scope covers all data items used by Vision and is subject to access permission. All data transfers are encrypted using HTTPS connections.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation If facilities are not required (e.g. behaviour reporting and analysis), the menu of available options can be adjusted by the administrator. Also they can add logos, set the rules for user authentication, adjust default templates.


Independence of resources The service is designed to provide the stated services under all normal load conditions, including peak loading. Various load monitors are running 24/7 to log service loading and alerts provide service administration and management staff with weekly notice of performance and immediate notice of any exceptions outside of defined boundaries. The service capacity is increased in steps according to the customer number increase, although additional dynamic resource allocation is being built to provide further on demand allocation. Load balancing is used to distribute the load.


Service usage metrics Yes
Metrics types We provide users with the following metrics.

Via our support site you can get the following information:
Service uptime status,
Number calls raised, opened, and closed.

We can supply reports that provide you with the following information:
% of calls responded to within the SLA,
% of calls resolved within the SLA,
A call break-down by product and priority.

Automated reports can also be setup and e-mailed; an example being calls raised this week and outstanding calls.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Vision provides built-in functionality to export data at the core of the service. It is designed to be a tool to assist groups of schools report on and analyse data, and if required export it for further analysis. All the provided reports and analysis utilise a standard toolbar that enables users to export data.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • PDF
  • Excel
Data import formats Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We aim to provide customers with 99.99% availability between core schools hours, 8am to 5pm and 98% at off peak times. These figures do not include downtime for planned maintenance and upgrades. Customers are informed 5 days in advance of any planned work. In the event of a serious service failure we provide service credits.
Approach to resilience The service is hosted by Microsoft Azure on a Tier III platform with Tier IV physical infrastructure that offers 99.9% uptime service levels. Further information about the physical security of the data centres, geo-redundancy and other aspects of our resilience planning are available on request.
Outage reporting We provide a service status dashboard, which is available through our support site along with e-mail notifications to customers.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other
Other user authentication This can be configured to request in addition to password, random characters from a user entered memorable word. Password and random character rules are defined by the Vision administrator.
Access restrictions in management interfaces and support channels Only successfully authenticated users have access to management interfaces and online support channels. Telephone support channels also require the successful completion of a verbal authentication procedure before support will be given.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ISOQAR
ISO/IEC 27001 accreditation date 24/06/2016
What the ISO/IEC 27001 doesn’t cover Nothing. It applies to the whole datacentre
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 20/06/2017
CSA STAR certification level Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover None, all services are covered.
PCI certification Yes
Who accredited the PCI DSS certification URM (Ultima Risk Management)
PCI DSS accreditation date 22/08/2016
What the PCI DSS doesn’t cover Our PCI DSS scope is the support domain which is where all support to clients is conducted and all client information is held and accessed. This domain has extremely stringent security controls applied to it.
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security governance falls under the control of Bromcom’s senior management and operations team with oversight by Bromcom’s Quality Manager (re ISO 9001). Led by Bromcom’s Managing Director, governance is aligned with the overall goals and priorities of the organisation. Individuals throughout the organisation who could have a role in security decisions are identified and advice updated as required to ensure individuals are empowered and accountable for their decisions and consequences.
Information security policies and processes Data Security Policy,
Personal Data Security Policy,
Safe guarding Policy,
Data Protection Policy,
Business Continuity Management,
Computer and e-mail acceptable use policy,
Internet acceptable use policy,
Password protection policy,
Clean desk policy,
Physical security practices policy (e.g. building).

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Policies are in place to regulate the creation, testing, implementation and retirement of each component of the service. Beta environments are used in which tests are carried out on the internal performance of new components and their interaction with the main service.
Multiple stakeholders are involved in the change process as users generate requests and they are considered from the perspective of utility, feasibility and security. The purpose, scope and responsible engineer of each change is logged, so an audit trail is available. After beta testing a separate risk analysis is conducted to consider any unforeseen impact on the service.
Vulnerability management type Supplier-defined controls
Vulnerability management approach To maintain a secure network patches are reviewed within four hours of release then classified as emergency, critical, non-critical or non-applicable. Emergency patches are deployed within eight hours, while other applicable patches are applied within five days. The IT Manager undertakes a continuing process of vulnerability monitoring, identifying threats through daily scans of the network for known attacks and vulnerabilities and review of external sites, including and those of all vendors whose software operates within the network. All networked devices have current anti-virus software and vulnerability through human action/error is minimised by data security training for all staff.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Security at the border of the network is maintained through account locking at the third unsuccessful login attempt and the (optional) restriction of acceptable IP addresses for roles or users. Users with appropriate access can schedule an activity log to be generated to identify unusual patterns of access or activity. When data breaches are identified a defined process is followed and the incident is tagged as a breach for purposes of audit so that system integrity can be restored as quickly as possible. Data Breach Incidents are of critical priority and are resolved within three days.
Incident management type Supplier-defined controls
Incident management approach All incidents are logged and strictly dealt with following pre-defined processes. Faults are identified, quickly isolated and a potential work around determined. If no workaround is possible, or the incident is deemed to have too great an impact on system operation then the recovery phase of the Change management processes returns the system to its prior state within SLA timeframes. In the event that a work around is available, this will be distributed to all system users and work on a permanent solution will be undertaken via Problem Management. Customers have online access to review the status of their incidents.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £15000 per instance per year
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑