Timegate is used to manage the Cleaning, Security and FM services workforce. Timegate helps you to plan your workforce and helps you deliver building services.
Effective visibility, control and management of the front line teams will help ensure you have great workplaces for all of your colleagues and visitors alike.
- Workforce Management for Cleaning, Security and Facilities Services
- Time & Attendance
- Scheduling, Rostering, Planning
- Service Delivery, Patrolling, eDoB, Incidents, Forms
- Lone Worker Safety
- Employee Engagement
- Real time management
- Accuracy of payroll for employees
- Accuracy of payroll for employers (overtime, holiday )
- Proof of service delivered to buildings, sites and other locations
- Reduction in the reliance on sub-contract cleaners and security
- Proof that correct personnel on site, on time.
- Management of sub-contractors to prove service delivery
- Business intelligence on Service being supplied
£17 per person per year
Sales & Marketing
0370 626 0400
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||Timegate requires a level of configuration. Innovise will operate a workshop to help the buying organisation define their needs and Timegate will be configured by Innovise for them thereafter.|
|System requirements||Web browser e.g. Chrome|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Priority 1 - Calls are answered 24 hours, 7 days a week.
Priority 2 to 4 - Calls and emails are responded to from 1 hour to 8 hours, subject to level of priority.
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||
Innovise use a variety of tools to accommodate the variety of needs our clients have.
This is used to engage with Support Engineers and both show to engineers, and see what engineers are doing.
|Web chat accessibility testing||Innovise adopt off-the-shelf tools. We use assistive technologies if provided.|
|Onsite support||Yes, at extra cost|
More than 99% of Innovise support activity is by phone or email to a UK based support desk. Over 80% of the case raised are fixed first time.
Where required, consultants can be booked to come to site to help clients.
Innovise also operate a customer success function which proactively support clients and micro-train users based on their function or role within the organisation. This is available 0900-1700 GMT.
|Support available to third parties||Yes|
Onboarding and offboarding
Innovise recommend a mix of classroom led training, online training and user documentation. Normal delivery is 'Train the trainer' or 'Train the Super User' so buying organisations can cost effectively adopt the technology.
Innovise will assist clients with the initial build and configuration of the technology removing any need for users to demonstrate a level of advanced IT literacy.
|End-of-contract data extraction||Innovise provide a copy of all the data to clients at the end of the agreement. Usually this is a copy of the SQL or if configured, a data warehouse. As the data contains Personally Identifiable information (PII) and is often sensitive too (SPII), if no request is received or a repository provided to Innovise within 30 days of the end of the contract the data is deleted.|
|End-of-contract process||Innovise to not have any additional charges beyond what is included in the quote.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Not all features are suitable for mobile phone users.
Certain screens are better suited to a larger landscape as they contain necessary information that is not easily viewed and operated on smaller screens. Other screens are optimised for mobile users.
The Timegate user experience is optimised for the different roles within the software.
|What users can and can't do using the API||
The API allows users to work with Timegate in a variety of different ways.
The options are expansive and it is not possible to fully detail this within G-Cloud. It is recommended that buying organisations contact Innovise for more information.
Sandboxes and test environments can be provided. If required, these will be provided at additional cost.
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||
Timegate is fully configurable including the service.
Clients have material scope to configure the applications and workflows, look and feel of the application itself.
Additional services such as Sandboxes for testing and training can also be configured but these options are controlled by Innovise owed to their complexity and Service impact.
|Independence of resources||
Innovise monitor and manage the private and public cloud resources and optimise them for user experience (UX).
Inherent in the design are load balancing techniques and tools which also optimise resources to ensure that users don't impact each other.
|Service usage metrics||Yes|
Innovise provide benching marketing for user metrics.
Innovise also track Service availability/uptime and Service interruption metrics. These can be supplied on demand.
|Reporting types||Reports on request|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||Less than once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
There are a variety of methods to extract data.
Reports, Dashboards and standard features of this type will generally export to PDF, Excel, Word. The type of export dictates the formats supported.
Data can also be passed to Data Warehouses. Similarly, data can be copied, zipped and securely transported to physical locations.
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||
Availability and resilience
Availability for Innovise SaaS Services is targeted to be 99.9%.
Availability is measured on a rolling annual basis considering the total number of Downtime Minutes. Downtime Minutes exclude time that the Customers are unable to access the Service due to any of the following:
a) System Planned Maintenance time
b) Any systemic Internet or other third-party communication system failures
c) Customer’s own Internet service provider problems and/or bandwidth restrictions
d) Any failure in the Customer’s hardware, software or network connection
e) Customers acts or omissions
f) Any force majeure event
|Approach to resilience||
This information is available on request.
However, Innovise has Network Security Policy, Secure Development and Secure System Engineering Policy documents which are adheared to as part of the Integrated Management System.
|Outage reporting||Outages are reported on a public facing 'service status' web page.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Only authorised Innovise personnel can access management interfaces and support channels.
Access to these is via an authenticated (username/password) portal. Temporary access is then given to the user for the length of the support/management activity.
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||NQA|
|ISO/IEC 27001 accreditation date||2/5/2017|
|What the ISO/IEC 27001 doesn’t cover||N/a|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||Innovise is IS027001 and ISO9001 certified and has defined security policies, processes and reporting structure which are available on request.|
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||As part of our ISO27001 certification, Innovise has a documented change control policy which is available on request|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||ISO27001|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||IS027001|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Innovise has a Incident Management Policy which outlines processes for comments events.
The person who was involved in, or witnessed the incident or the person to whom the incident was reported, must complete an Information Security Incident Form and e-mail it to firstname.lastname@example.org. The Information Security Manager will be notified automatically of any e-mails sent to this address.
The Information Security Manager will communicate the existence of the information security incident or any relevant details to other interested parties, if applicable.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£17 per person per year|
|Discount for educational organisations||No|
|Free trial available||No|