Timegate is used to manage the Cleaning, Security and FM services workforce. Timegate helps you to plan your workforce and helps you deliver building services.
Effective visibility, control and management of the front line teams will help ensure you have great workplaces for all of your colleagues and visitors alike.


  • Workforce Management for Cleaning, Security and Facilities Services
  • Time & Attendance
  • Scheduling, Rostering, Planning
  • Service Delivery, Patrolling, eDoB, Incidents, Forms
  • Lone Worker Safety
  • Employee Engagement
  • Real time management


  • Accuracy of payroll for employees
  • Accuracy of payroll for employers (overtime, holiday )
  • Proof of service delivered to buildings, sites and other locations
  • Reduction in the reliance on sub-contract cleaners and security
  • Proof that correct personnel on site, on time.
  • Management of sub-contractors to prove service delivery
  • Business intelligence on Service being supplied


£17 per person per year

Service documents


G-Cloud 11

Service ID

3 4 3 0 8 0 4 1 5 2 9 9 5 3 2



Sales & Marketing

0370 626 0400

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints Timegate requires a level of configuration. Innovise will operate a workshop to help the buying organisation define their needs and Timegate will be configured by Innovise for them thereafter.
System requirements Web browser e.g. Chrome

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Priority 1 - Calls are answered 24 hours, 7 days a week.
Priority 2 to 4 - Calls and emails are responded to from 1 hour to 8 hours, subject to level of priority.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Innovise use a variety of tools to accommodate the variety of needs our clients have.
This is used to engage with Support Engineers and both show to engineers, and see what engineers are doing.
Web chat accessibility testing Innovise adopt off-the-shelf tools. We use assistive technologies if provided.
Onsite support Yes, at extra cost
Support levels More than 99% of Innovise support activity is by phone or email to a UK based support desk. Over 80% of the case raised are fixed first time.

Where required, consultants can be booked to come to site to help clients.

Innovise also operate a customer success function which proactively support clients and micro-train users based on their function or role within the organisation. This is available 0900-1700 GMT.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Innovise recommend a mix of classroom led training, online training and user documentation. Normal delivery is 'Train the trainer' or 'Train the Super User' so buying organisations can cost effectively adopt the technology.

Innovise will assist clients with the initial build and configuration of the technology removing any need for users to demonstrate a level of advanced IT literacy.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Innovise provide a copy of all the data to clients at the end of the agreement. Usually this is a copy of the SQL or if configured, a data warehouse. As the data contains Personally Identifiable information (PII) and is often sensitive too (SPII), if no request is received or a repository provided to Innovise within 30 days of the end of the contract the data is deleted.
End-of-contract process Innovise to not have any additional charges beyond what is included in the quote.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Not all features are suitable for mobile phone users.
Certain screens are better suited to a larger landscape as they contain necessary information that is not easily viewed and operated on smaller screens. Other screens are optimised for mobile users.
The Timegate user experience is optimised for the different roles within the software.
Service interface No
What users can and can't do using the API The API allows users to work with Timegate in a variety of different ways.
The options are expansive and it is not possible to fully detail this within G-Cloud. It is recommended that buying organisations contact Innovise for more information.
Sandboxes and test environments can be provided. If required, these will be provided at additional cost.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Timegate is fully configurable including the service.
Clients have material scope to configure the applications and workflows, look and feel of the application itself.
Additional services such as Sandboxes for testing and training can also be configured but these options are controlled by Innovise owed to their complexity and Service impact.


Independence of resources Innovise monitor and manage the private and public cloud resources and optimise them for user experience (UX).
Inherent in the design are load balancing techniques and tools which also optimise resources to ensure that users don't impact each other.


Service usage metrics Yes
Metrics types Innovise provide benching marketing for user metrics.
Innovise also track Service availability/uptime and Service interruption metrics. These can be supplied on demand.
Reporting types Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach There are a variety of methods to extract data.
Reports, Dashboards and standard features of this type will generally export to PDF, Excel, Word. The type of export dictates the formats supported.
Data can also be passed to Data Warehouses. Similarly, data can be copied, zipped and securely transported to physical locations.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Availability for Innovise SaaS Services is targeted to be 99.9%.

Availability is measured on a rolling annual basis considering the total number of Downtime Minutes. Downtime Minutes exclude time that the Customers are unable to access the Service due to any of the following:

a) System Planned Maintenance time
b) Any systemic Internet or other third-party communication system failures
c) Customer’s own Internet service provider problems and/or bandwidth restrictions
d) Any failure in the Customer’s hardware, software or network connection
e) Customers acts or omissions
f) Any force majeure event
Approach to resilience This information is available on request.

However, Innovise has Network Security Policy, Secure Development and Secure System Engineering Policy documents which are adheared to as part of the Integrated Management System.
Outage reporting Outages are reported on a public facing 'service status' web page.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Only authorised Innovise personnel can access management interfaces and support channels.

Access to these is via an authenticated (username/password) portal. Temporary access is then given to the user for the length of the support/management activity.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 NQA
ISO/IEC 27001 accreditation date 2/5/2017
What the ISO/IEC 27001 doesn’t cover N/a
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Innovise is IS027001 and ISO9001 certified and has defined security policies, processes and reporting structure which are available on request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach As part of our ISO27001 certification, Innovise has a documented change control policy which is available on request
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach ISO27001
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach IS027001
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Innovise has a Incident Management Policy which outlines processes for comments events.

The person who was involved in, or witnessed the incident or the person to whom the incident was reported, must complete an Information Security Incident Form and e-mail it to The Information Security Manager will be notified automatically of any e-mails sent to this address.

The Information Security Manager will communicate the existence of the information security incident or any relevant details to other interested parties, if applicable.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £17 per person per year
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑