HFX Limited

Imperago Access Control

Imperago Access Control Cloud Solution.

Features

  • Easy to use one card, one clock,one system solution
  • Standalone system
  • Full integrated access control and flexitime solution.
  • Multi-site, multi-tenant administration
  • Highly configurable, manages access time for specified staff
  • Door zoning, timed access, days of the week access
  • Real time reporting and management statistics.
  • Audit trail for enhanced security
  • Fully scalable to grow with your organisation
  • Can be deployed as part of the Imperago Module

Benefits

  • Provides total security, both internally and externally
  • Easy to use, secure access control.
  • Reduce turnover and staff absenteeism.
  • Seamless integration into third part applications
  • Reduce access costs and overheads.
  • Real time management reporting.
  • Enhance existing systems with additional layers of data
  • Reduce administration overhead.

Pricing

£0.56 to £1.62 per user per month

Service documents

G-Cloud 9

371474405697822

HFX Limited

Alex Boa

01438 822170

alex.boa@hfx.co.uk

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to HFX Imperago Flexitime Management
Cloud deployment model Public cloud
Service constraints None applicable.
System requirements Imperago has no specific requirements around browser version.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times The priority of the call will naturally dictate the most appropriate action for any given support call, ensuring the minimum of disruption to users. However they will fall in in line with the four call statuses outlined below:
• Priority P1 – Resolution time 8 hours
• Priority P2 – Resolution time 2 days
• Priority P3 – Resolution time 3 days
• Priority P4 – Resolution time 5 days
• Priority P5 – Resolution time 10 days
During the process of resolving a fault there may be a change of call Priority.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Hfx provide the following support services included at no additional cost:

Perform first and second level support for all supported hfx software and hardware products to authorised customer personnel
Provide detailed technical support direct to the customer as escalated
Provide support on customer’s site where escalated and
Process scheduled/planned work requests (installations, upgrades etc.)
Process and manage faults with Development
Perform annual preventive maintenance for hfx supplied and supported data collection equipment.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Hfx has developed a standardised approach to configure the solution to support our customers. The approach is both collaborative and iterative, designed to build relationships between hfx and the customer to ensure that the configured solution delivered meets the customer’s needs. hfx will also assist and support its customers in aligning/realigning their business processes to enable them to maximise the benefits of the solution.

The solution also requires system users’ role-based access (RBAC) rights to be set up, either individually or in groups, to ensure that individuals’ permissions are applicable to their roles within the organisation, and that sensitive personal/clinical information is only accessible to those that need to see it.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction At the end of the contract term, hfx will work with the customer to agree an exit plan, including the migration of data from the system and the decommissioning of any locally sited hardware provided under the contract. The customer can usually extract its own data from the system for migrating into the new/replacement system using the tools provided. Additional consulting and support services can be provided at additional cost if these are required.
End-of-contract process At the end of the contract term, hfx will work with the customer to agree an exit plan, including the migration of data from the system and the decommissioning of any locally sited hardware (if any) provided under the contract. The customer can usually extract its own data from the system for migrating into the new/replacement system using the tools provided, and additional consulting and support services can be provided at additional cost if these are required.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Full functionality is offered on both a mobile and desktop device.
Accessibility standards WCAG 2.0 A
Accessibility testing Accessibility was developed in conjunction with existing cust0mers to ensure ease of use, clarity of font/text and to cater for staff with reduced eyesight.
API Yes
What users can and can't do using the API Interface configuration is performed by HFX technical staff based on requirements.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available No

Scaling

Scaling
Independence of resources The SaaS platform has significantly greater resources than are required for current use.
The database design uses a distributed, resilient system so data is distributed amongst a number of nodes to provide resilience as well as performance.

Analytics

Analytics
Service usage metrics Yes
Metrics types Service uptime. Support calls taken, resolved, outstanding by priority and against SLA.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Imperago offers the facility to export data in any open format.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 99.99% availability. For each outage below this level a daily pro-rata refund is made.
Approach to resilience This information is available on request.
Outage reporting E-mail alerts and also core services dashboard will keep users informed of availability.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels The system has a highly configurable permissions architecture that allows each data item to be separately configured if desired. However, in reality, this is rarely required, and grouped fields are generally used. Permission access is RBAC based. Roles are completely configurable, although the system comes preconfigured with a number of useful templates such as Group Administrator, Manager and HR Staff.
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards Cyber Essentials
Information security policies and processes An internal policy is in force which covers the way data is accessed, stored and managed during the whole lifecycle. This is followed by the support teams and cloud service team and is owned by the CTO.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Proposed changes are documented and risk assessed. Roll-back processes and procedures are documented and tested. Customer notified of risks, rollbacks and timelines for approval
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability testing is carried out on a regular basis using commercial tools. Subscriptions from vendors and third parties also alert to vulnerabilities which the tools do not yet identify.
Patches and updates are applied within 24 hours of being available, or if no solution is available from a vendor, alternative action will be taken to mitigate or negate the risk.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Automated reporting of intrusion attempts and unusual activity is via multiple hardware and software systems which report by e-mail in real time to multiple addresses. All authentication logs and machine alerts are kept off-site so can not be deleted by attacker.
Escalation process is immediate in the event and engineers and Director will be alerted. Engineers are on call 247.
Incident management type Supplier-defined controls
Incident management approach Incident Management is controlled by a process which guides the team through the assessment of the incident, evaluation of risk, loss and services affected.
Users can either ring, e-mail or report via the support portal. Incidents are prioritised as P1 (highest priority).
All incidents are followed up with a report detailing the root cause, immediate resolution and the changes to be implemented to prevent reoccurrence.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £0.56 to £1.62 per user per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑