'No Code' Workforce Management Software Platform

IOP brings together multiple teams and data sources to provide actionable insights, intelligence and automation for your business. Bringing together your field workforce and back office operations along with your customers under the same virtual roof to collaborate.


  • Drag 'n' Drop Planning, Scheduling & Dispatch
  • Configurable Dashboard tiles
  • Lasoo assets and dispatch as work packages
  • Workflow automation builder and mobile form builder
  • Full Project Management including drag and drop tiles
  • Calendar and Timeline View of Planned Works
  • API Pre Built Connectors and API's available for consumption
  • Upload any csv file or MS Project file for visibility
  • Route Optimisation
  • Time Sheeting and total job costing


  • Real time office and customer updates
  • Staff cost reduction through optimised resourcing
  • Accessible on any device, any time and anywhere
  • No need for consultants to configure, designed for business users
  • Workflow automation reduces manual processing between systems
  • Showcase as a POC with a single file upload
  • Visibility of works issued to third parties for customer info
  • Reduces communication costs between back office and field
  • Low TCO with limited IT involvement or vendor services required


£199 to £499 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at alan@duskmobile.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

4 3 7 4 2 7 2 4 2 6 3 6 4 0 9


Telephone: +61390710333
Email: alan@duskmobile.com

Service scope

Software add-on or extension
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints
None, it is a flexible cloud service available across AWS, Azure and Google Cloud instances in both private and hybrid configurations
System requirements
Cloud Server Instances - specification based on end user volume

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA's are listed below:

Target Response Time
Call Resolution – Severity 1
95% within 4 hours unless otherwise agreed with the customer

Call Resolution – Severity 2
95% within 6 hours unless otherwise agreed with the customer

Call Resolution – Severity 3
95% within 1 Business Day unless otherwise agreed with the customer

Call Resolution – Severity 4
95% within 3 Business Days unless otherwise agreed with the customer

Call Resolution – Severity 5
95% within 2 Business Days unless otherwise agreed with the customer

Call Resolution – Severity 9
75% within 6 months unless otherwise agreed with the customer
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We use a third party chat product and also for ticket support that adheres to WCAG 2.1AA. We already work with NSW Government in Australia that has the WCAG requirements and 2 new customers are in Aged Care with this standard is mandatory.
Onsite support
Yes, at extra cost
Support levels
Our support levels are as follows:

We offer level 1 support to our end users by prior arrangement and this is priced based on user volume with a 3 month "true up" clause in place, incase volumes vary widely from estimates.
Our most popular support is level 2, where the triage is carried out by an inhouse level 1 team for consolidation and initial troubleshooting. Our support team then take over the issue and are responsible for a central point of communication back into our customer.

Phone/Chat/Ticket/Email are all available methods of communication and no onsite visit has been required in over 6 years of operation.

In the event of a Severity 1 issue, a Resolution Manager is assigned from our team who liaises with our Client Account Manager and a representative or team from the Customer side.

Pricing is based on the Support Level sought.
Support available to third parties

Onboarding and offboarding

Getting started
There are 2 entry points:

1. Via a 30 day trial. In this case our customers are migrated to a production instance to continue their experience and preserve any investment they may have made. For example if our customer has chosen to invest in best practice setup or for their data to be loaded, we ensure that is retained.

2. Procuring via RFQ etc. In this case we offer a full training package as part of the onboarding process. Also included is "walkthrough" labels and tips for first time users. We build on this with our own Wiki and YouTube channel for self service.
Service documentation
Documentation formats
End-of-contract data extraction
We can provide this service for a fee that is agreed upon at contract signing. We also provide some data export capability for Administrators in specific formats based on sign off by our customer.
End-of-contract process
If this question refers to parting of ways, all end of contract services are included in the investment. Data export requirements are discussed and agreed upon at the start of the contract with a fee for this factored in accordingly.

Ultimately if our customers do not continue to see value in our product, we still want them to have a good experience in ending the contract and take pride in offering a smooth service with this. Including pricing for this process at the start of the contract helps ensure this is not seen as a "gouge" at the end of the contract.

However, if this question refers to re-signing a new contract with us, we start the journey 6 months before the due date and undertake analysis of IOP utilisation and the relationship to see where we can add additional value.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Functionality is the same between mobile web browser and desktop web browser, however the rendering and experience is different. Due to the rich functionality offered by our Intelligent Operations Platform, running it from a mobile device is not advised, despite being fully functional.

We recommend a minimum of 10" tablet for the best experience.
Service interface
Description of service interface
We have API's both into our Intelligent Operations Platform and out of it. Leading connectors have been built for rapid enablement of processes by our customers. We have made available the most important API's for our customers to consume data too.

The connector tool is a WYSIWYG interface.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None but we have designed it with WYSIWYG in mind.
What users can and can't do using the API
We have API's for consuming all data from the Intelligent Operations Platform. These API's can be securely connected back to a number of leading on premise or cloud based platform for seamless exchange of information.

We have also built a workflow automation tool to enable this transfer to have business rules built into it.

We offer a consulting service to set this up initially but welcome our customers to manage this ongoing.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Our product is configurable. Users can build their own modules which create their own database tables. These appear as forms in the IOP which can be easily connected to external data sources for visualisation of data.

Virtually of all of the IOP can be customised as it is a dynamic platform with clearly defined permission levels. Adminstrators are the only roles that can perform configuration changes to data structures. Other user levels are able to make changes within their own IOP instance.

Dashboard tiles for our summary screen are pre-built, however they can still be customised with a drag 'n' drop interface.


Independence of resources
Our services are set to auto scale based on the use of the Dusk Mobile data centre. This provides a seamless experience for our customers.

If customers wish to use their own data centre, we have clauses in place to protect both parties based on the access the Dusk Mobile team have to the customer data centre.

We have service level performance metrics with target response times on database queries, that are monitored with our inbuilt crash analytics toolset.


Service usage metrics
Metrics types
We have system monitoring through the whole platform to track usage amongst many other areas. This is part of our proactive monitoring and includes areas such as system scaling, early warnings on thresholds amongst many others.

Sample service usage includes:
User Access - Name, Time, Location, Duration
Module Access - User, Change Logs
System Performance
Data Consumption
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Administrators are the only role that can export data and this is tightly controlled. Multiple export formats are available including XML, JSON, CSV and PDF.

Due to the sensitivity of this, multiple parties are involved on the customer side in agreeing to this functionality. We can also remove this completely from a customer Intelligent Operations Platform instance.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • CSV
  • MPP
  • TXT

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
There are not enough words to put our SLA's in here and we would be happy to provide our Service Level Agreement document.

At a high level, this is them:
3C.1 - Business Hours system availability
System Availability >=99.75%

3C.2 - Number of system outages within given reporting period
System Availability - 2 or less per month

We also have full Resolution and Closure of Incident SLA's that are aligned with Australian Government regulations that we can easily provide upon request.
Approach to resilience
We have a number of measures in place and would be more than willing to provide it. We have a Cloud Services Questionnaire that is a template of the most commonly asked questions by our customers.

This addresses many areas of interest and available upon request.
Outage reporting
Outages are reported via API, email and SMS alerts.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
We use multi-factor authentication and certificates externally and permission based tiers within the IOP product. Tiered structures are securely defined and we assist in audit recommendations following purchase.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • NIST Framework
  • ISO27001 currently in progress

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
With over 10 years experience with customer smart meter data and customer outage data, we are well versed in the regulatory and compliance side of technology.

We also adhere to the NIST Framework to ensure the appropriate compliance and governance is in place. We are also VPDSS compliant.
Information security policies and processes
Our staff are trained in data privacy and compliance as part of the NIST framework accreditation, which forms part of onboarding and ongoing training. This includes but is not limited to controls around access to information, physical security including swipe cards, keys, BCP, ICT security including password protection on equipment, 2FA, personnel security and governance.

Security extends beyond this though for Dusk Mobile and includes Privacy by Design, only accessing and storing the required data, with protocols in place to purge data including governance for data at rest and data in transit.

We have a dedicated Chief Security Officer who holds the following credentials CIPM, SABSA, CRISC, ZSTC.

We also adhere to the VPDSS here in Australia and we can also be found on the Federal Government Digital Transformation organisation panel for COTS software. To achieve this accreditation involves many compliance and control mechanisms to be in place that we are happy to share.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have a product roadmap that is available for customers who have made the decision to procure the Intelligent Operations Platform.

All development follows the Agile methodology and is committed to sprints before being deployed to a "Staging" environment. Deployments are automated with no outage to our customers and are regression tested within the Staging environment.

Security testing is one component amongst user testing, integration testing and acceptance testing before. Based on the code change being introduced, penetration testing is also performed.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our threat information comes from many sources and something we take seriously. Assessments are performed using monitoring tools inbuilt to our platform, cloud services tools and operating system tools. We have network traffic tools and a suite of other monitoring devices.

Patches are applied as soon as they have been tested in our Staging environments. In the mean time we prioritise isolation and notification to our customers

Examples include: Operating System Vendors, CrowdStrike, third party Security through our SAML partners, Anti Virus providers, Firewall providers, our Chief Security Officer and their advisory board amongst others.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our platform has inbuilt monitoring and alerts including for anomalies. We also utilise a number of services available through our cloud hosting platforms, all of which can be made known to a purchaser.

Responding to any identified issue includes informing a nominated person or team on the customer side immediately including preventative measures taken on our side upon identifying the compromise. We then work through remediation, root cause analysis and preventative measures internally before working through these with our customer.

Our service is 24 hours, with response times defined in our available SLA's.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have pre-defined processes for common events to make both the raising and resolving quick.
Users report incidents through the following channels: Tickets, Email, Phone or Chat.
Incident reports are provided within 24 hours of closing the incident out by way of a Root Cause Analysis.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£199 to £499 a user a month
Discount for educational organisations
Free trial available
Description of free trial
The trial includes dummy data and full access for 30 days.

Training and customer data visualisation is not available without payment during the trial. We do offer a fixed fee setup for 5 use cases during the trial to validate our product if required.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at alan@duskmobile.com. Tell them what format you need. It will help if you say what assistive technology you use.