G-Cloud 11 services are suspended on Digital Marketplace

If you have an ongoing procurement on G-Cloud 11, you must complete it by 18 December 2020. Existing contracts with Riskex Ltd are still valid.
Riskex Ltd

AssessNET Risk Assessment Module

AssessNET's Risk Assessment Module will empower you to manage risk effectively, in real-time, giving you visibility across your organisation. Create standardised templates that can be shared and tailored as required by your users, identify hazards, control risks and prompt action.

Features

  • Simple to use step-by-step process
  • Identify and control risks, with real-time reporting
  • Configurable templates, with Control Measures prompt
  • Private and one-off Risk Assessments
  • Integrated task management - Reviews, escalations and remedial actions
  • Custom API services
  • Federation services (single sign-on)
  • Riskex Health and Safety Consultancy and Training services available
  • UKAS Accredited ISO 27001, ISO 9001 and BS OHSAS 18001

Benefits

  • Complete, view and manage Risk Assessments
  • Identify and control risks
  • Generate statistical analysis of recorded data
  • Produce graphical representations of recorded data
  • Automatic archiving
  • Automated action tracking and prompts
  • Instant reporting and search capabilities
  • Attach photographs and other associated documents
  • Free Upgrades

Pricing

£3,899 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sales@riskex.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 11

Service ID

4 7 1 9 4 4 1 9 6 9 3 0 3 3 7

Contact

Riskex Ltd Linda Kemp
Telephone: +44 1908 915272
Email: Sales@riskex.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Not Applicable
System requirements
  • IE9 or above
  • Internet Connectivity

User support

Email or online ticketing support
Email or online ticketing
Support response times
Next business working day
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We have a standard support level for all clients, regardless of business or contract size. A dedicated support team are on hand during normal business hours to answer and resolve any queries users may have.

Our service can be configured to restrict support requests to a clients dedicated support desk, if required.

All clients are allocated an account manager who is available to assist with any resolutions required.

Our service guarantees a 99.9% uptime per calendar month, allowing for scheduled maintenance to take place. All maintenance takes place outside of normal office hours, with appropriate notice given.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All on-boarding clients are allocated an account manager and implementation manager who will ensure the smooth transition onto the service. An initial implementation meeting will be scheduled to ensure that our team understand your requirements.

Our team will work with you to capture the core data required by the system. A standard administrative training session will take place to educate the key stakeholders in the management of the service.

Training provision can be either onsite or online, or a combination of both. Our team will work with you to tailor training sessions to your requirements, covering train-the-trainer sessions; specific modules; or more general system overviews. As peoples diaries can be busy, we can re-run sessions to different teams, or for a small fee produce a dedicated training video based on your specific system configuration and content.

Fully featured manuals are available throughout the service for each module, and can be accessed at any time through the system interface.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
If clients require data extraction at the end of their contract, they may request this from their account manager or via the support desk. The team will extract all data from the service, including any uploaded document attachments and provide them to the client in an agreed format via an agreed delivery method. A fee of £3995+VAT is charged for data extraction.
End-of-contract process
At the end of a contract access is automatically revoked from the system.

Clients may request their data, as previously described. All data is held in our systems for a maximum of 12 months following the termination of a contract, unless requested otherwise. This ensures that the data remains available (by request) whilst a replacement service is implemented.

After 12 months, any data or attachments are deleted from our databases.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
A suite of mobile apps are available for Android and iOS, offering offline capabilities that complement the service of the main online system. The apps allow users to take the features of the system, such as task management or auditing to areas where internet connectivity isn't available and still record the necessary details in a familiar interface.

Our online service is built to work on mobile devices through the devices browser; automatically configuring itself for the devices screen size. The full capabilities of the service are available through this method.
Service interface
No
API
Yes
What users can and can't do using the API
API's are available for the service to perform specific requirements, such as extracting task lists, or importing user details. access to API's are available upon request.

Typically, our dedicated UK based development team will write an API to meet specific client requirements where they are not meet by our existing library.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
AssessNET has several hundred options that can be used to alter terminology, enable or disable functionality, or present content in different ways. A large number of these changes can be altered by clients through the system interface. Where this isn't possible, our support team are on hand to offer details about the customisable options available and configure them accordingly.

Clients can adjust menu, chart and other interface colours to assist with branding the service to their corporate image. This is in addition to being able to upload a company logo into the system and make it available on all printouts.

Details of all available customisable options will be discussed by an implementation manager during the on-boarding process.

Scaling

Independence of resources
Our services are load balanced across multiple servers to ensure resource levels are not impacted.

Analytics

Service usage metrics
Yes
Metrics types
A number of service metrics are available from within the service itself, including, but not limited to:

login tracking
record counts
incident statistics
audit statistics
task statistics
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Tools are available for core modules that allows the extract of data at scheduled intervals. Extracted data is held within a secure sFTP file store to be retrieved by the client as necessary. Our team control the passwords and access to sFTP file stores.

For larger, full system extracts, clients may request their data, to include uploaded files, via their account manager or our support team. A fee is applicable for data extraction requests.
Data export formats
  • CSV
  • Other
Other data export formats
  • Xlsx
  • Xls
  • Xml
  • Json
Data import formats
  • CSV
  • Other
Other data import formats
  • Xlsx
  • Xls
  • Xml
  • Json

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
AssessNET has a guaranteed availability of 99.9% per calendar month. Any scheduled maintenance, which may or may not cause downtime, is conducted outside of normal office hours in order to minimise disruption to users.

Our actual service uptime is approximately 99.98% per calendar month, including any scheduled maintenance periods.
Approach to resilience
This information is available upon request.
Outage reporting
Our service does not actively notify of outages. Any planned outages are reported through the inbuilt news feed with an appropriate notice period.

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
Identity Federation with clients internal ADFS service
Access restrictions in management interfaces and support channels
Access is restricted throughout the system by granular user privileges.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
UKAS accredited by BSI
ISO/IEC 27001 accreditation date
January 2014
What the ISO/IEC 27001 doesn’t cover
Our full service is covered by our accreditation. There are no areas not covered.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a suite of in-house policies and procedures which have been audited by BSI in accordance with our ISO27001:2013 accreditation.

Our polices and procedures restrict access to infrastructure and client data to key members of our team. Access is granted on a sliding scale, depending on the level of access required for a particular role.

All employees are aware of our security policies and refresher training takes place at least every 12 months. Our board of directors are responsible for ensuring polices are followed. Our systems have appropriate controls in place to assist them in ensuring they are followed correctly.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All change requests are tracked throughout their lifecycle until they are incorporated into the main systems, where they are then tracked for support purposes.

All developments are tested against the OWASP top 10 and other controls to ensure potential security impacts are eliminated. Developments are tested across multiple browsers to ensure full compatibility.
Vulnerability management type
Undisclosed
Vulnerability management approach
Undisclosed
Protective monitoring type
Undisclosed
Protective monitoring approach
Undisclosed
Incident management type
Undisclosed
Incident management approach
Undisclosed

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£3,899 an instance a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Please contact a member of our team.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sales@riskex.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.