Astario Systems LTD

Primary/Secondary School Assessment System

Astario provides a fully customisable Assessment Module that enables Schools to have complete flexibility and control over the assessment criteria. The Assessment Module comes equipped with the National Curriculum assessment templates and it allows Teachers to link learning objectives to individual class records and to terms.

Features

  • Equipped with the National Curriculum assessment templates
  • Assessment with and without levels. Customise and plan your attendance.
  • Flexible and built to improve Teacher's experience of assessing Learners.
  • Welsh Curriculum

Benefits

  • Staff are able to work offline
  • Teachers can plan their assessment by term
  • User custom assessment template, methodology or terminology

Pricing

£100 to £200 per user per year

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

4 8 2 0 8 8 7 8 9 9 4 4 3 8 6

Contact

Astario Systems LTD

Emeric Gabor

+447447905328

emeric@astario.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No.
System requirements
Internet Access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support SLAs can be provided on request. Weekend support may occur delays.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
Onsite support sessions are available for current subscribers of Astario. The onsite support is tailored per the client requirements and Astario will provide an onsite support specialist.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Astario provides a range of onboarding and training resources. An initiation pack is provided to the client and onsite training is provided during the onboarding. Online video resources, in-app guides and a full user guide is also available.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Customers can export any data at any time using built-in functions, and therefore can extract data prior to the contract end. Data can be exported in either Excel or CSV formats. At the end of the contract, a full set of data can be scheduled to be exported by the client or by Astario.
End-of-contract process
All standard data exports are included in the contract price. Access to the system is withdrawn. Data will remain in Progresso until the Customer has confirmed they have all the data they require or one month. It will then be deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Astario provides both an application that is mobile compatible and is also accessible through an iOS and Android Application. The mobile application has been configured to offer a seamless and familiar feel to the end users as per the desktop version.
Service interface
No
API
Yes
What users can and can't do using the API
Astario provides programmatic access to your organization’s information using simple, powerful, and secure application programming interfaces. The Force.com REST API lets you integrate with Force.com applications using simple HTTP methods, in either XML or JSON formats, making this an ideal API for developing mobile applications or external clients. Force.com also supports Apex REST, which lets you create Web services on Force.com using Apex.
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Astario provides customizable, configurable, and buildable solutions, and does so effectively, quickly, and with minimum difficulty. Starting with simple data entry fields and page layouts, Astario can customise custom solutions for organisations. You can customize each of the standard tabs and types of records, including adding custom fields and setting page layouts. You can also customize search, tagging, and user interface options for your org.

Scaling

Independence of resources
Astario is built on the Force.com platform which has a multi-tenant architecture that is designed to handle millions of users. The target time for the platform availability is 99.999%, measured 24/7/365.

Analytics

Service usage metrics
Yes
Metrics types
Astario is equipped with a comprehensive reporting tool. System usage and engagement reports can be accessed anytime. Further system event monitoring reports are also available.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Other
Other data at rest protection approach
The Force.com platform is compliant with a number of standards which require protection of data at rest (ISO 27001/27018
SSAE 16/ISAE 3402 SOC-1
SOC 2
SOC 3
PCI-DSS
TRUSTe Certified Privacy Seal
CSA STAR)
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data exports are available through a scheduled task or by using the reporting functionality. Astario will support the Client with the export
Data export formats
  • CSV
  • Other
Other data export formats
  • .xls
  • .xlsx
Data import formats
  • CSV
  • Other
Other data import formats
  • .xls
  • .xlsx

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The Force.com platform has a proven 99.9+ percent uptime record over many years. To ensure the uptime and availability, Force.com provides redundant data protection and the most advanced facilities protection available, along with a complete data recovery plan.
Data is mirrored in real-time between top-tier data centres. In the event of the primary data centre being destroyed, a backup data centre is enabled with no loss of data and 12 hour recovery time objective.Historically, the Force.com platform has had an excellent record of very high uptime. The Force.com platform has configured all networking components, SSL accelerators, load balancers, Web servers and application servers in a redundant configuration.
For further details please refer to http://content.trust.salesforce.com/trust/en/learn/datacenter
http://trust.salesforce.com
Approach to resilience
The Force.com platform has a proven 99.9+ percent uptime record over many years. To ensure the uptime and availability, Force.com provides redundant data protection and the most advanced facilities protection available, along with a complete data recovery plan.
Data is mirrored in real-time between top-tier data centres. In the event of the primary data centre being destroyed, a backup data centre is enabled with no loss of data and 12 hour recovery time objective.Historically, the Force.com platform has had an excellent record of very high uptime. The Force.com platform has configured all networking components, SSL accelerators, load balancers, Web servers and application servers in a redundant configuration.
For further details please refer to http://content.trust.salesforce.com/trust/en/learn/datacenter
http://trust.salesforce.com

Hosting structure: shared multi-tenant architecture, subdivided into nine hardware clusters called pods; made up of 35 multiprocessor Unix and Linux servers running the Oracle database. Pods are mirrored for high-availability and failover.
Outage reporting
The Force.com platform has a proven 99.9+ percent uptime record over many years. To ensure the uptime and availability, Force.com provides redundant data protection and the most advanced facilities protection available, along with a complete data recovery plan.
Data is mirrored in real-time between top-tier data centres. In the event of the primary data centre being destroyed, a backup data centre is enabled with no loss of data and 12 hour recovery time objective.Historically, the Force.com platform has had an excellent record of very high uptime. The Force.com platform has configured all networking components, SSL accelerators, load balancers, Web servers and application servers in a redundant configuration.
For further details please refer to http://content.trust.salesforce.com/trust/en/learn/datacenter
http://trust.salesforce.com

provide current and historical (the preceding month) data on service availability for each of their instances at https://trust.salesforce.com/trust/instances.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
Microsoft Azure Single Sign-On
Microsoft Outlook Single Sign-On
Access restrictions in management interfaces and support channels
Only successfully authenticated users have access to management interfaces. Astario uses a profile based permissions system that means users and support staff will only see the data and functionality that has been assigned to them.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
21/12/2017
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Regular reviews of security infrastructure; regular risk management & mitigation; reviews of staff status; ongoing training & awareness of best practice
Information security policies and processes
Astario has an Information Security policy and has implemented internal processes that adhere to that standard. The policy provides a set of minimum security standards to minimise the risk of accidental disclosure or loss of information, with which all Astario directors, employees, consultants and sub-contractors must comply.

Astario senior management actively supports information security within the organisation through clear direction, demonstrated commitment, and acknowledgement of information security responsibilities.Arbor senior management shall:
Review and approve information security policy and security objectives
Provide clear direction and visible management support for security initiatives
Provide the resources needed for information security
Initiate plans and programmes to maintain information security awareness
Adopt a best practice approach to information risk management and ensure the implementation of appropriate information security controls
Promote the regular review and continual improvement of information security

The Force.com platform is ISO27001 accredited. Further details can be accessed at https://trust.salesforce.com/en/security/

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Astario maintains a change log of releases through our release manager.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
The Product Security team ensures the security of the system, consults with R&D teams and partners, and protects customer data. Cloud Security experts specialise in security research and innovative tool development.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Records all login attempts: originating IP address, time and success/fail against each user account. Information can be extracted for analysis against organisational policies. Configurable settings: enforce logins from an approved IP range and/or at certain times of day, maximum session length and automatic account locking after x failed login attempts. Event monitoring is also available to protect and monitor the instance.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Standard incident management ensures that all recorded incidents are triaged and routed to the appropriate resolver and, where necessary, escalated. In specific cases, it may be necessary to escalate incidents directly to the provider. All security incidents are reported on an internal logging system. The log records nature and impact of the incident, as well as potential preventative measures.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£100 to £200 per user per year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Astario provides a 30 days free trial on request. A prepopulated demo system is also available on request. Please contact us to arrange.

Service documents

Return to top ↑