Public Sector Software Ltd

PSSUltimate

PSSUltimate is a Task Management system designed to streamline the organisation of Teams, Tasks and Equipment. The app enables all the administration required to be undertaken from one centralized location and data to be managed, viewed and interrogated to improve workload planning and organisation.

Features

  • Real-Time Reporting.
  • Interactive Dashboard.
  • Reporting Suite facilitating the creation of bespoke Reports.
  • Control which Data your Users have access to.
  • Unlimited Photo and Data Storage.
  • Schedule Team Tasks.
  • Complete Equipment Inventory.
  • NFC Tags for identification.

Benefits

  • Manage your Service area in Real-Time.
  • Live Issue Reporting provides the tools for responsive working.
  • Simple Mobile Interface enabling workers of all abilities to use.
  • Automatically create electronic logs of Equipment checks.
  • Provide a Transparent service with automated email Reports.
  • Create and Assign Tasks on Routine or Ad-Hoc basis.
  • Manage user Training requirements.
  • No Caps on Photo Storage.
  • Reduces administration of entering paper records.

Pricing

£12500 per licence per year

Service documents

G-Cloud 10

509370295088415

Public Sector Software Ltd

Mark Pritchard

01926800800

mpritchard@pssltd.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints The platform is subject to scheduled maintenance by Microsoft Azure, customers will be notified prior to any pending works.
System requirements
  • Minimum Mobile: Android 6.0 NFC Enabled Device.
  • Browsers - Chrome, Mozilla Firefox, Microsoft Edge or IE 10

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Email Response is typically with in 1 hour during business hours. Outside of business hours response will be within 4-12 hours.

Business Hours are 0800 - 1700 Monday to Friday.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels As part of their Annual Licence, each of our customers are entitled to the following:
At least one on-site account visit annually.
Dedicated Technical Account Manager.
Unlimited phone and Email Support.
Installation support.

Additional Support that is available:
On-Site Training.
On-Site Troubleshooting.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite or Online training is provided (chargeable) Users have free access to PDF User Guide and Quick-Start Guides and printed 'Pocket cards'
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data can be extracted in XML or XLS formats.
End-of-contract process At the end of the contract, the customer has the option to switch to an Annual rolling contract or deactivate their database. If the customer wishes to extract their data from our system, they have the ability to do so within the Report Suite. Following confirmation we can then delete said data.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems Android
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The mobile app is designed specifically to support the requirements for mobile workers. The desktop environment provides management, tracking and reporting functionality more appropriate for office based use. However this is built using responsive design and can work and is usable on tablets e.g. Apple iPad.
Accessibility standards WCAG 2.0 A
Accessibility testing N/A
API No
Customisation available Yes
Description of customisation Available Mobile functions, Task Grades, features, roles can be customised to the Users preference. These customisations can be implemented following an email to the Support Team from an Authorised Customer Contact.

Scaling

Scaling
Independence of resources Our services are held within Azure 'Auto-Scale' and 'Elastic' environments which allow the services to automatically provision additional resources when required. This ensures that users are no affected by demand by other users.

Analytics

Analytics
Service usage metrics Yes
Metrics types Web User logins, Mobile User logins, Tasks completed, Live status of Assets, Issues Reported.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users are able to export their data from within the Report Suite, here they are able to filter / sort / group any data and export to XLS / CSV / PDF / HTML.
Data export formats
  • CSV
  • Other
Other data export formats
  • HTML
  • PDF
  • XML
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability The PSSUltimate platform is hosted on Microsoft Azure who provided 99.95% uptime.

Any Scheduled Downtime for Maintenance / Updates will be carried out during off-peak times (20:00 - 04:00)
Approach to resilience Available on request.
Outage reporting We report any Outages through our Status page. Any Scheduled downtime is additionally announced through Email.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Role Based Access Control is used through out the system, allowing the Customer to specify what data an individual user will have access to. Support channels are available for all users, however any request data-access will require authorisation from named Customer representative.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually.

Any document requirements can be supplied upon request.
Information security policies and processes Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually. Any document requirements can be supplied upon request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All potential changes are first evaluated for vulnerabilities and any required security modifications. Once past the evaluation stage, developments are processed through our rigorous testing methods and are then subject to UAT.

All changes are assigned to a release which are then recorded and stored for reference.
Vulnerability management type Supplier-defined controls
Vulnerability management approach All services are scanned on a monthly basis by a third-party provider and are subject to on-going monitoring and reviews by our in-house team. We are also subscribed to appropriate security channels for updates on the latest threats and vulnerabilities.

If a vulnerability has been detected, it is graded on its risk and severity and managed accordingly. Our grading is based upon the following - High priority are released same day, Medium priority within 2 days, Low priority within a week.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Potential Compromises are identified through Azure real-time monitoring and set triggers. Once identified, the threat is immediately investigated by the team and handled according to our Security Policy. We aim to respond to incidents within 1 - 6 hours depending on its severity.
Incident management type Supplier-defined controls
Incident management approach All of our services are actively monitored for errors by both Automated Azure services and our internal error reporting system. Common events are cataloged in our internal help file and communication is distributed if necessary.

Users can report incidents to their Account Manager or the Support team via Email or Telephone. They are then provided with updates until the issue is closed.

Incident reports and reviews can be generated following closure at the customer request.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £12500 per licence per year
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑