Public Sector Software Ltd


PSSUltimate is a Task Management system, offering web and mobile apps, designed to streamline the organisation of Teams, Tasks and Equipment. The app enables all the administration required to be undertaken from one centralized location and data to be managed, viewed and interrogated to improve workload planning and organisation.


  • Real-Time Reporting.
  • Interactive Dashboard.
  • Reporting Suite facilitating the creation of bespoke Reports.
  • Control which Data your Users have access to.
  • Unlimited Photo and Data Storage.
  • Schedule Team Tasks.
  • Complete Equipment Inventory.
  • NFC Tags for identification.
  • Username and pin feature
  • Define and conduct Inspections


  • Manage your Service area in Real-Time.
  • Live Issue Reporting provides the tools for responsive working.
  • Simple Mobile Interface enabling workers of all abilities to use.
  • Automatically create electronic logs of Equipment checks.
  • Provide a Transparent service with automated email Reports.
  • Create and Assign Tasks on Routine or Ad-Hoc basis.
  • Manage user Training requirements.
  • No Caps on Photo Storage.
  • Reduces administration of entering paper records.
  • Undertake Inspections


£12500 per licence per year

Service documents


G-Cloud 11

Service ID

5 6 4 9 7 9 1 7 3 4 7 9 1 9 1


Public Sector Software Ltd

Mark Pritchard


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
The platform is subject to scheduled maintenance by Microsoft Azure, customers will be notified prior to any pending works.
System requirements
  • Minimum Mobile: Android 4.4, iOS 9
  • Browsers - Chrome, Mozilla Firefox, Microsoft Edge or IE 10,

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email response is typically with in 1 hour during business hours. Outside of business hours response will be within 4-12 hours.

Business Hours are 0800 - 1700 Monday to Friday.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Onsite support
Support levels
As part of their Annual Licence, each of our customers is entitled to the following:
At least one on-site account visit annually.
Dedicated Technical Account Manager.
Unlimited phone and Email Support.
Installation support.

Additional Support that is available:
On-Site Training.
On-Site Troubleshooting.
Support available to third parties

Onboarding and offboarding

Getting started
Onsite or Online training is provided (chargeable) Users have free access to PDF User Guide and Quick-Start Guides and printed 'Pocket cards'
Service documentation
Documentation formats
  • HTML
  • ODF
End-of-contract data extraction
Data can be extracted in XML or XLS formats.
End-of-contract process
At the end of the contract, the customer has the option to switch to an Annual rolling contract or deactivate their database. If the customer wishes to extract their data from our system, they have the ability to do so within the Report Suite. Following confirmation we can then delete said data.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Differences between the mobile and desktop service
The mobile app is designed specifically to support the requirements for mobile workers. The desktop environment provides management, tracking and reporting functionality more appropriate for office-based use. However, this is built using responsive design and can work and is usable on tablets e.g. Apple iPad.
Service interface
Description of service interface
The service can be accessed via web application or dedicated mobile applications,

The web application supports IE 9+, Google Chrome, Edge, Firefox, Safari and Opera. The web app offers dark-mode and will scale with text when required for additional user support.

The mobile application is currently on Android 4.5+ and iOS 10+. The application has been designed to enable those who do not have the strongest technology or written English skills. Users are also supported with a variety of zoom levels in mind. The application utilises speech to text interfaces where possible for data input.
Accessibility standards
WCAG 2.1 A
Accessibility testing
Customisation available
Description of customisation
Available Mobile functions, Task Grades, features, roles can be customised to the Users preference. These customisations can be implemented following an email to the Support Team from an Authorised Customer Contact.


Independence of resources
Our services are held within Azure 'Auto-Scale' and 'Elastic' environments which allow the services to automatically provision additional resources when required. This ensures that users are not affected by demand by other users.


Service usage metrics
Metrics types
Web User logins, Mobile User logins, Tasks completed, Live status of Assets, Issues Reported.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users are able to export their data from within the Report Suite, here they are able to filter / sort / group any data and export to XLS / CSV / PDF / HTML.
Data export formats
  • CSV
  • Other
Other data export formats
  • HTML
  • PDF
  • XML
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The PSSUltimate platform is hosted on Microsoft Azure who provide 99.95% uptime.

Any Scheduled Downtime for Maintenance / Updates will be carried out during off-peak times (20:00 - 04:00)
Approach to resilience
Available on request.
Outage reporting
We report any Outages through our Status page. Any Scheduled downtime is additionally announced through Email.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Role Based Access Control is used through out the system, allowing the Customer to specify what data an individual user will have access to. Support channels are available for all users, however any request data-access will require authorisation from named Customer representative.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually.

Any document requirements can be supplied upon request.
Information security policies and processes
Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually. Any document requirements can be supplied upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All potential changes are first evaluated for vulnerabilities and any required security modifications. Once past the evaluation stage, developments are processed through our rigorous testing methods and are then subject to UAT.

All changes are assigned to a release which are then recorded and stored for reference.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All services are scanned on a monthly basis by a third-party provider and are subject to on-going monitoring and reviews by our in-house team. We are also subscribed to appropriate security channels for updates on the latest threats and vulnerabilities.

If a vulnerability has been detected, it is graded on its risk and severity and managed accordingly. Our grading is based upon the following - High priority are released same day, Medium priority within 2 days, Low priority within a week.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Potential Compromises are identified through Azure real-time monitoring and set triggers. Once identified, the threat is immediately investigated by the team and handled according to our Security Policy. We aim to respond to incidents within 1 - 6 hours depending on its severity.
Incident management type
Supplier-defined controls
Incident management approach
All of our services are actively monitored for errors by both Automated Azure services and our internal error reporting system. Common events are cataloged in our internal help file and communication is distributed if necessary.

Users can report incidents to their Account Manager or the Support team via Email or Telephone. They are then provided with updates until the issue is closed.

Incident reports and reviews can be generated following closure at the customer request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£12500 per licence per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑