PSSUltimate is a Task Management system, offering web and mobile apps, designed to streamline the organisation of Teams, Tasks and Equipment. The app enables all the administration required to be undertaken from one centralized location and data to be managed, viewed and interrogated to improve workload planning and organisation.
- Real-Time Reporting.
- Interactive Dashboard.
- Reporting Suite facilitating the creation of bespoke Reports.
- Control which Data your Users have access to.
- Unlimited Photo and Data Storage.
- Schedule Team Tasks.
- Complete Equipment Inventory.
- NFC Tags for identification.
- Username and pin feature
- Define and conduct Inspections
- Manage your Service area in Real-Time.
- Live Issue Reporting provides the tools for responsive working.
- Simple Mobile Interface enabling workers of all abilities to use.
- Automatically create electronic logs of Equipment checks.
- Provide a Transparent service with automated email Reports.
- Create and Assign Tasks on Routine or Ad-Hoc basis.
- Manage user Training requirements.
- No Caps on Photo Storage.
- Reduces administration of entering paper records.
- Undertake Inspections
£12500 per licence per year
Public Sector Software Ltd
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||The platform is subject to scheduled maintenance by Microsoft Azure, customers will be notified prior to any pending works.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Email response is typically with in 1 hour during business hours. Outside of business hours response will be within 4-12 hours.
Business Hours are 0800 - 1700 Monday to Friday.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
As part of their Annual Licence, each of our customers is entitled to the following:
At least one on-site account visit annually.
Dedicated Technical Account Manager.
Unlimited phone and Email Support.
Additional Support that is available:
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||Onsite or Online training is provided (chargeable) Users have free access to PDF User Guide and Quick-Start Guides and printed 'Pocket cards'|
|End-of-contract data extraction||Data can be extracted in XML or XLS formats.|
|End-of-contract process||At the end of the contract, the customer has the option to switch to an Annual rolling contract or deactivate their database. If the customer wishes to extract their data from our system, they have the ability to do so within the Report Suite. Following confirmation we can then delete said data.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The mobile app is designed specifically to support the requirements for mobile workers. The desktop environment provides management, tracking and reporting functionality more appropriate for office-based use. However, this is built using responsive design and can work and is usable on tablets e.g. Apple iPad.|
|Accessibility standards||WCAG 2.1 A|
|Description of customisation||Available Mobile functions, Task Grades, features, roles can be customised to the Users preference. These customisations can be implemented following an email to the Support Team from an Authorised Customer Contact.|
|Independence of resources||Our services are held within Azure 'Auto-Scale' and 'Elastic' environments which allow the services to automatically provision additional resources when required. This ensures that users are not affected by demand by other users.|
|Service usage metrics||Yes|
|Metrics types||Web User logins, Mobile User logins, Tasks completed, Live status of Assets, Issues Reported.|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Users are able to export their data from within the Report Suite, here they are able to filter / sort / group any data and export to XLS / CSV / PDF / HTML.|
|Data export formats||
|Other data export formats||
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
The PSSUltimate platform is hosted on Microsoft Azure who provide 99.95% uptime.
Any Scheduled Downtime for Maintenance / Updates will be carried out during off-peak times (20:00 - 04:00)
|Approach to resilience||Available on request.|
|Outage reporting||We report any Outages through our Status page. Any Scheduled downtime is additionally announced through Email.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Role Based Access Control is used through out the system, allowing the Customer to specify what data an individual user will have access to. Support channels are available for all users, however any request data-access will require authorisation from named Customer representative.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually.
Any document requirements can be supplied upon request.
|Information security policies and processes||Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually. Any document requirements can be supplied upon request.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
All potential changes are first evaluated for vulnerabilities and any required security modifications. Once past the evaluation stage, developments are processed through our rigorous testing methods and are then subject to UAT.
All changes are assigned to a release which are then recorded and stored for reference.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
All services are scanned on a monthly basis by a third-party provider and are subject to on-going monitoring and reviews by our in-house team. We are also subscribed to appropriate security channels for updates on the latest threats and vulnerabilities.
If a vulnerability has been detected, it is graded on its risk and severity and managed accordingly. Our grading is based upon the following - High priority are released same day, Medium priority within 2 days, Low priority within a week.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Potential Compromises are identified through Azure real-time monitoring and set triggers. Once identified, the threat is immediately investigated by the team and handled according to our Security Policy. We aim to respond to incidents within 1 - 6 hours depending on its severity.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
All of our services are actively monitored for errors by both Automated Azure services and our internal error reporting system. Common events are cataloged in our internal help file and communication is distributed if necessary.
Users can report incidents to their Account Manager or the Support team via Email or Telephone. They are then provided with updates until the issue is closed.
Incident reports and reviews can be generated following closure at the customer request.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£12500 per licence per year|
|Discount for educational organisations||No|
|Free trial available||No|