UK hosted with UK data residency, Projectfusion Official is trusted by the Home Office, many LA’s and Police forces. Secure collaboration and file storage for classified data, supporting File Sharing, Project, Program, Case and Task management with approvals and custom workflows. Secure portal and extranet includes a powerful IOS client.
- ISO27001:2013 certified
- Protect documents - restrict download and print
- Secure collaboration with version control and comments
- No plugins required
- 24x7 support with 15 minute response
- Business and supply chain all UK owned
- Share files with high security
- Prevent unintended leaks with document protection
- Secure collaboration with outside firms and individuals
- Share huge files securely
- Share video securely (download/forward blocked)
- Offline work on the move with our iPad app
- Access from anywhere in the world
- Free webex training
- Desktop allows offline access
£1.42 to £5.66 per user per month
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
OD Consultancy Ltd
0207 739 4252
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|System requirements||Any web browser supporting TLS1.1 onwards.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||15 Minutes 24/7|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Web chat is accessible directly from the Projectfusion website, and from within the product.|
|Web chat accessibility testing||None.|
|Onsite support||Yes, at extra cost|
Users may contact our support team via telephone or email to support projectfusion.com for technical support. We will acknowledge the request by email within fifteen minutes of receipt. We will respond via email to the appropriate User and initiate addressing the request using reasonable endeavours within 4 Business Hours of initial contact. PROJECTFUSION servers are automatically monitored every 3 minutes for up time. In the case of a critical failure, where the PROJECTFUSION instance is not responding or accessible from any network, we will attempt to solve the problem using reasonable endeavours within 30 minutes of initial contact or notification by monitoring system.
Support is free, unless the client requires an onsite visit.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We provide online training videos, two sessions of online training in additional to providing users with documentation.|
|End-of-contract data extraction||Users can download their data directly from the data room from within the app. They can bulk download using a WebDAV or CMIS client, or for a fee we can provide a closing bible on an encrypted DVD or encrypted USB.|
|End-of-contract process||At the end of the contract we remind the client a month in advance that their contract is due to end. At this point they can choose to extend, or to shut down the service. If shutting down, we provide them with instructions on how to download their data, as well as options for a closing bible of their data which is a chargeable service. We then remind the client a week before shut down that their data will be deleted.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The services are identical.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Users of assistive technology can choose to use our IOS client. This allows search, upload/download/review of files, as well as comment. It does not currently enable use of Q&A or index document modules.|
We have worked with users of assistive technology using our IOS client. They are able to users features including, but not limited to:
Speech: Speak Selection, Speak Screen, Highlight content, and Typing Feedback
|What users can and can't do using the API||Users can upload and make changes to their files and file structure through the API provided they have relevant user permissions.|
|API documentation formats||Other|
|API sandbox or test environment||Yes|
|Description of customisation||
Logos and branding can be customised within the app
The login screen can be customised.
The customisation must be done by an admin user when the service is provisioned.
Tag clouds can be managed
Workflows can be created
Smart folders can be created.
|Independence of resources||Dedicated CPU's and bandwidth throttling.|
|Service usage metrics||Yes|
We can provide data usage reports on request. User reports are available at anytime within the app.
Full audit trail reports are available through a reporting module within the app.
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Other data at rest protection approach||AES-256 bit encrypted at rest|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Users can export their data using the app, or using a WebDAV or CMIS app to export their data.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
Projectfusion will provide the Customer with at least ninety-nine.nine percent (99.9%) Uptime for each Projectfusion Instance during each Month during the continuance of this Agreement. The Company shall remedy any breach of the warranty set out above by the provision of a credit against fees payable by the Customer for the Projectfusion Instance for the next following calendar month. Such credit will be equal to a percentage of the monthly Basic Price (not including additional surcharges, separate support fees, or any other additional fees charged to the Customer on account of additional services, if any) allocated to the particular Projectfusion Instance.The percentage credit is calculated as per the following formula:
Percentage of time in month for which service is available Credit percentage
99.9% or more None
98% TO 99.9% 20%
Below 98% 40%
|Approach to resilience||Available on request.|
|Outage reporting||We receive an alert from our monitoring system, we would then alert our clients key contacts by email/telephone.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Assured by independent validation of assertion.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||CFA|
|ISO/IEC 27001 accreditation date||19/01/2018|
|What the ISO/IEC 27001 doesn’t cover||N/A|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||ISO27001|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Formal policies and procedures established which covers changes to all software, applications, systems, infrastructure, hypervisors, virtual machine images, databases, services, operations & facilities used
All configuration controlled using Puppet.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Security sites and blogs checked daily manually for important updates.
Fortnightly automated check of services against vulnerabilities.
Monthly NESSUS scans.
‘Critical’ patches deployed same day
‘Important’ patches deployed within 1 week
‘Other’ patches deployed within 4 weeks of a patch becoming available
‘Critical’, ‘Important’ and ‘Other’ are aligned to the following common vulnerability scoring systems:
National Vulnerability Database Vulnerability Severity ratings: ‘High’, ‘Medium’ and ‘Low’ respectively.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
OSSEC installed on all servers.
All log files stored in tamperproof cloud storage, and subjected to manual & automated checks.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Formal incident response plan.
All users and personnel reports incidents via trouble ticket.
All reported Information Security weaknesses, observations and occurrences are, immediately upon receipt, assessed and categorised. Reports are raised in the ISMS board. A record is made of the assessment.
The Information Security Manager (or other investigator) investigates the circumstances, and categorises the reported occurrence or observation into one of four categories: okay, event, incident or unknown.
Once incident contained, and required remedial action completed, the Information Security Manager prepares a report for the Management Review & Clients.
Incident reports to any affected clients within 72 hours.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£1.42 to £5.66 per user per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
Free 2 week trial.
This doesn't include API access or multiple sites.
|Link to free trial||http://www.projectfusion.com/start-your-free-data-room-trial/|