DesignLinks International

WorkSmart. Digital Workplace

WorkSmart is a zero-code, cloud platform for business management in digital age.

WorkSmart's unified framework of Content management, Collaborative Work management and Business Process Management coupled with Business intelligence - Reports and Analytics services, enables you to drive more value and successfully transform your entire organisation.


  • Share and Manage All Your Content
  • Streamline, Automate and Optimise Business Processes
  • Collaboration - Connect, Share and Work Better Together
  • Plan and Manage Your Projects and Programs
  • Capture, Manage and Share Organisational Knowledge
  • Administrative Console: Manage enterprise settings for security, content & sharing
  • Access Administration: Control users permissions based on their role
  • Encryption: TLS in transit and at rest Encryption
  • Automation: Automate tasks and business processes
  • Reporting and Visibility: Audit and usage reports and API integrations


  • Easily Access Up-to-date Content – Any Time, Anywhere, Any Device...
  • Lower Costs of Operations and Overheads
  • Shrink Cycle Time on Review and Approval Processes
  • Provide Visibility into Projects, Programs and Issues
  • Optimize use of Best Practices and Organizational Knowledge
  • Improve Relationships with Clients, Partners and Suppliers
  • One Platform. Infinite Possibilities...


£3000 per licence per year

Service documents


G-Cloud 11

Service ID

6 6 4 2 0 4 7 9 2 8 6 7 3 3 3


DesignLinks International

Abubakr Rangara


Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
WorkSmart has no technical constraints as long as the user is on a current browser (the two latest versions).
System requirements
A recent JavaScript enabled browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
- Standard: Within 72 Hours.
- Custom SLAs can be provided as per client requirements.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Different Support Levels provided based on custom agreements/client-requirents.
Technical Account Manage and Cloud Support Team provided on- demand.

You are appointed with an Account Manager during your implementation to make sure that you’re set up for success. Our highly experienced technical support team works closely with you to get started quickly.

Here’s what you can expect for Corporate Business Users:

1) 24/7 Dedicated Premier Call and Email/Web Support
2) Guaranteed 1-Hour First Response Times for Urgent Issues
3) Guaranteed 2-Hour First Response Times for High and Normal Issues
4) Custom Shared Help Desk/Escalation Model
5) Off-Hours On-Call Support
6) Onsite Check-Ins/Troubleshooting
Support available to third parties

Onboarding and offboarding

Getting started
We have a wide range of pre-designed solutions to get customers started quicly in matter of few clicks. This allows the customer to quickly take them from idea to implementation in a matter of seconds.

WorkSmart also has a comprehensive online User Guides to help customers with all the functionalities available in WorkSmart.
Service documentation
Documentation formats
End-of-contract data extraction
All the cotents stored in WorkSmart belongs to the customer, who can download all of it in different formats like PDF, Excel, etc.
End-of-contract process
WorkSmarts’s standard termination terms and conditions are included in the WorkSmart Service Agreement. WorkSmart provides Customers with 30 Days for Data Download once Contract is completed. Free of Charge.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
We have a dedicated mobile application for Android and iOS platforms which are specifically designed for mobile screens. They provide the same level of information with an added ease of use on smaller screens
Service interface
What users can and can't do using the API
WorkSmart allows you to connect with your solution using an API. This allows you to interact with your data in WorkSmart using API calls thereby opening possibilities of further integrations with your systems.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Most of the things in WorkSmart are customisable:
- White labeling/Branding
- Change themes to suit your taste
- Customisable Widgets for dashboard
- Custom applications - with custom forms, rules, views, etc.


Independence of resources
WorkSmart platform is hosted on Amazon AWS with Complete Scalable architecture with full redundancy and 24/7 Monitoring.


Service usage metrics
Metrics types
All changes in WorkSmart are logged as an activity for the user. These activites can be viewed in admin reports and helps Administrators monitor different types of activities on their account :

- Users Activity Logs
- Applications Activity Logs
- Storage Space Usage Logs
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Customers can export their data by downloading them as PDF, Excel or as a ZIP file from web application
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We provide 99.99% Up-time guarantee to all our customers. We also provide custom SLAs as per customer needs. Refunds/Credits are issued as per contractual availability agreement.
Approach to resilience
All of our datacenters operate in a Highly-Available mode. Our services are spread out geographically to avoid single point of failure. The detailed information is available on request.
Outage reporting
Outages are reported via public dashboard and via email alerts.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
WorkSmart provides Customers with powerful Admin console which includes Management, Branding, Reporting and Support Area.

Users with Special Previliges for Management and Support Roles Only have Access to Management and Support Areas on the Platform.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Hosted Environment - G-Cloud UK - Compliant
  • Hosted Environment - GDPR - Compliant
  • Hosted Environment - ISO 27001 - Certified
  • Hosted Environment - AICPA | SOC - Compliant
  • Hosted Environment - Cloud Security Alliance – STAR Registrant
  • Hosted Environment - PCI-DSS - Compliant
  • Hosted Environment - HIPAA Compliant
  • Hosted Environment - FedRAM – Compliant
  • Hosted Environment - FISMA – Compliant

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow Industry recognised privacy and security standards when dealing with Client Information. We publish our privacy and security policies at

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All releases are staged from Development, Testing and then finally into Production. All changes go through peer-review process and are logged and documented for at-least 12 months.

WorkSmart has a formal change management process for application and infrastructure changes. In addition, configuration and release management tools have been implemented. The code repository supports versioning and consistency across eh environment and provides the ability to roll-back changes.

WorkSmart also maintains baseline configurations for production servers to facilitate the configuration process.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We have implemented industry standard vulnerability scanners and keep active checks on them. We also subscribe to threat notification systems to get alerted in an timely manner. When a threat is detected, depending on the level of impact and severity, patches are dispatched either immediately or planned and released within agreed time-frame to minimise the over-all impact of the vulnerability detected.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We have automated threat detection monitoring alarms that gets triggered when any malicious activity is detected. Depending on the severity of the threat, we dispatch the fix either immediately or plan it accordingly to minimise the impact.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have pre-defined processes for common and recurring incidents. We do proactively monitor different incident types and try to minimise them by issuing a fix for them. Users can report incidents via our Ticketing System. Incident Reports are provided while an Incident in on-going followed by a full incident report when the incident is resolved.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£3000 per licence per year
Discount for educational organisations
Free trial available
Description of free trial
3 Nodes . 10MB Space . 10 Users
Link to free trial

Service documents

Return to top ↑