Sundown Solutions Ltd is a fully managed, software as a service solution, designed to reduce bed blocking (referred to as Delayed Transfers of Care – DToC).

NHS staff and social workers use the apps on any device to view real-time care home occupancy across any district and arrange admissions immediately.


  • Real-time care home bed occupancy from across the country
  • Real-time 24/7 365 Service Desk Support
  • Apps in ALL stores (iOS, Android, Windows & Amazon)
  • No logical or organsaition boundaries
  • Full post code poximity search for real-time care home occupancy
  • Full analytics suite for CHC teams to manage care pathways
  • Full API availabity
  • Full integration with Bray Leino Broadcare
  • 3 hour on-boarding time for typical CCG/LA (50+ homes)
  • Fully managed service with dedicated bed state tracker administrators


  • Reduce Delayed Transfers of Care (DToC -aka bed blocking)
  • Save £12,000 per year immediatly in efficeny savings
  • Free up clinical staff from admin work
  • Find care home spaces immediatly across all geographically borders
  • 7 CCGs currently on-boarded since Jan 17 more every week


£49 to £99 per unit per year

Service documents

G-Cloud 9


Sundown Solutions Ltd

Heath Groves

02087 980525

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints We specific maintenance windows at 03:00 am on every third Sunday of the month
System requirements
  • Usable from ANY device that connects to the internet
  • Available from any location
  • Available in all app stores
  • Available on all browser types
  • No system setup required
  • CCGs/LAs & councils on-boared in less than 3 hours

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our SLA is 24/7 365 with the following criteria:

Severity 1 – Response within 4 hours
Used for important cases, that require an immediate fix. The definition of a sev 1 can be termed as:
“All users, cannot get to, access or use some of their data”

Severity 2 – Response within 8 hours
Used for standard issues that require investigation
“Some users, cannot get to, access or use some of their data”

Severity 3 – Response within 3 days
“Usually a request for information, training, or infrastructure work”
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide 24/7 coverage under our SLA with dedicated Bed State Tracker administrators for homes to leverage to ensure occupancy is being kept up to date and in real-time
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide simple 1 page training guides as the system is very intuitive

We also have a full on-boarding process and guide
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction They can extract data via RESTful APIs or request a DB to transferred to them either online or physically
End-of-contract process At the end of the contract the customers site collection is switched to read only and the customer is given an option to have it transferred online, or physically shipped to them on an encrypted, couriered USB 3.0 drive.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Fully responsive mobile design works on all phone types

The free apps are available in ALL app stores including iOS(Apple), Android (Google Play), Windows (Universal apps) and Amazon (Fire/kindle and TV)

Download the free app and contact us for a demo account to test the system fully - just search bedstatetracker in ANY app store
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Solution works perfectly will all current screen reader technology
What users can and can't do using the API We have a full suite of RESTful APIs for access by external parties and customers to help integrate our service with any current API aware consuming service.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Buyers can fully customise the branding and design templates as well as the look and feel of the free APPs


Independence of resources We use a Development Operations model coupled with containerisation and as such our solution is 97% smaller than any other competitor - ensuring that we can scale beyond current measure.

We also utilise HTML5 session storage to ensure that our solution works over very low bandwidth connections


Service usage metrics Yes
Metrics types We provide live and real time metrics on occupancy and fill rates for all care homes as well as full system usage details upon request
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach Full Encryption at rest including Bitlocker on ALL drives and Full SQL Encryption on all databases
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can use RESTFul APIs or windows explorer
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • RESTful APIs
  • JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks We also have our own patented encryption for in-flight data transfer that encrypts inside standard SSL tunnels - This is called Sundown Encryption GB Patent: GB2522096
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% up-time between 08:00 > 18:00
99% up-time between 18:00 > 08:00
Approach to resilience We have two separate UK locations - Altham and Cornwall secured by site to site link.

More data is available upon request
Outage reporting We utilise our public dashboard, social media presence and email alerts including resolution reports

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels We use Just In Time Access requests (JiT) - requests submitted for length of access required by engineer and line managers approve requests which grant access to data for the duration of the request and revoked automatically when finished and globally at the end of each working day.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations GB Encryption Patent (GB2522096)

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards We are currently working towards ISO 27001 and are currently going through the process
Information security policies and processes We have policies for Information and security governance, Cultural awareness, Risk Management as well as Personal and Physical security.

These are enforced and checked using the relevant technological devices where possible (Checkpoint firewall logs, server logs, pen testing, IR Sensors, CCTV, anti tamper devices, flood sensors motion trackers) and all instances are reported to the responsible member for that area - in the main reporting directly to line managers and then CTO - and ultimately to the Managing director.

Specifically with regards to information security we ensure that all logs are automatically scanned against defined patterns stated in out IS policy.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We use a development operations model and standard CAB meetings for code drops and artefact alterations which must first go before the CAB board and be agreed by the CTO - all versions and artefacts are tracked through SharePoint versioning and audit controls within TFS and Visual Studio online:

Code —Code development and review, version control tools, code merging;
Build —Continuous integration tools, build status;
Test —Test and results determine performance;
Package —Artefact repository, application pre-deployment staging;
Release —Change management, release approvals, release automation;
Configure —Infrastructure configuration and management, Infrastructure as Code tools;
Monitor — Applications performance monitoring, end–user experience.
Vulnerability management type Supplier-defined controls
Vulnerability management approach As we are an internet facing service we treat all patches as ZERO day and implement immediately - we often have to deal with regressions in those patches because of this, but can not afford for immediate patches to exploits to not be applied.

We use internal Penetration testing as well Sunblast IPS logs to detect all port scans and internal Nessus scan monthly on all products and services as well as Nessus owasp scans against all sites.

We are BCS Members and MS Gold Partners as well members of EC council - we receive all their alerts
Protective monitoring type Supplier-defined controls
Protective monitoring approach We utilise scanning on the wire via checkpoint appliances, scanning on interaction with our web services and scanning on access for all content. We have an enterprise IPS license with Checkpoint, MalwareBytes, and Symantec Endpoint Protection Manager for our servers & devices.

Alerts or incidents raised go through our 24/7365 service desk covered by SLA:

Severity1 – Response within 4 hours - Used for important cases, that require an immediate fix.
Severity2 – Response within 8 hours - Used for standard issues that require investigation
Severity3 – Response within 3 days - Usually information, training, or infrastructure work
Incident management type Supplier-defined controls
Incident management approach All "anomalies" are reported to our 24/7 365 service desk - usualy via email if picked up on scan.

We have a tiered SLA approach to these rules and react accordingly.

Users can call the same mechanism using the help desk number to report incidents.

Incident reports are provided no later than 10 working days after the incident - these are delivered via email.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks New NHS Network (N3)


Price £49 to £99 per unit per year
Discount for educational organisations No
Free trial available Yes
Description of free trial We offer a fly 3 months free trial with no obligation and no restrictions
Link to free trial


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑