Assure Asset Management health and safety software allows your organisation to create a register of assets across departments/locations. This allows simple visibility of assets across all regions. Utilising automated notifications and action management linked to maintenance and testing dates, personnel will always be aware of deadlines and compliance requirements.
- Maintain safe operations of all assets across your organisation
- Manage assets with scheduled reminders, action management and follow-up actions
- Track actions to completion with a full audit trail
- Equipment register stores all your equipment records by location
- Track when, where and to who equipment is issued
- Record and schedule when asset(s) are due to be returned
- Maintain assets/equipment value through visibility of maintenance/testing requirements
- Ensure preventative maintenance reducing unexpected breakdown costs and disruption
- Maintain compliance in line with legal requirements
- Clear visibility of issue and responsibility for specific items
- Scheduled maintenance aligned with company risk assessments and training requirements
- Reduces risk exposure and potential claims
- Provide real time equipment information and location
£9495 per instance
0300 303 3657
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||The Assure health and safety management solution from SHE Software is modular. This means each Assure module works standalone, but integrates powerfully with others to provide you with a complete solution.|
|Cloud deployment model||Private cloud|
|Service constraints||99.98% service availability, assured by independent validation of assertion|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Support availabile Monday - Friday 8:30 - 17:30.
Standard support response times: All calls answered within 15 seconds, all problems diagnosed solutions identified within 40 minutes, solutions implemented within 13 hours (Average)
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
Our customers prize our expert and friendly support both during implementation and ongoing. 95% of our customers renew every year.
Our UK based customer services team answer all calls promptly (100% within 15 seconds) and resolve problems quickly whether they relate to training or configuration. We follow a 6 stage case management process.
All cases, issues, or requests for change are, in the first instance, reported to the Help Desk as the central point of contact. As first line support, the Help Desk can be contacted by phone or email Monday to Friday 8:30-17:30. Requests are recorded and monitored in our case management system which ties the request to your customer account to provide a complete history.
Where first line support is unable to solve the customer issue, the case is escalated to second line support. Here, our system experts will work to understand the customer issue and diagnose the problem. Once derived, the solution is communicated, by phone and/or email, to the customer within the defined SLA's in the T&Cs.
If second line support cannot resolve the customer issue, the case is escalated to third line support for root cause analysis and/or data fix.
|Support available to third parties||Yes|
Onboarding and offboarding
Assure has been designed with the user in mind, combining an intuitive consumer style interface with a corporate strength backbone. As a result, it meets business requirements while being straightforward and intuitive to use - not just by experts but by your organisation at large.
We provide users with three training delivery options: onsite at our training facility near Glasgow, onsite at your organisation or online via webinar.
Although influenced by the number of, and the level to which, users are to be trained, the number of training days required is always at your discretion. We will discuss with you a suitable number of days and which delivery method is best suited to your individual requirements.
All licensed users of Assure have access to our Knowledge Base, which contains a variety of help videos and articles.
|End-of-contract data extraction||The Customer should, no later than ten days after the effective date of the contract end, submit a written request for the delivery of the then most recent back-up of the Customer Data and any attachments that have been uploaded to the system.|
|End-of-contract process||If the customer is not renewing they can extract their data via the tools provided or the data extraction can be provided by SHE Software at an additional cost.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Although our safety management solution, Assure, can be accessed via any web-enabled device simply using a web browser, the Assure Mobile App is designed to enhance the interface for access via mobile devices.
The App replicates functionality that is available in the Portal Module and makes it available for full offline use with complete synchronisation once a web connection is re-established. The App can be used to complete risk assessments, audits, incident reports, etc., in the field without having to worry about network coverage.
|Accessibility standards||None or don’t know|
|Description of accessibility||
Non-text content is only for visual formatting. This would allow it to be ignored by assistive technology.
Text is high contrast, black on white. Where the customer’s hardware and/or browser allows, Assure will adapt when switched to assistive colours.
Assure is responsive and, without assistive technology, text can be zoomed to 200 percent without loss of content or functionality.
Where supported by hardware and/or browser, Assure will allow speech to text input on all text boxes.
|What users can and can't do using the API||Data insert using RESTful API.|
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||Assure combines complete out of the box health and safety functionality (allowing you to be up and running immediately) with an exceptional level of configurability - of forms, organisation, permissions, reports, dashboards, etc. The configurability is controlled by permission settings by user type. This meets all but the most specialist / bespoke requirements and satisfies 99% of customers.|
|Independence of resources||Real-time monitoring of server load with alerts on critical components EG. CPU load, memory load, throughput. Application servers are load balanced.|
|Service usage metrics||Yes|
|Metrics types||All system fields|
|Reporting types||Reports on request|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
Report and download (templates and bespoke) into Excel
Reports in JSON format
Active data connections to Excel
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
|Other protection within supplier network||IP restricted access|
Availability and resilience
|Guaranteed availability||99.98% uptime, scheduled and notified maintenance schedules, clawback in contract|
|Approach to resilience||Available on request.|
|Outage reporting||Dedicated 24/7 monitoring at service centre. Real-time dashboard and email alerts.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Permissions based by role and organisation unit.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||ISO Quality Services Limited|
|ISO/IEC 27001 accreditation date||18/05/16|
|What the ISO/IEC 27001 doesn’t cover||N/a|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Assured by independent validation of assertion.|
|Information security policies and processes||Registered data controllers under DPA|
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||Our hosting provider maintains documented operational procedures for both infrastructure operations and customer-facing support functions. Newly provisioned infrastructure undergoes appropriate testing procedures to limit exposure to any hardware failure. Documented procedures and configuration version controls provide protection from errors during configuration. Changes to an existing infrastructure are controlled by a technical change management policy, which enforces best practice change management controls including impact/risk assessment, customer sign off, and back-out planning.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Patches to solution every 2 weeks unless critical, then immediate.
Penetration testing and internal code testing (peer reviewed and deployment testing services)
Employ best practice to mitigate against known issues (e.g. SQL Injection)
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||The Alert Logic Threat Management™ system monitors our hosting provider's environment, detecting external and internal threats. When it detects an incident, Alert Logic's ActiveWatch service provides expert guidance from its security operations centre (SOC), staffed round the clock by Alert Logic security analysts. Integrated vulnerability scanning identifies possible points of entry and corrects them.|
|Incident management type||Supplier-defined controls|
|Incident management approach||The Alert Logic Log Manager™ automatically aggregates, normalizes, and stores log data simplifying log searches, forensic analysis, and report creation through real-time or scheduled analysis. LogReview provides daily event log monitoring and review by a team of Alert Logic security professionals.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£9495 per instance|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|