Target Information Systems Limited

Verature Visitor & Contractor Management System

Verature Visitor and Contractor Management Database controls Visits to your Site(s) by Visitors and Contractors who are undertaking Works at your site.

Verature manages Supplier On-Boarding, H&S Questionnaires, Bookings, Inductions, Risk Assessments, Method Statements and Emergency Plans, Site Fire Registers and Audit for evidence-based compliance.


  • Supplier On-boarding and automated H&S Questionnaires & Renewals
  • Centralised Approved Contractor Database
  • Secure storage and retrieval of compliance documents
  • Automated renewals of compliance documents
  • Daily view of contractors due on site
  • Access for Staff, Reception, and Security
  • Unlimited Internal and External Users
  • Inductions through Supplier Portal off-site
  • RAMS Approval and Tracking
  • Live Site Fire Register


  • 24/7/365 access to all information
  • Configurable to meet your policies, processes and procedures
  • Aligns with your incumbent IOSH/NEBOSH procedures
  • Centralised Contractor control database for internal and external audit
  • One version of the truth around your visits and contractors
  • Save significant time through automation
  • Detailed and automatically renewed Contractor Compliance documents
  • Mitigate incidents caused by non-compliant contractors to:
  • Prevent damage to your reputation
  • Avoid H&S fines and prosecutions


£14,750 to £24,500 an instance

  • Education pricing available

Service documents


G-Cloud 12

Service ID

7 2 7 3 1 6 3 9 7 2 9 7 8 9 2


Target Information Systems Limited Phil Atkinson
Telephone: 07702 248 948

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
Verature has unlimited internal and external users and each instance is restricted to 50GB data storage. Additional storage is available on request.
System requirements
  • A desktop or tablet computer
  • A modern Internet browser
  • A connection to the Internet

User support

Email or online ticketing support
Email or online ticketing
Support response times
In FY2020 we responded to 99.7% of all support emails within the first hour.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
All support matters are to be first raised to the support email:

Target provides application support between the hours of 9.00am and 5.30pm Monday to Friday excluding Bank Holidays.

A support matter emailed to the support email can be followed up with a call in office hours to: 01226 212 056.
Support incidents are split into three priorities:

Priority One
This is where an application is unavailable and users are unable to access the system. This will be responded to in one hour in business hours and have a resource dedicated to the problem until it is resolved. Target will work 24/7 on this problem until it is resolved.

Priority Two
This is for intermittent, non-critical support matters where the application is available and an error is occurring which does not affect normal usage of the system.

Priority two matters will be responded to within four business hours, and typically resolved within 72 hours.

Priority Three
For minor matters such as layout issues, spelling mistakes in graphical text or minor amends; these will either be resolved within seven working days or scheduled for an agreed date/time.
Support available to third parties

Onboarding and offboarding

Getting started
Verature is very easy to onboard. We are able to help with data migration, installation and training.

Risk is minimised as your Site(s) will have an incumbent method for control of visitors and contractors and Gatehouse is not put to live until fully tested and accepted by the client.
Service documentation
Documentation formats
End-of-contract data extraction
Client will need to have their data exported into their preferred format at time of terminations.

Details on cost are available on request.
End-of-contract process
The contract end date is agreed and requirements for exporting the data are discussed with the Account Manager.

Where development work is required for recovery of the data this is clearly documented, communicated, and controlled via our ISO9001 Quality Management Processes

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The available screen size of smaller devices can limit visibility of the information
Service interface
Customisation available
Description of customisation
Clients are able to customise their instance of Verature to meet their specific policies, processes or procedures.

This configuration is undertaken by Verature at the time of mobilisation.

Verature is a highly flexible and configurable platform.


Independence of resources
Verature instances are on high-end server infrastructure with immediate access to CPUs, scalable memory and server storage.


Service usage metrics
Metrics types
User defined.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Clients export their data through their requirements to their Account Manager.
Data export formats
Data import formats
Other data import formats
Import not available to users, only at time of mobilisaton

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Approach to resilience
Available on request.
Outage reporting
Planned and unplanned outages are communicated via email.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Verature is configured to clients requirements where the permissions to access the database are configured at time of mobilisation.

Certain users have permission to set what access Users have to the database.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
1 July 2020
What the ISO/IEC 27001 doesn’t cover
We have been assessed on all control measures of the standard.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Verature is a product of Target Information Systems Limited who are operating to ISO27001 with accreditation expected in November 2020.
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration of Verature happens upon mobilisation which is supported by a project roadmap listing any out of scope items for future consideration.

Changes are managed through a Change Request procedure as part of our ISO9001 Quality Management System
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available on request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request.
Incident management type
Supplier-defined controls
Incident management approach
Available on request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£14,750 to £24,500 an instance
Discount for educational organisations
Free trial available

Service documents