Elecosoft ShireSystem

ShireSystem CMMS (Computerised Maintenance Management Software)

A CMMS system helps manage equipment, inventory and entire maintenance teams at a single location or across global organisations. It offers a combination of work order management, inventory management and maintenance scheduling features that cover all the bases for any organisation with facilities, machines or other assets that need maintaining.

Features

  • Asset Register
  • PPM & corrective tasks.
  • Work Scheduling
  • Mobile Deployment
  • Alerts & Reminders
  • Documents & Pictures
  • Meter readings
  • Detailed Reports & Management KPIs
  • Fault Types
  • Stock Control & Parts Catalogue & Purchase Management

Benefits

  • Affordable with unbeatable value
  • Hosted Option for fast deployment
  • Scalable ShireSystem from one to any number of users.
  • Secure The system has location security with user access protection
  • Flexible Configure the system to your own terminology or language
  • Accessible on the move get your information anywhere
  • Easy to Use, real results without an excessive learning curve.
  • Supports Decision Making with powerful reporting capability.

Pricing

£195.00 to £895.00 per licence

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

7 2 8 1 0 0 3 2 2 1 9 7 5 6 1

Contact

Elecosoft ShireSystem

Matthew Bentley

02380 224111

shiresales@elecosoft.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Android devices must be Jellybean 4.2 and above.
Support desk Monday - Friday business hours.
System requirements
  • MS Windows Server 2016 with MS Windows Server 2012 R2
  • Dual Core 2GHz x64 Processor
  • 100 GB of free disk space after operating system installation
  • 1 Gbps network card and switches
  • MS SQL Server Standard edition, version 2008R2/2012/2014/2016/x64

User support

User support
Email or online ticketing support Email or online ticketing
Support response times ShireSystem Support endeavour to respond to email queries within one working day of receipt of email.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels ShireSystem Support provide a single level of support, a ‘Software Support Agreement’ provided by telephone, email and remote technologies during normal business hours, Monday to Friday, excluding UK public holidays.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Web demonstrations.
Onsite training at four venues throughout the UK.
On customer site training throughout UK & EU.
Product help guides.
Telephone, email and web support.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Website
  • Video
  • USB training guide
End-of-contract data extraction All information can be exported to excel
End-of-contract process Software license is for 999 years and is bought outright.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile Pro is a fully functional version of the main Maintenance module which has been adapted to be mobile friendly with additional flexibility of the desktop version.
Service interface Yes
Description of service interface Pirana features Rest/Json Interface secured by
- JWT Tokens obtained by either a User Name/Password or PIN number.
- Devices logged via ‘Pirana Licences’, ensuring only a finite number of known devices can connect
- Where configured, can be used with SSL/Certificates (highly recommended).

There is a legacy WCF/SOAP/XML Interface that is maintained for legacy purposes. We are in the process of deprecating it.

This allows access to information related
- Work Order
- Purchase Order
- Meter
- Stock
And to perform some updates on that information.
Accessibility standards None or don’t know
Description of accessibility Pirana features Rest/Json Interface secured by
- JWT Tokens obtained by either a User Name/Password or PIN number.
- Devices logged via ‘Pirana Licences’, ensuring only a finite number of known devices can connect
- Where configured, can be used with SSL/Certificates (highly recommended).

There is a legacy WCF/SOAP/XML Interface that is maintained for legacy purposes. We are in the process of deprecating it.

This allows access to information related
- Work Order
- Purchase Order
- Meter
- Stock
And to perform some updates on that information.
Accessibility testing Pirana features Rest/Json Interface secured by
- JWT Tokens obtained by either a User Name/Password or PIN number.
- Devices logged via ‘Pirana Licences’, ensuring only a finite number of known devices can connect
- Where configured, can be used with SSL/Certificates (highly recommended).

There is a legacy WCF/SOAP/XML Interface that is maintained for legacy purposes. We are in the process of deprecating it.

This allows access to information related
- Work Order
- Purchase Order
- Meter
- Stock
And to perform some updates on that information.
API Yes
What users can and can't do using the API Web Services use XML/SOAP standards based on Microsoft WCF services
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Addition of logo and front page skin

Scaling

Scaling
Independence of resources Each customer is allocated their own resources which can be stopped, started and restarted in isolation.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Throughout the system there are export to excel buttons.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Word
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Hosted in tier 4 data centre with resilience
Approach to resilience Upon request, services are hosted in Tier 4 data centre.
Outage reporting No

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Access to the system is restricted by user definable UserName/Password accounts. These are associations with roles (profiles) that restrict a user to a 'Use Case' e.g An Administrator has complete access whilst an engineer is limited to just the ability to complete work orders.

Data can be filtered out according to the profile as well, allowing multiple sites to use the same piece of software but not see data specific to the other site.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance certified Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes We make it a priority to take security and privacy concerns seriously. We strive to ensure that user and system data is handled securely. Shire Systems uses industry standard technology for security. This Security Statement is intended to provide transparency about our security infrastructure and practices, to help reassure you that your data is appropriately safeguarded.
Shire System is committed to the principle of continual improvement and has developed a Quality Management System against the requirements of BS ISO 9001:2008 Shire Systems Limited’s Quality Management System procedures and information are maintained on the Shire Systems Limited Intranet in readiness for use and is available 24/7 if required.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Source Control is maintained in Microsoft Dev Ops/Visual Studio Online for all products. This is password secured.

Offline copies of source are kept for each version for ESCROW purposes in a secure safe.

These are reviewed regularly as part of our ISO 9001 certification.
Vulnerability management type Supplier-defined controls
Vulnerability management approach The product is currently being reviewed to ensure compliance with the OWASP Top 10 Security requirements.

Third Party Component Suppliers regularly offer Security updates that we will generate a new release from, updating our hosted customers as soon as possible and making it available to customers using their own infrastructure.
Protective monitoring type Undisclosed
Protective monitoring approach Services are hosted in a 3rd party tier 1 equivalent data centre that is ISO27001 and PCI compliant
Incident management type Supplier-defined controls
Incident management approach Incidents can be reported by phone or email to our service desk, reports can be provided by email or phone detailing the outcome and cause.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £195.00 to £895.00 per licence
Discount for educational organisations No
Free trial available Yes
Description of free trial 30 day trial of a demonstration system upon request,

The system is a full system set up with demonstration data input and allows the user to trial the system in a real world scenario.

Service documents

Return to top ↑