Elecosoft ShireSystem

ShireSystem CMMS (Computerised Maintenance Management Software)

A CMMS system helps manage equipment, inventory and entire maintenance teams at a single location or across global organisations. It offers a combination of work order management, inventory management and maintenance scheduling features that cover all the bases for any organisation with facilities, machines or other assets that need maintaining.

Features

  • Asset Register
  • PPM & corrective tasks.
  • Work Scheduling
  • Mobile Deployment
  • Alerts & Reminders
  • Documents & Pictures
  • Meter readings
  • Detailed Reports & Management KPIs
  • Fault Types
  • Stock Control & Parts Catalogue & Purchase Management

Benefits

  • Affordable with unbeatable value
  • Hosted Option for fast deployment
  • Scalable ShireSystem from one to any number of users.
  • Secure The system has location security with user access protection
  • Flexible Configure the system to your own terminology or language
  • Accessible on the move get your information anywhere
  • Easy to Use, real results without an excessive learning curve.
  • Supports Decision Making with powerful reporting capability.

Pricing

£195.00 to £895.00 per licence

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

7 2 8 1 0 0 3 2 2 1 9 7 5 6 1

Contact

Elecosoft ShireSystem

Matthew Bentley

02380 224111

shiresales@elecosoft.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Android devices must be Jellybean 4.2 and above.
Support desk Monday - Friday business hours.
System requirements
  • MS Windows Server 2016 with MS Windows Server 2012 R2
  • Dual Core 2GHz x64 Processor
  • 100 GB of free disk space after operating system installation
  • 1 Gbps network card and switches
  • MS SQL Server Standard edition, version 2008R2/2012/2014/2016/x64

User support

Email or online ticketing support
Email or online ticketing
Support response times
ShireSystem Support endeavour to respond to email queries within one working day of receipt of email.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
ShireSystem Support provide a single level of support, a ‘Software Support Agreement’ provided by telephone, email and remote technologies during normal business hours, Monday to Friday, excluding UK public holidays.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Web demonstrations.
Onsite training at four venues throughout the UK.
On customer site training throughout UK & EU.
Product help guides.
Telephone, email and web support.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Website
  • Video
  • USB training guide
End-of-contract data extraction
All information can be exported to excel
End-of-contract process
Software license is for 999 years and is bought outright.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile Pro is a fully functional version of the main Maintenance module which has been adapted to be mobile friendly with additional flexibility of the desktop version.
Service interface
Yes
Description of service interface
Pirana features Rest/Json Interface secured by
- JWT Tokens obtained by either a User Name/Password or PIN number.
- Devices logged via ‘Pirana Licences’, ensuring only a finite number of known devices can connect
- Where configured, can be used with SSL/Certificates (highly recommended).

There is a legacy WCF/SOAP/XML Interface that is maintained for legacy purposes. We are in the process of deprecating it.

This allows access to information related
- Work Order
- Purchase Order
- Meter
- Stock
And to perform some updates on that information.
Accessibility standards
None or don’t know
Description of accessibility
Pirana features Rest/Json Interface secured by
- JWT Tokens obtained by either a User Name/Password or PIN number.
- Devices logged via ‘Pirana Licences’, ensuring only a finite number of known devices can connect
- Where configured, can be used with SSL/Certificates (highly recommended).

There is a legacy WCF/SOAP/XML Interface that is maintained for legacy purposes. We are in the process of deprecating it.

This allows access to information related
- Work Order
- Purchase Order
- Meter
- Stock
And to perform some updates on that information.
Accessibility testing
Pirana features Rest/Json Interface secured by
- JWT Tokens obtained by either a User Name/Password or PIN number.
- Devices logged via ‘Pirana Licences’, ensuring only a finite number of known devices can connect
- Where configured, can be used with SSL/Certificates (highly recommended).

There is a legacy WCF/SOAP/XML Interface that is maintained for legacy purposes. We are in the process of deprecating it.

This allows access to information related
- Work Order
- Purchase Order
- Meter
- Stock
And to perform some updates on that information.
API
Yes
What users can and can't do using the API
Web Services use XML/SOAP standards based on Microsoft WCF services
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Addition of logo and front page skin

Scaling

Independence of resources
Each customer is allocated their own resources which can be stopped, started and restarted in isolation.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Throughout the system there are export to excel buttons.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Word
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Hosted in tier 4 data centre with resilience
Approach to resilience
Upon request, services are hosted in Tier 4 data centre.
Outage reporting
No

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access to the system is restricted by user definable UserName/Password accounts. These are associations with roles (profiles) that restrict a user to a 'Use Case' e.g An Administrator has complete access whilst an engineer is limited to just the ability to complete work orders.

Data can be filtered out according to the profile as well, allowing multiple sites to use the same piece of software but not see data specific to the other site.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
We make it a priority to take security and privacy concerns seriously. We strive to ensure that user and system data is handled securely. Shire Systems uses industry standard technology for security. This Security Statement is intended to provide transparency about our security infrastructure and practices, to help reassure you that your data is appropriately safeguarded.
Shire System is committed to the principle of continual improvement and has developed a Quality Management System against the requirements of BS ISO 9001:2008 Shire Systems Limited’s Quality Management System procedures and information are maintained on the Shire Systems Limited Intranet in readiness for use and is available 24/7 if required.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Source Control is maintained in Microsoft Dev Ops/Visual Studio Online for all products. This is password secured.

Offline copies of source are kept for each version for ESCROW purposes in a secure safe.

These are reviewed regularly as part of our ISO 9001 certification.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The product is currently being reviewed to ensure compliance with the OWASP Top 10 Security requirements.

Third Party Component Suppliers regularly offer Security updates that we will generate a new release from, updating our hosted customers as soon as possible and making it available to customers using their own infrastructure.
Protective monitoring type
Undisclosed
Protective monitoring approach
Services are hosted in a 3rd party tier 1 equivalent data centre that is ISO27001 and PCI compliant
Incident management type
Supplier-defined controls
Incident management approach
Incidents can be reported by phone or email to our service desk, reports can be provided by email or phone detailing the outcome and cause.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£195.00 to £895.00 per licence
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
30 day trial of a demonstration system upon request,

The system is a full system set up with demonstration data input and allows the user to trial the system in a real world scenario.

Service documents

Return to top ↑