VICTR
VICTR (Very Intelligent and Comprehensive Technology for Recruitment) takes recruitment back to basics. VICTR solves administrative your overheads operating in the recruitment sector, by bringing together all parties in the recruitment chain. Reform heavy business process with an integrated platform that streamlines payroll, billing, invoicing, timesheeting, customer, and workforce management.
Features
- Real-time reporting on time, invoicing, billing, payroll and placements
- Action Centre tracks agency workforce utilisation and task management
- Centralise your customer management across the entire recruitment chain
- Automatic invoice generation upon timesheet and expense approval
- Rapid worker registration, cutting down onboarding times
- Automatic collection of all contractor compliance
- Automated compliance, attendance and pay
- Cloud-based solution providing easy and secure plug-and-play
- Easily enter a placement and have workers add their timesheets
Benefits
- Reduces administrative overheads of operating in the recruitment sector
- Connects agencies, workers and hirers in the recruitment chain
- Integrated platform removing mistakes and duplication of data
- Helps repurpose team effort towards revenue-generating activities
- Reduces total IT expenditure per annum
- Simplification of workflows from vacancy advertising to payroll
- Pay as you go, no lock-in contracts
- Increased transparency and compliance
- An easy to use solution for all contract engagement types
- Low cost and easy to use
Pricing
£3,000 a unit
- Education pricing available
- Free trial available
Service documents
Framework
G-Cloud 12
Service ID
8 3 4 7 0 2 5 8 8 1 2 4 4 9 3
Contact
Stealth
Tom Soper
Telephone: 07497084037
Email: tom@awsm.tech
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Downtime may occur during planned maintenance. However, these will only occur overnight or at weekends.
- System requirements
- Compatible browser - IE11+, Edge, Safari, Firefox, Chrome, Opera
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response time SLA is 2 hours. However, we typically reply within less than 60 minutes.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
The internet can be a great enabler and source of freedom for disabled users.
At VICTR, we are committed to ensuring that our services are as accessible to disabled and elderly people as reasonably possible. We aim for a consistently high level of usability for our entire audience across all of our websites, following best-practice accessibility guidelines.
We engage with disabled, non-disabled and elderly people throughout website development to fully understand user requirements and ensure we produce sites that meet these.
We also create specific content or tools to enable particular disabled user groups to get a better experience.
VICTR is committed to sharing its experience of how to create usable and accessible websites via our accessibility standards, and by working with the wider accessibility and disability communities and the rest of the UK web industry. - Onsite support
- Yes, at extra cost
- Support levels
- Support hours are 09:00 - 17:00, Mon - Fri, and is included in our standard licensing agreement. Out of hours support can be discussed on a case-by-case basis at an additional cost. Support is available by phone and email, as complimentary products to our Service Desk. Response times for P1 incidents is 2 hours, P2 is 4 hours, P3 is 8 hours and P4 is 72 hours. Our standard licensing agreement has 20 hours of support included free of charge. Any hours tracked above 20 will be chargeable at our standard rate (see Ts & Cs for more information). Bespoke development is available at a standard hourly rate (see Pricing Document for more information). Customers are appointed a 2nd line technical liaison, as well as a dedicated account manager.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Upon acceptance to license our product, we set users up with their instance in DEMO mode. This can be for any length of time up to 2 weeks. At any point during this period, customers can choose to go-live, otherwise they will default to going live after 2 weeks. Remote training is included in the licensing cost; if onsite training is required, this can be arranged at additional cost. User documentation is available via our service desk knowledge base.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users are able to extract all raw data from our system via their standing reporting dashboard. We are also happy to assist with an extract.
- End-of-contract process
- Our SaaS contract includes setup/configuration, standard pricing for additional instances, RTU licence, training and support. Contracts are available on a 12, 24 or 36 month basis, with a charge per worker processed on weekly, fortnightly and monthly bases. As the number of workers being processed can vary, we charge a minimum subscription of 40% of the contract value to ensure our costs are covered. 20 hours of support are included as standard within the licensing agreement. Additional / bespoke development is charged in addition (a feature request can be raised via our customer portal and a quote will be provided).
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no functional differences between mobile and desktop - these are purely cosmetic/UIUX specific (e.g. button placement, removal of some images etc.)
- Service interface
- Yes
- Description of service interface
- The Service Interface allows users (Administrators and Standard) to access the relevant application configuration settings. Administrators can configure, manage and monitor all aspects of the system relating to their organisation. Standard users can modify their own personal settings.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- The internet can be a great enabler and source of freedom for disabled users. At VICTR, we are committed to ensuring that our services are as accessible to disabled and elderly people as reasonably possible. We aim for a consistently high level of usability for our entire audience across all of our websites, following best-practice accessibility guidelines. We engage with disabled, non-disabled and elderly people throughout website development to fully understand user requirements and ensure we produce sites that meet these. We also create specific content or tools to enable particular disabled user groups to get a better experience. VICTR is committed to sharing its experience of how to create usable and accessible websites via our accessibility standards, and by working with the wider accessibility and disability communities and the rest of the UK web industry.
- API
- Yes
- What users can and can't do using the API
- Our API is already accessed by several 3rd parties. We expose only necessary, GDPR compliant data. It is open and readily available to suppliers that wish to use it as-is. Any changes required will incur development charges.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Our software has been designed with customisability in mind. We are able to apply changes to specific customers upon their request, at an additional charge. Two common examples we are often asked for include a change in workflow/process or development of a bespoke report.
Scaling
- Independence of resources
- Our software is cloud hosted and therefore infinity scalable on demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Standard metrics such as downtime/uptime, active sessions, concurrency etc.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export all of their data as a csv file from the reporting section of the system. We are able to provide a copy of the latest database backup upon request.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.9% availability during core business hours (9am-5pm), Monday to Friday, excluding English bank holidays. Service credits are available in our standard terms for any SLA breach.
- Approach to resilience
- Available on request
- Outage reporting
-
Email alerts to customers from our service team.
Status updates / notifications are also published via our Service Desk platform.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Support channels can only be used by recognised and registered personnel. Management interfaces and access to them are fully controlled by the customer who can assign roles and responsibilities as required.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- All staff members (permanent and contract) must sign to state they have read and understood the Information Security policies. Background checks are undertaken. We review administrator level accounts on a quarterly basis and ensure any no longer utlilised are removed. Access levels to any system are commensurate to their role. We use only accredited hosting providers. We are also pursuing ISO/IEC 27001 certification.
- Information security policies and processes
- All staff members (permanent and contract) must sign to state they have read and understood the Information Security policies. A review of their understanding is undertaken annually and policies resigned. Failure is reported at CxO level. All new starters are required to read and confirm all policies and procedures and again at least annually. Any changes made during the period are notified to the whole company.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All our source code is tracked through life using Jira and Azure DevOps, which logs all changes made and any impacts. In addition, all changes made to our hosted environments follow a full electronic change control process, to ensure a robust audit trail and full compliance with internal security policies.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We use a variety of sources to recognise potential threats. We scan our environments for known threats on a weekly basis - prior to any release - to determine where any vulnerabilities may exist. Furthermore, any code fix issues can be patched and deployed within 24 hours depending on the severity of the issue. We use accredited cloud hosting providers that ensure infrastructure is regularly patched and maintained to avoid any security threats.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We have processes and procedures in place to actively monitor and proactive resolve any potential compromises. Our hosting provider also has the same. CxO are informed of any breaches in a timely manner. Any breaches are immediately impact assessed - and the root cause analysed - so that necessary actions can be taken. Where customer data may be compromised, we would inform any affected customers as soon as it is practical to do so.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our incident management process differs based on the type and severity of incident. For more information, see Service Definition document.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £3,000 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
2 weeks' of unlimited access to the system.
Demo instances can be requested from https://www.victr.co.uk - Link to free trial
- https://www.victr.co.uk