With Re-flow workforce management software, you can centrally control your jobs on location and achieve outstanding workflow management. Our desktop dashboard gives you powerful job command functionality, and our ultra-stable app won’t let you down. We provide a fully managed and secure cloud service for your app data and dashboard.


  • Bespoke form builder for everything from risk assessments to worksheets
  • Drag and drop scheduling to assign all jobs and staff
  • Workers can still access all job information without internet connection
  • Forms are stored and automatically go into the cloud,
  • Automatically view completed forms with time/date and geo stamps
  • Real-time reporting from all jobs on the dashboard


  • Field access to tasks, checklists and paperwork for all users
  • Consistent information delivered to staff from site to office
  • All project information and documents stay in the cloud, forever
  • Instant evidence of compliance for stakeholders and regulatory authorities.
  • Live syncing means you can manage issues as they happen
  • Consistent information delivered to staff from site to office


£12.50 to £30 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 7 3 4 7 2 5 5 4 2 6 2 7 2 1


Re-flow Michael Saunders
Telephone: 01392574002

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
The Re-flow app operates on any modern Apple or Android smart phone or tablet. The dashboard can be accessed on any up-to-date web browser,
on a PC or Mac, desktop, laptop or tablet.

We’ll keep your system up-to-date with security patches, upgrades to future versions of Android and iOS, as well as compatibility with new releases of operating systems
System requirements
  • One licence is required per user account.
  • User need smartphone/tablet (Apple or Android) to run app
  • Minimum of 10 users required
  • Lap/desktop PC required to access web based dashboard
  • App uses native text so users cannot copy the text.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to reply to enquiries and requests for changes and additions within the following times,
within our office hours:
Build of new form or report – 5 working days
Amends to forms / reports:
High priority – 1 working day
Media – 2 working days
Low – 5 working days
Error or bug – respond within 12 hours, time to resolution 24hrs

We operate support over weekends, but only for technical issues that stop users being able to use their system.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Onsite support
Yes, at extra cost
Support levels
We provide a high level of training and support during the set up and throughout the contract life. We’ll keep your system up-to-date with security patches, upgrades to future versions of Android and iOS, as well as compatibility with new releases of operating systems. Support is offered via our ticket system – accessed through the help section of the Re‐flow dashboard – and by telephone, during our office hours, which are 8.30am until 5.30pm Monday to Friday, not including bank holidays. Out of office hours, we monitor our ticket support system and do our best to reply to emergencies ASAP. We monitor the Re‐flow system and our hosting services 24/7. There is no differential pricing available for our support, we treat each customer the same and respond to support requests on a priority basis. We have an in-house support team and named contacts for clients to liaise with.
Support available to third parties

Onboarding and offboarding

Getting started
Based on the assets initially requested, we set up the base system and app in the first week of the project and provide you video training. Once you are orientated to the navigational aspects of Reflow and sign off, we will then begin a communication around the form building process and edit the system to fit with your requirements over the following two to three weeks, accompanied by training and support. Throughout this process you will be asked to sign‐off at specific points, as well
as a final go live date.
Service documentation
Documentation formats
End-of-contract data extraction
At the end of the contract, your data remains your property. If you cancel the service, we can provide a data dump of the content in a CSV format.
End-of-contract process
Either party may terminate the agreement at any time by giving the other 30 days’ notice of termination in writing. If you terminate the agreement before the contract end, you will be required to make payment for the total outstanding monthly fees, including any outstanding setup and bespoke fees, already agreed upon to the end of the contract period, as outlined in the proposal/contract document.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Differences between the mobile and desktop service
Via a dashboard accessed through a standard website, your management team set up jobs and tasks and assign them to individuals, or groups of field workers, in your organisation. The information is then accessed by the employee in the field on an app, simply using their smart phone or a tablet. The user securely signs in, where they can then tick to complete tasks, fill in, and digitally sign, a whole range of forms. As your workers complete information, data comes back to the dashboard, so you can instantly see what’s been done, when, how and where.
Service interface
What users can and can't do using the API
The platform is commonly integrated with other applications. Our API’s support an extensive array of functions. All customers can be provided API access, subject to specific requirements. Access is controlled via auth and token methods. API’s support RESTful, JSON and XML methods.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Your business is unique, so Re-flow has been developed to flex around your requirements, meaning you don’t have to work around ‘off the shelf’ limitations and you can get straight into maximum productivity. Our solution's numerous, diverse configuration options allow our clients to effectively customise their application, so forms and data columns reflect your organisations ways of working and unique terminology. We support diverse configuration options in the areas of user-specific dashboards, custom reports, workflows, resource management and work order templates, and many other ares of the solution.


Independence of resources
We reserve the right to implement data transfer and bandwidth throttling, rate limiting or traffic shaping in circumstances where excessive bandwidth usage occurs outside of normal limits for the service supplied.

We reserve the right to suspend a customer's service. This is implemented as a last resort option for exceptional circumstances, reasonable endeavours are made to contact customers to rectify any problems before taking this course of action.

However, if any problem caused by one single customer is having a large detrimental effect to the services of other customers then we may have no choice but to act immediately.


Service usage metrics
Metrics types
All Re-flow reports are built bespoke for your specific requirements. Some uses might include:

Export costs with markup for instant PDF invoicing
Use reports in all kinds of ways, such as comparing skill sets in each location or actual wage costs per site.
Use reports to tell you which vehicles or plant is requiring the most frequent or costly maintenance to help decision making on asset write down.
The prerequisite training/expiry dates of current training that if absent/lapsed would make upcoming training invalid.
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Sent to defined contact in a CSV file
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We provide a fully managed, business class, hosting service for the dashboard and app data with the
following features:
Trip wire 24/7 security monitoring
Daily backups, on a 30‐day cycle
Secure server certificate
20GB Hard disc space
200GB bandwidth
We make best endeavours to respond to downtime when notified by email within 4 hours, with a maximum response time of 48 hours to switch to backup systems.
Approach to resilience
Available upon request
Outage reporting
Dashboard and email alerts

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
Username and password access. Administrators control who has access to each area of the system or types of information, via the management dashboard
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Cyber Security Essentials for all business, product and service functions. Our secure data centre hosting partner is accredited to ISO27001.
Information security policies and processes
We operate a cross-selection of information security policies, managed and enforced at board level including; starters & leavers, acceptable use policy, information awareness policy, information security policy etc. We periodically verify staff awareness and compliance to our policies, supported at executive level.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All application, code, configuration, build and environment change follows an agreed and standardised change recording and approval process. We operate multiple controlled environments; development, test, UAT and production to ensure all changes are verified and tested prior to being released to client or production systems/services. All exceptions are tracked and reviewed.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We monitor our servce 24/7- email notifications from threats, which are instantly patch if possible, by our internal engineers or with our supplier engineers.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We monitor our service 24/7- email notifications from threats, which are instantly patched if possible, by our internal engineers or with our supplier engineers. Furthermore, our hosting partner provides a 24x7 managed service that monitors all of our estate, products and services. They employ standard operating procedures, and undertake remedial and communication actions as required specific to the event detection.
Incident management type
Supplier-defined controls
Incident management approach
We operate a technical and customer support desk for all service incidents, through tickets and calls. The support desk team manage the life of the service incident to conclusion. Our customer is informed periodically and/or when support activities/changes take place, until full remedy.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£12.50 to £30 a licence a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.