PSSLive offers a complete solution for managing your Assets, Inspections and Maintenance both onsite and in office environments. The software allows the entire workflow of the management and monitoring requirements for the Inspection and Maintenance regimes of the Assets for which you are responsible
- Mobile Inspections and Task Management.
- Live Risk-based Dashboard.
- Integrated Custom Report Builder.
- Control which Data your Users have access to.
- Unlimited Photo and Data Storage.
- Schedule Inspections and Tasks.
- Ability to carry out Inspections with Google Maps.
- Automated To-Do List.
- Full-Audit Trail.
- Built in EN-1176-77 Standards.
- Inspect, Manage and Maintain your Assets from one Solution.
- Access and Analyse your data instantly and effectively.
- Simple Mobile Interface enabling workers of all abilities to use.
- Reporting by exception ensures less time spent on admin.
- Inspections are signed off and time stamped creating indisputable evidence.
- Reduces administration of reviewing or storing paper records.
- Avoid duplication of effort with saved Findings.
- Easier administration of workflow between maintenance and contracting teams.
£6000 per licence per year
Public Sector Software Ltd
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||The platform is subject to scheduled maintenance by Microsoft Azure, customers will be notified prior to any pending works.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Email Response is typically with in 1 hour during business hours. Outside of business hours response will be within 4-12 hours.
Business Hours are 0800 - 1700 Monday to Friday.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
As part of their Annual Licence, each of our customers is entitled to the following:
At least one on-site account visit every year
At least one account management phone session annually.
Unlimited phone and email support.
Additional Support that is available:
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||Onsite or Online training is provided (chargeable) Users have free access to PDF User Guide and Quick-Start Guides. How-to videos and printed 'Pocket cards'|
|End-of-contract data extraction||Data can be extracted in XML or XLS formats. With Images provided in their original form (both Pictures and E-Signatures)|
At the end of the contract, the customer has the option to switch to an Annual rolling contract or deactivate their database.
If the customer wishes to extract their data from our system, they have the ability to do so within the Desktop Application and following confirmation we can then delete said data. Alternatively, they can revert to an Annual 'Read-Only' Licence which provides them access to analyse their data and produce Reports in the event of an FOI or Court Case.
Using the service
|Web browser interface||No|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Our Mobile Service is a tool for Teams on the ground for recording Inspections, Tasks and Asset Data. Whilst our Desktop Service is for the office-teams whom manage said data, produce reports and analyse the information provided.|
|Accessibility standards||WCAG 2.1 A|
|Independence of resources||Our services are held within Azure 'Auto-Scale' and 'Elastic' environments which allow the services to automatically provision additional resources when required. This ensures that users are not affected by demand by other users.|
|Service usage metrics||Yes|
|Metrics types||Inspections Undertaken, Outstanding Risk Levels, Tasks Completed available from the Desktop Dashboard. Further usage metrics can be provided on request.|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||
Users are able to export their data from within the Desktop Application, here they are able to filter / sort / group any data (Sites, Assets, Inspections, Findings and Tasks) and export to XLS.
Users are also able to export their Asset Geo-Data into .mid and .mif files from the Desktop Application.
|Data export formats||
|Other data export formats||
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
The PSSLive platform is hosted on Microsoft Azure who provided 99.95% uptime.
Any Scheduled Downtime for Maintenance / Updates will be carried out during off-peak times (20:00 - 04:00)
|Approach to resilience||Available on request.|
|Outage reporting||We report any Outages through our Dashboard, News Feed and Status page. Any Scheduled downtime is additionally announced through Email.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Role Based Access Control is used through out the system, allowing the Customer to specify what data an individual user will have access to. Support channels are available for all users, however any request data-access will require authorisation from named Customer representative.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually.
Any document requirements can be supplied upon request.
|Information security policies and processes||Our polices are based up on our Cyber Security Strategy which is reviewed at board level annually. Any document requirements can be supplied upon request.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
All potential changes are first evaluated for vulnerabilities and any required security modifications. Once past the evaluation stage, developments are processed through our rigorous testing methods and are then subject to UAT.
All changes are assigned to a release which are then recorded and stored for reference.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
All services are scanned on a monthly basis by a third-party provider and are subject to on-going monitoring and reviews by our in-house team. We are also subscribed to appropriate security channels for updates on the latest threats and vulnerabilities.
If a vulnerability has been detected, it is graded on its risk and severity and managed accordingly. Our grading is based upon the following - High priority are released same day, Medium priority within 2 days, Low priority within a week or within next scheduled build where possible.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Potential Compromises are identified through Azure real-time monitoring and set triggers. Once identified, the threat is immediately investigated by the team and handled according to our Security Policy. We aim to respond to incidents within 1 - 6 hours depending on its severity.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
All of our services are actively monitored for errors by both Automated Azure services and our internal error reporting system. Common events are cataloged in our internal help file and communication is distributed if necessary.
Users can report incidents to their Account Manager or the Support team via Email or Telephone. They are then provided with updates until the issue is closed.
Incident reports and reviews can be generated following closure at the customer request.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£6000 per licence per year|
|Discount for educational organisations||No|
|Free trial available||No|