Ez Nav
Our vision is to achieve a 25% increase in valuable GP time that could be used for direct patient care, to be achieved through appropriate and active signposting of patients at all points of contact by our frontline staff.
Features
- Dynamic and flexible reports on over all business performance
- Business Intelligence dashboards for real-time patient management
- Data quality and monitoring
- Population health risk management
- Income analysis and forecasting
- Enterprise performance data repository solution
Benefits
- Self-service Business Intelligence platfrom
- Long Term condition management
- Digital first approach for care providers
Pricing
£0.25 a person
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at hasib.aftab@attech-ltd.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 11
Service ID
9 4 4 1 3 6 9 8 3 4 2 2 5 7 2
Contact
AT Technology Services Ltd
Hasib Aftab
Telephone: 07989557863
Email: hasib.aftab@attech-ltd.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
-
- Tailored Solution for customers
- Works on all web browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24/7 support ticketing in place
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- NA
- Onsite support
- Onsite support
- Support levels
- Customised Service Level Agreement with each customer
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training, workshops, virtual training and videos and materials
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- We provide option of data extraction or data wipe. But Data is passed onto clinical system which negates the reasons for data extraction
- End-of-contract process
- Build into contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile optimised - but also able to download App from android and IOS store
- Service interface
- Yes
- Description of service interface
- Use full stack development approach and able to integrate with other services
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Our dedicated QA performs All functional and Non Functional testing of the Web tool with in different release plans . Performance testing , stress testing and Load testing is conducted as a part on Non Functional testing , and Unit testing , Functional Testing , Regression and Smoke testing is performed over functional modules
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Based on customer requirements - localised and white labelled
Based on the requirement of the client functions can be customize that fit best with customers organizational procedures
Scaling
- Independence of resources
- Scalable cloud based applicaiton
Analytics
- Service usage metrics
- Yes
- Metrics types
- Through our dedicated analysis reporting tool
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- User can generate reports from system interface, based on the user profile
- Data export formats
-
- CSV
- Other
- Other data export formats
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Core Hours Availability - 99.9%
- Approach to resilience
- Available on request.
- Outage reporting
- Email Alerts and APIs
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- Our customers have the option to raise a support request via telephone or email or support widget. We will always authenticate the identity of the user by validating known phone numbers and asking them for specific characters within their pre-agreed memorable word.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Working towards ISO27001
- Cyber essentials
- DSP Tool kit
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- All Data Protection and Security Toolkit policies
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Product or business road maps
Readiness assessments
Training Tutorials and Education Sessions
Stakeholder Feedback gathering and review
Post-deployment review
Performance measures and analytics
Change management risk analysis
Continuous Improvement Plan
Business case studies and knowledge management - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Real time threat monitoring systems.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Based on service level agreements with customers - commercially approved audit tools are used to monitor processes
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Performing rout-cause analysis
Initial risk assessment forms and frameworks
Communication matrix with key people
Gathering evidences and documentation
Taking approach to minimise the risk or further damage
based on customer agreement - predefined processes and tools used for incident management
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Pricing
- Price
- £0.25 a person
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Subject to request
- Link to free trial
- https://www.eznav.co.uk
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at hasib.aftab@attech-ltd.com.
Tell them what format you need. It will help if you say what assistive technology you use.