Web Based

A web based system allowing access from wide ranges of mobile devices and browsers.


Email Notifications

Staff members automatically notified by email when they are required to perform an action on an incident.

Role Based Control

Role based access control. Separation of roles on the system ensures staff members only have access to authorised activities.

Secure

Increased security around user access ensures that user options can be restricted when logging in remotely to help protect against data loss.

Session Timeouts

Configurable user session timeouts ensuring a user is left logged out, should they become inactive.

i

Email Access

Incidents are updated via email links only, as the email includes a unique random identifier for extra security.

Fast-track Incidents

The Stage Override facility allows a stalled incident to progress from the current stage.

Customisation

Add a customisable logo for your organisation.

Secure Updates

Secure updates using signed GPG keys to ensure only properly signed updates and patches are allowed on the system.

Fast Access

Users are managed securely, using a local database to ensure no cross contamination or unauthorised access.


Reporting Tools

Extensive reporting both online and via downloadable Excel spreadsheets allow you to create personalised reports and assessments.

k

Audit Logging

Full audit logging to ensure activity taking place on the system is logged.  Logs have filter options based around user(s) and/or event(s).

Personal Security

Configurable account security ensuring lockouts are enforced if too many incorrect passwords are entered.

Session Management

Users can only have one session active, if another session becomes active, the user has to re-validate themselves by re-entering their password.

Stag Overriding

Only users who have an action are permitted to update incidents. This can be overridden by Authorisers or Final Authorisers using the Stage Override facility.

Mass Stage Overriding

Mass Stage Override allows Final Authorisers to re-delegate incidents that need signing off for absent staff.

Backups

Automated secure daily backups using GPG public key encryption.

Active Patching and Development

Secure patching using signed GPG keys to patch individual systems.