About iSOP Wizard
Notifications & Alerts
Billing and Upgrades
Technical, Security and Resilience
Can I use Crises Control all over the world?
You can use Crises Control from your desktop, laptop, tablet or mobile phone anywhere in the world. All you need is an internet connection or mobile data to receive emails and push notifications, and phone signal to receive SMS and phone calls.
What communication channels can alerts be sent on?
Crises Control offers the incident manager up to 5 communication channels: email, SMS, push notification, telephone call and web alert. Any combination of channels can be used to deliver the message to users.
Messages can be cascaded with time gaps between channels to avoid spamming users and optimise reach and cost control.
How many users can I send an alert to?
There is no limit to the number of recipients an alert can be sent to.
How quickly are alerts delivered to users?
Once you press send, it takes seconds for the alert to be delivered to the recipient.
Can I run multiple crises at a time?
Yes. We understand that crises don’t just happen one at a time. Crises commonly have knock on effects and trigger multiple simultaneous incidents.
Can I send messages to users who do not have an account on the system?
Crises Control has a Public Alerting extension that allows you to send messages to large numbers of contacts via SMS only. The communication is one-way (recipients receive messages but there is no option for them to respond) and large volumes of messages can be executed rapidly and with ease. Unlike the Ping and Incident Manager, Public Alerting does not require contacts to be saved in the platform as registered Users, making it perfect to alert external stakeholders such as clients, suppliers and the general public.
Can I attach files to message alerts?
Yes, you can attach media assets to messages, such as videos, pictures, audio files and documents.
How can I organise users on the system?
Users can be allocated a department, and put into multiple groups and locations to ensure that you are notifying the right people at the right time when sending an alert. You can create as many departments, groups and locations as you need on your account.
Can I integrate Crises Control with other systems?
Crises Control can be integrated with other systems and applications to improve triggers and alerts.
These applications include service desk software, CRM and HR databases, security monitoring systems and many more.
For example, you can launch an incident from an IT alerting system, or you can update your users adding new starters and removing leavers when a trigger is received from the HR system.
We offer our customer flexibility and integration choices:
- Active Directory integration
- Folder Watcher integration
- Trigger imports via email, SFT and SM. These can launch an incident or send mass notifications via Ping
- Import users in bulk (CSV, excel file format)
- Scheduled user data imports, export and much more
- Data import and on-demand
- Single-sign on integration (Azure and Okta)
- Open APIs (for developers and accredited partners)
Physical monitoring systems such as building alarms, fire alarms, or temp control systems can also be integrated with Crises Control, as can server monitoring software, antivirus software, or any system capable of generating an alert by Email, SMS or SFTP.
Can I try Crises Control for free?
Sign up for and start a free trial in two simple steps.
- Click the FREE TRIAL link and set up your company.
- Start using the system after you have been through the basic tutorials. The tutorials are really simple to follow and you can run them at any time as a refresher.
You can then download the app for your mobile device.
If you need help along the way for whatever reason you can contact us on +44 (0) 208 5841385 or contact us using this link.
What mobile devices does Crises Control support?
Crises Control supports iPhone and Android phones, tablets and PCs. It also supports all mainstream browsers (Internet Explorer, Microsoft Edge, Safari, Google Chrome, Firefox etc.).
Does the Crises Control app work everywhere in the world?
How do I download the Crises Control app?
The app is available in the Apple Store or Google Play.
You can download the mobile app from this link.
What actions can I perform using the mobile app?
Almost all Crises Control actions can be performed from the mobile app.
- Send Ping messages (mass notifications) to a select group of users anywhere in the world
- Create a conference call bridge on demand
- Launch a business continuity incident, communicate with responders, share action plans, and track the progress of the incident until resolved
- Receive, accept, manage, and complete incident tasks
- Use the SOS panic button to alert your security teams if you are in danger or in need of immediate help
- Enable ‘Track Me During Travel’ if you are entering a dangerous location and want to be tracked until you are safe
- See your responsiveness ratings
Will Crises Control work without the app?
Yes, Crises Control does not require a user to have the app installed on their phone.
Crises Control can still send alert messages to the user’s phone by SMS, telephone and emails, as these channels do not require the app.
The app provides a richer experience, adding push notifications to the way you can reach users and providing a simpler way to view and manage tasks. The app is more cost effective because push alert messages are free of charge.
Do I need to register on the website before I can use the app on my device?
Yes, users must have registered their account on the web portal before logging into the app.
The registration process is quick and easy via a verification email invitation. Once this is completed, users are invited by email to download the app to your mobile phone and start using it right away.
What can Ping be used for?
Ping is used to send messages between people in your organisation. Think of it as your own private and secure “WhatsApp” but much more powerful. It allows you to send short emergency alerts to your users through multiple communication channels (email, SMS, phone call, push and desktop notifications). 2-way communication is supported and real-time acknowledgement data is collected.
In order to comply with GDPR rules requiring PII to be protected from unauthorized or unconsented distribution, messages are encrypted before they are transmitted from device to device. Photos and videos sent via Ping are not sent directly to the message receiver so that they are not downloaded to their device, but kept in our cloud. They are accessed via the link sent to the message receiver.
Can I send photos and videos via Ping?
Photos and videos can be sent in messages. In order to comply with GDPR rules requiring PII to be protected from unauthorized or unconsented distribution, photos and videos are sent to the user as a link to a secure space on the Crises Control cloud.
Can I reply to a Ping message?
Yes, you can reply to any person or combination of people, groups, and locations that you have rights to.
How much text can I send in a Ping Message?
Ping messages have a length limit of 250 characters.
What type of encryption is used for Ping messages in transit?
All messages in transit are SSL encrypted (256bit).
SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication. SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
When a photo or video is sent to you from another user, you do not receive the photo or video with the message, you receive a link to the Crises Control cloud where you can view it.
How many communication channels can I use to send a Ping message?
Ping messages can be sent through up to five communication channels: SMS, push notification, email, voice call, or desktop notification.
You can choose which channel or channels will reach more of users. The more channels you use the greater the certainty that your message will be received by the recipient.
The system allows you to configure priority and severity settings for any configuration of channels.
Messages can be cascaded with time gaps between channels to avoid spamming users, and to optimise reach and cost control.
How do I know if someone has read and acknowledged my message?
The Crises Control app and the web portal both display the people who have acknowledged the message, or those who have yet to see it in real time.
How do I know if my message has been sent?
All messages sent are logged on the Message Delivery Report, where you can view how many messages were sent, which were successful and which failed. You can download the failed report for information on why the message did not get through.
Can I give people an option to select different responses to a Ping message?
Yes, you can set up multiple choice response options. This information is collected and can be viewed on the web portal or mobile app.
Can I send Ping messages to employees no matter where they are in the world?
Yes, our communication network is very extensive and covers most of the world.
Communication services may be partially blocked in countries such as China for geopolitical reasons.
Can I schedule a Ping message to be sent at a certain time?
Yes, a Ping message can be scheduled to go out at a certain time in the future. They can be sent out once or set to go out repeatedly, such as daily or weekly.
Can a Ping message be triggered by an external system?
Yes, external systems can be configured to send emails to Crises Control which will trigger an alert.
What is an incident?
An incident is an unexpected event that can cause disruption to the normal running of your business.
An incident could be a fire, flood, denial of access, loss of internet, loss of telecommunications, injury or death at the workplace, power outage, cyber crime, data breach, supply chain disruption by severe weather, damage to an aircraft, bomb, terrorism or something else that requires you to alert people immediately and share information with them.
For example, an incident in the context of information technology, is an event that is not part of normal operations that disrupts IT systems and operational processes. An incident may involve the failure of a feature or service that should have been delivered or some other type of operation failure.
Is there a limit to how many people can be informed when there is an incident?
There is no limit to the number of people you can send an alert to.
The number of users on your account depends on your license agreement. This can be increased anytime by contacting your account manager.
Can I send an incident alert to any location worldwide?
Yes, you can send alerts to users all over the world.
Can I send an alert to users in different departments, groups and locations?
Yes, users can be organised into groups, locations and departments, so that when sending an alert you can include a mix of groups, departments, locations and individual users.
Can I show the exact location where the incident has occurred?
Yes, you can select the exact location of the incident by searching for the address, coordinates or DMS longitude and latitude when launching an incident.
Can I associate useful assets to an incident?
Yes, every incident can have media assets attached to complement the incident workflow. For example, these can be documents, diagrams, photos, web links, videos, and sound files.
Can I set up a conference call when an incident is active?
Yes, you can easily organise a virtual meeting using our conference call facility via the Crises Control mobile app or web portal. Select the participants you wish to contact and they will join via their phone. These calls can be recorded for auditable evidence of your phone conference.
Can I track the progress of an incident with real time reports?
Yes, the Incident Control Centre contains up-to-the-minute information regarding every aspect of the incident, including the incident timeline, task timeline, message reports and acknowledgements, location data and more.
Can I track my teams during an incident?
Yes, if an incident has tracking enabled, users will be tracked for the duration of the incident. Users must be logged into the mobile app and have granted it permission to track their location.
Can users choose to be tracked if they feel vulnerable?
Yes, if a user is travelling and would like their organisation to know their whereabouts, they can enable ‘Track Me During Travel’ on the mobile app, which allows Crises Control to collect the user’s location data until the user disables it.
Is there a panic button for emergencies?
Yes, the SOS emergency panic button is available on the Crises Control app. Any user can tap the button in an emergency situation and the team responsible will be alerted and can view the location of the user and communicate with them.
Can I run an incident simulation?
Yes, you can run a simulation exercise on any incident type anytime.
Can I schedule a simulation for a set time?
Yes, Incidents or Pings can be scheduled to go out at any time in the future. They can be programmed to go out once or repeatedly.
Can I integrate Crise Control with other systems or software to automate alert triggers?
Yes, any monitoring application can be integrated with Crises Control as long as it has the ability to send an email.
Do incidents need to be launched by multiple users?
Incidents can be configured to be launched by one user with key holder rights or two users with key holder rights. Incidents that only require one key for launch will be launched immediately, whereas incidents requiring two keys will need an additional user to launch the incident. Users with administrator rights can launch two key incidents without needing an additional user.
How many incidents can I create?
You can create as many incidents as you need. There is no limit.
What incident templates can I use or modify on the platform?
You can create your own incident plans from scratch, or you can choose the templates from our incident library. These can be modified to suit your business continuity plans.
What templates are included in the Incident Library?
There are over 200 incident templates in the Incident Library, which includes incidents relating to fires, floods, natural disasters, cyber attacks, bomb alerts and more.
Can I clone an incident when I want to create a new incident with a similar setup?
Yes, go to the incident you want to clone and click on edit. Once you are inside the incident, click clone incident at the top right of your screen.
Can I test incidents to make sure they are configured correctly before launching them in a real-life situation?
Yes, once you have created your incident plan, you can select the Test On Me option which will simulate the incident with you as the sole recipient for all alerts and tasks.
What is a Task?
A task is a guided action for your responders or teams to follow in an incident.
Tasks can be assigned to users to carry out during the incident response. They can be escalated or reassigned in real time.
What is a Task Checklist?
A Task Checklist is a list of activities for the task assignee to complete as they progress through the task. The checklist can have simple tick checkboxes or selectable answers. The task assignee can also write comments giving more information and updates related to the checklist.
What does Task Manager do?
The Task Manager is an extension to the Incident Manager Module. It allows your organisation to allocate, track and monitor tasks with relevant checklists and task assets.
Each task can be assigned to a user or group(s) with a defined KPI for acceptance and completion. If a task is not accepted or completed on time, Crises Control can automatically escalate it to your desired user or group(s).
Tasks can have checklists for the users to complete as part of their task. It helps incident managers keep track of Tasks and deadlines and ensures the Task assignees don’t forget any important steps.
How does Task Manager help manage incidents?
- It distributes and manages the assignment of tasks to incident response teams.
- It helps responders report progress by disseminating information to other stakeholders.
- It makes it easier for incident managers to monitor responders’ activities and progress.
- It speeds up the time to recovery.
- The data collected helps your organisation learn and improve.
- It provides audit and compliance data.
How do I create an incident task?
Tasks are created in your incident plans. You can set a user who will be responsible for updating the tasks and will be sent reminders to review them at regular intervals. Tasks must be created with a title, description, recipient, escalation team and acceptance and completion time KPIs.
Can I view task statuses in real time?
Yes, a task summary is available for every incident, giving you a quick overview of events. Incident managers can view all open tasks and can assign new or additional users to a task while the incident is in progress.
Can I create time dependent escalations for tasks?
Yes, all tasks are created with a timeline for response and completion. If the task recipient does not accept or complete the task within the predefined timeline, the task ownership automatically moves to the escalation team.
What happens if the task assignees don’t accept the task?
If the task is not accepted within the predefined time KPI, it will be escalated to a specified user or group who will then take ownership of the task.
Can I create tasks during an incident?
Yes, tasks can be created while an incident is in progress by adding an Instant Task. Incident managers can then input the task details, assignees, escalation members and time KPIs.
Can I share or give ownership of tasks to users who haven’t been assigned them?
Yes. If you need assistance in completing a task, you can delegate or reassign the task to another user.
Can I share updates on my tasks with other users?
Yes, users can provide updates to the incident managers and their team members while completing tasks. They can also write comments on Task Checklists to give additional information
About iSOP Wizard
What is iSOP Wizard?
iSOP Wizard is an extension of the Incident Manager module. It allows you to create your own bespoke Incident Action Plans (IAP). Each document produced has an owner, version number, review date and review frequency to allow effective version control. When complete, these documents are stored in the Media Asset Manager where they can be accessed at any time.
Can I create and store my Standard Operation Procedures on the platform?
Yes, Standard Operating Procedures can be created in iSOP Wizard. You can fill in the sections with the details of the SOP and attach it to the related incident plan. The SOP is then stored on Media Asset Manager and users will be sent the document as an attachment to the incident alert when it is launched.
Can responders receive the Standard Operating Procedures in message alerts?
Yes, if a Standard Operating Procedure is attached to the related incident, users will receive the SOP when the incident is launched.
Are the Standard Operating Procedures available on the website and app?
Yes. The Standard Operating Procedure is stored in Media Asset Manager and iSOP Wizard on the web portal and can be accessed at any time. If the SOP is attached to the related incident, any user opening that incident on their app or web application will be able to access the SOP.
How can I ensure the Standard Operating Procedure is updated regularly?
When creating a Standard Operating Procedure, you must select an owner of the file and a review date. Crises Control will send reminders to the owner to review the SOP either weekly, monthly, quarterly or annually.
What other kinds of supporting assets can I store on the platform?
You can store most file formats associated with the following:
- Word, Excel and PDF documents
- Audio files
Notifications & Alerts
Why am I not receiving emails from Crises Control?
During the registration process Crises Control will send you an email with instructions to complete your registration and download the app. The process of registration is automated and the email originates from firstname.lastname@example.org.
If you do not receive this email from Crises Control it may be because your network spam filter has blocked incoming emails from us or is diverting them to your Junk folder.
Spam filters are customisable and can block emails containing specific words, and some networks or organisations have strict rules that automatically block or mark messages sent outside of a whitelist. You can whitelist www.Crises-Control.com so that emails from us aren’t blocked by your organisation.
Whitelist Information for Crises Control:
Domains & IP Blocks
If you’re behind a firewall that blocks access to all traffic except for certain domains or IPs and the network has granted access to just www.crises-control.com, the network administrator needs to add all our domains, subdomains, and IP blocks for the site to work properly. Otherwise, you might experience issues, for example certain pages won’t load or you won’t be able to upload or view files.
The asterisk (*) is a wildcard used to account for any subdomains we use. The last item in the list is for Vimeo, which we use to host video tutorials and training materials.
Can I receive phone call and SMS alerts during an incident?
Yes. If you are not receiving them, make sure your phone number is correct on My Account, and the Phone and Text channels are enabled.
Learn more about SMS and phone call charges here.
Can I receive an email and push notification as an incident alert?
Yes. To receive push notifications, you must download the Crises Control app and log in to your account on your device.
Emails and push alerts are free. More information about calls and SMS text charges can be viewed here.
Can I hear push notifications when my phone is on silent?
No. The app cannot override your phone settings.
Can I use older mobile phones that do not have push technology?
Yes, as long as the phone can receive phone calls and SMS messages. However, you will not receive push notifications.
What is the minimum requirement for downloading the mobile app?
To use the mobile app, your device will need to be Android 5.0+ or iOS 10.0+.
Do SMS messages fail to get through sometimes?
In spite of its popularity and ease-of-use across the world, SMS delivery is not always guaranteed, and several factors influence the successful delivery of sent messages. The top factors affecting SMS delivery are:
Phone number validity
- Incorrect/non-existing phone number
- Recipient phone number inactive
- Incorrect international country code
- Sending a message to a landline
- Incorrect sender ID
- Keyword filtering
- Repeated messages
- Using cheap routes
- Portability issues
Message delivery can also be affected for reasons such as a full inbox, a frozen messaging application, roaming limitations, and errors on the operators’ SMS servers.
Some phones cannot accept some types of messages, such as WAP push messages, binary text messages, or texts with special characters.
Different operators and countries stipulate different SMS encoding standards. So, when a text message fails to send, it could mean the wrong encoding was used. For example, some carriers in Europe will not deliver messages sent in Unicode characters.
You can view if messages have failed to send on the Message Delivery Report, where you can download the failed report to find out why messages failed.
Will users be notified when an incident is resolved?
Crises Control will alert the relevant stakeholders when an incident is closed. This alert, like all other alerts, will require the user to acknowledge it. However, if you do not wish to alert users when closing an incident this can be disabled.
What is the average time between the Incident launch and the user receiving the alert?
It only takes a few seconds. Within 10 seconds the user will have received the alert. In some cases, the phone call can take a little longer based on the volume of calls.
What is GDPR?
The General Data Protection Regulation (GDPR) is a sweeping new EU law that went into effect in all EU Member States on May 25, 2018. It mandates how companies can collect, store, delete, modify and otherwise process personal data of EU citizens. It applies to any company that processes personal data of EU citizens, regardless of whether it has any physical presence in the EU, or even whether it has any EU customers. Companies are also required to pass these obligations down to all of their vendors and suppliers who may also handle personal data of EU citizens anywhere in the world. Despite Brexit, the UK is committed to stay compliant with the GDPR.
What is the definition of personal data under GDPR?
Under EU law, personal data means any information relating to an identified or identifiable natural person (“data subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. It doesn’t have to be confidential or sensitive to qualify as personal data.
What obligations does Crises Control have with respect to PII?
Where we are the processors of your data, our obligation is to ensure that this data is processed lawfully, fairly and transparently as agreed by our clients and to maintain appropriate security controls. Processing here means maintaining the confidentiality, availability, integrity and security of the data, the servers and network where the data is held. Where it is exceptionally necessary to access a client database to investigate a client issue, we will always seek the client’s permission. We work hard to protect Crises Control and our users from unauthorised access to or unauthorised alteration, disclosure or destruction of information that we hold. In particular:
- We encrypt many of our services using SSL.
- We offer two factor authentication (2FA) verification when you access your Crises Control Account.
- We use Cloudflare Advance Security to protect and secure the application and APIs against denial-of-service attacks, customer data compromise, and abusive bots.
- We encrypt data whilst at rest.
We use Cloudflare for fast Global Content Delivery Network, which speeds up web page loading times. Cloudflare are certified under the EU-US and Swiss-US Privacy Shield frameworks for onward transfers of EU data to the United States. (See https://www.cloudflare.com/privacyshield/).
We have Data Protection Addendum (DPA), which is a contractual agreement in place with Cloudflare to protect our customer’s data to EU- GDPR standards.
We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorised access to systems.
- We restrict access to personal information to Crises Control employees, contractors and agents who need to know that information in order to process it for us and who are subject to strict contractual confidentiality obligations. They may be disciplined, or their contract terminated if they fail to meet these obligations.
- We are ISO 27001, ISO 9001 certified
- We employ certified GDPR practitioners to maintain and improve security standards.
Billing and Upgrades
How does the Crises Control billing work?
If you sign up for Crises Control, you will pay for your membership annually in advance. You can discuss this and other payment option with us by calling the sales team on +44 (0)208 584 1485 or contact us via email at email@example.com.
What are the charges for phone calls and SMS text?
Push notifications and Emails are free, but there is a charge for telephone calls and SMS messages sent via the Crises Control application. More information about charges for calls and SMS text can be viewed here.
Credit is purchased in advance directly from the portal using credit card or through your account manager. When your account balance is low, your account manager will be in contact to remind you to top up. You can find a statement of your transactions on the portal to track your usage and costs. A monthly detailed account statement will be available on the web portal on the 1st day of the month.
SMS messages and phone calls are charged per unit according to the price package agreed with the customer. Price packages do offer the benefit of discounts for bulk purchases. Unit price varies according to the length and geographical location. One unit is equivalent to an SMS message containing less than 160 characters, or a local phone call of under 1-minute duration. Conference call rates vary according to the destination, the duration of the call and the number of participants on the call.
Are calls or SMS charged by the user's network provider?
Your network service provider may charge you for receiving calls or SMS, you will need to check this with your provider in the terms of your contract. A small fee may be applied by your telecom provider when acknowledging via SMS. Check with your service provider to avoid any surprises. You will also need to check with your service provider, what charges are applied for receiving SMS and phone calls when you are abroad.
How does the proof-of-concept trial work?
For our Enterprise solution, the POC is the best way to demonstrate whether Crises Control is the right solution for your organisation. We will support you during this month-long paid trial, helping you to get set up, populating your account and testing the message and incidents functions. At the end of the trial, you will know if Crises Control is the right option for your company and can start your annual Enterprise membership.
How do I add more users?
You can add users on the web portal in Settings > Setup Users and Add User. If you exceed the contracted number of users, an alert message will appear.
To increase your user allowance, contact your account manager.
How do I add another module or extension to my license plan?
If you would like to add another module or extension, such as Task Manager, SOS or Public Alerting, to your current license plan, please contact your account manager to obtain a quote for the module to be added to your account.
How do I cancel my membership?
If you wish to cancel your membership, contact your account manager more than 30 days before your license is due for renewal, unless you are on a free trial and you cancel before the end of the 30 day period.
You can continue to use Crises Control until your account automatically closes at the end of your current billing period.
Can I re-join Crises Control if I cancel my membership?
Definitely. We’d love to have you back.
We’ll keep your organisation’s account for one year after your account closes, so if you decide to come back during that time, you can pick up right where you left off. Your data will also be saved for one year after your account closes.
Technical, Security and Resilience
What are Transputec’s credentials as an IT service provider?
Crises Control is wholly owned by Transputec, a privately owned limited company. Transputec is an established IT services and solutions company with over 35 years of innovation, managed IT services and excellent customer service.
Where is Crises Control hosted and managed from?
Crises Control is hosted on Microsoft Azure in Europe (Germany West Central and France Central) for high availability and geographical redundancy. Microsoft Azure runs in datacentres managed, monitored and administered by highly experienced Microsoft operational staff. Azure datacentres are compliant with key industry standards, such as ISO/IEC 27001:2013 and NIST SP 800-53. Crises control has implemented Microsoft Defender for Cloud to manage security across virtual networks, data, apps and other resources.
Crises Control is also an approved supplier on the G-Cloud 11 platform that supports hundreds of digital programs across the UK public sector. It is hosted with UKCloud, ISO 27001/27017/ 27018/20000/9001 accredited data Centre providing high security platform for Government and Public Sector clients.
Our Middle East and Africa cloud is hosted with Oman Data Park. Established in 2012, Oman Data Park is the Sultanate’s premier IT Managed Services provider offering superior Managed Data Centre, Cyber Security and Cloud Services utilising our locally hosted Tier 3 certiﬁed Data Centres. Oman Data Park serves over 500 local and international corporates ranging from large, mid-tier to small companies and Government sector organisations.
Our partner in Saudi Arabia, Sahara Net is one of the leading ISP in KSA with multiple highly available Data Centres in Saudi Arabia, a responsive 24/7/365 support, and high security accreditation standards. Sahara Net offers an extended network which covers most of the major cities in the Kingdom. They are the only “Carrier Neutral” provider in the market utilising all the active Data Service Providers networks.
In the United Arab Emirates, Crises Control is hosted on Azure Cloud, a Microsoft solution launched in 2010. It is a Cloud Service Provider (CSP) trusted by many different customers across the Middle East and is known for delivering on privacy and security commitments in a compliant and transparent manner.
How secure is your data storage?
Crises Control data storage has high levels of security built into the architecture, we use MS SQL security framework to encrypt the data at rest.
Our service is a SaaS model as standard which has no touch points with a client’s own network. There is SSL encryption for traffic between the client device and the Crises Control application servers.
Our data is backed up every 10 minutes and replicated to the fail over data centre.
Crises Control provides GDPR compliance security for our customers by taking the necessary steps to protect data at all points from secure hosting, encryption of data both at rest, and SSL data encryption in transit. Learn more
How is credit card data protected?
No payment data, such as client’s bank account details, is held on the Crises Control systems. All credit card payment processing is done by our banking partner Worldpay. Worldpay’s secure online payment gateway provides:
- Advanced fraud protection
- Accept all major credit and debit cards as well as PayPal
- Secure your payments with our fraud screening to help protect you and your customer
- Manage your invoices and transactions with our simple online reporting tools
- Set up recurring payments and subscription-based payment plans for your customers
- Accept payments in over 116 currencies
- Our payment processing systems are compliant with PCI DSS industry security standards
Is Crises Control PCI compliant?
Crises Control uses WorldPay, who process any credit card payments. Crises Control does not hold any credit card information, all credit card transactions are processed throught WorldPay gateway.
Crises Control system has no touch points with the client operating environment and so will not breach your PCI compliant zone boundaries.
WorldPay are PCI compliant, Worldpay is a global leader in payments processing technology and solutions for our merchant customers.
How robust is your messaging infrastructure?
Our primary messaging partner (SMS and voice calling) is Twilio which is a leader in the industry. Twilio maintains redundant inbound and outbound connectivity with dozens of network carriers around the world. Their real-time systems dynamically route each call or message via the carrier with the best connectivity at any point in time, responding automatically to carrier availability and reliability.
Is Crises Control available on the G-cloud framework?
Crises Control is available on the UK government digital service framework G-cloud. This service is operated from two distinct environments to provide public sector consumers with choice and price flexibility, dependent upon their information assurance requirements.
Our standard offering is hosted on a Government Community Cloud platform suitable for information assurance needs up-to “OFFICIAL” and is only connected to the public internet. Our secure offering is hosted on a Government Community Cloud platform which holds pan-government accreditation for information up-to and including the “OFFICIAL-SENSITIVE” impact level, with connections to GSI, PSN, N3 and PNN networks as well as the Internet.
Can we host Crises Control on premise?
In addition to our standard SaaS service and the G-Cloud platform for government customers, we also offer on premise hosting for customers who wish to have their own private installation of the Crises Control software.
Can Crises Control be accessed through single sign-on?
We can support single-on via Centrify a Cloud Identity Service provider for single sign-on. The Crises Control application and API use SAML for integration with Centrify Identity Manager. Additional service providers may be considered for future integration.
What service level targets do we have?
|1||A fault exists that results in a total loss of service or functionality affecting a whole site (sites), or whole system or services.||15 minutes to respond.|
4 working hours to resolve.
|95% of all Severity 1 Incidents will be resolved within the SLA|
|2||A fault exists which results in partial loss of service or functionality affecting multiple users.||15 minutes to respond.|
8 working hours to resolve.
|95% of all Severity 2 Incidents will be resolved within the SLA.|
|3||A fault exists which results in loss of service or functionality for a single user.||15 minutes to respond.|
24 working hours to resolve.
|95% of all Severity 3 Incidents will be resolved within the SLA.|
What quality standards does Crises Control adhere to?
Crises Control is owned by Transputec. Transputec adheres to the following standards:
Transputec is fully certified to the ISO 9001:2015 standard
Transputec is fully certified to the ISO 27001:2013 standard
Transputec in the process of achieving ISO 14001:2013 standard
Our Industry Associations
Crises Control is a Corporate Partner of the Business Continuity Institute and Continiuity Forum. The Business Continuity Institute (BCI) is the world’s leading institute for business continuity. Established in 1994, the BCI has established itself as the leading membership and certifying organisation for Business Continuity professionals worldwide.
What level of support do I receive?
We offer you full 24/7 technical support to assist you when you need it. We recognise the importance of a rapid response to and resolution of any issues that you encounter. Our team will aim to resolve your issue immediately over the phone.
Standard Support is provided by e-mail for day-to-day questions and issues for Business solution customers. We will aim to respond to your query within 2 hours and resolve it within 8 hours. Exceptionally, where you need urgent assistance for an emergency notification and you are experiencing difficulties, all users can call our Emergency Live Operator phone line and a representative will assist you in sending a broadcast notification.
Premium Support is provided by e-mail or by telephone for day-to-day questions and issues for Enterprise solution customers. We will aim to respond to your query within 2 hours and resolve it within 4 hours. In addition to the support options noted above, we also offer a Concierge Service. This includes proactive assistance in helping you to get the most out of your Crises Control service.
What do I do when I need support?
If you are the registered administrator you can get support at any time of the day.
We offer 24/7 English email support for all customers – even on holidays! (Email support in a variety of languages is available during limited hours.)
Email us at firstname.lastname@example.org or click here and we will respond to your request as quickly as possible, and issue you a support ticket for that instance.
English phone support is a Premier feature. We offer phone support 24/7 via our service desk. Call our Help Desk on: +44 (0) 20 8584 1385 (option 2).
Regardless of the type of support you have, the one constant for all support organisations is that we are here to help resolve issues.
- Send an email
- Call you on the telephone
All support requests, from all channels, become Crises Control Support tickets. Tickets capture your initial request for support and all the conversations your people have with our agents along the way to solving the support issue.
What quality standards do we adhere to?
Transputec is fully certified to the ISO 9001:2015 Quality Management Standard. This requires an organisation to:
- Demonstrate its ability to consistently provide product that meets customer and applicable statutory and regulatory requirements.
- Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity to customer and applicable statutory and regulatory requirements.
- The QMS is applicable to the design, build, integration, implementation and support of business software and hardware solutions, hardware and software product sales, with associated support, provision of fully managed service contracts, including full infrastructure and platform services, support contracts, contract fulfilment and consultancy services.
Crises Control is a Corporate Partner of the Business Continuity Institute. The Business Continuity Institute (BCI) is the world’s leading institute for business continuity. Established in 1994, the BCI has established itself as the leading membership and certifying organization for Business Continuity professionals worldwide.
Transputec is also fully certified according to the ISO 27001 Information Security Management Standard. In order to achieve the certification, Transputec’s compliance with ISO 27001 standards was validated by a leading independent audit firm, Lloyds Register Quality Assurance, after demonstrating an ongoing and systematic approach to managing and protecting company and customer data.
ISO 27001 certification ensures that controls are in place to reduce the risk of security threats and avoid any system weaknesses being exploited. It provides assurance and confidence to customers, suppliers and trading partners that all security risks are being addressed on an ongoing basis.
The scope of the ISO certification includes design, build, integration, implementation and support of business software and hardware solutions. It also includes the provision of full IT managed services, including infrastructure platform services, support contracts, contract fulfilment and consultancy services.