Incident Reporting

The Zinc Business Intelligence platform is constantly engineered, altered and enhanced in line with changing technologies, algorithms and capabilities. All of this agile development work is added to the central platform and pushed out to all clients on a regular basis, therefore clients and analysts are never left using outdated products and benefit from a constantly enhancing system that is tailored to their specific workflow and workloads.

Enterprise-level technology for innovators assisting customers in...

- Developing a customised branded app with rapid deployment
- Speed and accuracy of data collation
- Gaining actionable insight from big data and realtime reporting
- Streamlining operational processes
- Aiding strategic and proactive planning
- Optimising decision making and reducing response times
- Providing a single-point of access to a repository of data and information
- Improving mobile working
- Ease of content management
- Enhancing communications to people, assets & locations
- Ensuring compliance, tracking & security

Interactive System Modules

The dynamic platform interacts with system Modules to provide specific functionality. The modules can be installed (or removed) at any time allowing complete flexibility for the system to react to business demands without the expense of a complete technical redesign. The administration area, allows you and your staff to easily update specified areas or settings for each Module, whilst protecting the platforms overall integrity.

UsersUsers / Staff
App user database to allow access and management from a central point.
Central management module for any company / organisational data.
Full management of venues / sites for organisations, staff, resources and incidents.
Regional locations for management, access and reporting.
Setup organisation / staff roles for escalation purposes for access and reporting
Incident ReportingIncident Reports
Comprehensive risk management - Reduce your risk by logging incidents as they happen.
VictimsVictims & Witnesses
Central management of all Victims & Witnesses of security and safety incidents.
The storage of individual offenders, personal details, locations and risk profiling.
Vehicles / EquipmentVehicles / Equipment
Interactive linking of vehicles / equipment to locations, security incidents, offenders & groups.
ProductsProduct, Stock & Value
Report and log product information, value and recovery status to incidents.
Organised GroupsOrganised Groups
The grouping of people working together on a continuing basis i.e. OCGs, interest groups etc.
EventsEvents of Interest
Link Events to an incident to build a richer picture of intent, capabilities and impact.
Civil RecoveryCivil Recovery
Civil recovery is the legal system employed to recover the proceeds of crime related activities.
PolicePolice & Authorities
Severity based involvement with the capture of force details and responding officer details.
PolicePolice & Authorities
Automatic crime data from England & Wales Police forces based at a location.
Government demographic data for social, cultural, health etc. for an area.
Public ServicesPublic Services
Plot nearby information around your location such as major transport services & public services.
Actual or potential threat of adverse environmental issues at a locations.
Nearby RisksNearby Risks & Threats
Plotting data around a location from different data sources to identify risks.
News AggregationNews Feeds & Aggregation
News and RSS feeds for the streaming of data from 3rd party sources.
Social MonitoringWeb/Social Monitoring
Pull together social data relating to an event, topic or location.
Centralised event database providing insight to activity around a location.
Trend MappingTrend Mapping
Algorithms to help predict future incident occurrences and smart deployment.
AlertsAlerts & Notifications
Automated triggers of communications based on
pre-determined workflows.
TasksTasks & Checklists
Create operational tasks and assign them to venues and staff to complete with schedule planning.
CommsComms / Notes
Central comms management across all modules - keeping track of all the latest communications.
Private in-mail for 2-way communication and the receiving of information.
Bulk Mailing
Bulk mailing manager linked with all users in the system to send our manual or automated emails.
Send SMS communications using the Notifications & Alerts modules.
The storage, searching, tagging and accessing of a wide range of document types.
Central storage and management of URLs for quick access, categorising, assigning & logging.
Interactive Q&A facility allowing you share knowledge and allow users to ask you a question.
Publish internal News to App users with category management to organise your news into topics.
Add video content such as training videos, introductions and updates for user engagement.
Live Dashboard
Interactive real-time dashboard providing at-a-glance information on activity and usage levels.
ReportsReports & Stats
Out-of-the-box reports providing table/csv data which is filterable by organisation and location.
VideoVideo Wall Display
Multi-screen video wall displays for incident alerts, location tracking, monitoring and SLAs.
PDFPDF Generator
Generate custom branded PDF reports with key data from the system
ExportData Import/Export
Quickly and easily import/export data into the system and specific modules to save you time!
Integrate the App data with 3rd party applications in either realtime or batch processes.
Extract top level statistics via our powerful API to pull into your own applications.

Completely customisable

The platform is completely brandable to your Organisation allowing you own styling and creative approach to be represented in the user interface.

The platform is accessible on all major browsers and the mobile app is compatible on Android, Apple iOS and Windows devices. The platform operates across all screen sizes for smart phones, tablets, screens and video walls, allowing for easy adoption on existing hardware and bring-your-own-device (BYOD) users. The mobile app operates both online and offline, with an integrated smart sync feature for when internet connectivity is temporarily unavailable.

Layered Security Approach

A reliable data stack provides secure data environments with redundant point-of-delivery systems built across nodes to securely and reliably power the platform. Isolated client instances are logically and virtually isolated from all other customer environments through multiple levels of security ensuring independent environments for our customers.

Thawte SSL Web Server Certificate with EV: SSL Web Server Certificates with EV to provide the most assurance to users. Extended Validation (EV) turns the address bar green in high-security browsers, showing that the organisation has met the industry’s highest standard of authentication. SSL Web Server Certificates with EV enables a 256-bit encryption in the latest operating systems and web browsers with server-gated cryptography (SGC).

Login authentication uses the MD5 message-digest algorithm is a widely used cryptographic hash function producing a 256-bit (32-byte) hash value. Passwords and access PINs utilise the Laravel Hash facade provides secure Bcrypt hashing for storing user passwords. It will take care of verifying the Bcrypt password against the un-hashed version provided by the user. Sensitive information utilises an AES256 symmetrical encryption algorithm that has become ubiquitous, due to the acceptance of the algorithm by the U.S. and Canadian governments as standards for encrypting transited data and data at rest.

The API is built in Laravel, an open-source framework following the model–view–controller (MVC) architectural pattern. Laravel is regarded as one of the most popular open-source frameworks with a modular packaging system and dedicated dependency manager, allowing different ways for accessing relational databases, utilities that aid in application deployment and maintenance, and its orientation toward syntactic sugar.

The API authenticates using a JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between the App and the server as a JSON object. This information can be verified and trusted as it is digitally signed. JWTs will be signed using a secret private key (with HMAC algorithm). Once the user is authenticated (logged in), each subsequent request will include the JWT, allowing the user to access routes, services, and resources that are permitted with that token. JWT defines a way in which certain common information pertaining to the process of authentication/authorisation may be represented. The data format is JSON, JWTs carry certain common fields such as subject, issuer, expiration time, etc. JWTs become really useful when combined with other specs such as JSON Web Signature (JWS) and JSON Web Encryption (JWE).

Together these specs provide not only all the information usually needed for an authorisation token, but also a means to validate the content of the token so that it cannot be tampered with (JWS) and a way to encrypt information so that it remains opaque to the client (JWE).

Security Controller
Configuration of all security compliance and geo-fencing to ensure correct settings.
Access Levels
Manage different access levels and credentials for groups of users.
Roles & Permissions
Configure roles, permissions and control who does what in the App.
Device Manager
Management of company and BYOD devices that have access to the App.
Configuring of the mapping and location tracking for users using App.
Audit Trails & Logs
Monitor, review and retrieve past activity and records by Module or Administrator.

Enterprise-Grade Infrastructure, Managed By Data Centre Specialists

Our goal is to provide our customers with the best and most secure technical infrastructure available. Combined with Rackspace, our managed hosting partner, we have support staff that are trained in dealing with complex technical environments - our hybrid hosting solution is housed in a state-of-the-art data centre, watched over by certified staff in a secured environment.

Multiple Layers of Redundancy

There are multiple layers of redundancy, at every level - including physical security, power, cooling and networks. These redundancies help make the data centers more resilient, so customers can beenfit from higher uptime and greater reliability.

Because we’re committed to keeping you operational, we offer a range of SLAs across our technology products and platforms - and continually help you optimise it for tangible business results.


Physical Security

Each Rackspace data center is restricted by biometric authentication, keycards, and 24x7x365 surveillance. These help ensure that only authorized engineers have access to routers, switches and servers.


Rackspace power systems deliver conditioned power while protecting against sags, surges, swells, spikes and electrical noise. Uninterruptible power supplies (UPS) provide instant failover for continuity during a power outage. And our on-site, always-fueled diesel generators are prepared to pick up the load quickly during extended outages.


Rackspace N+2 redundant chiller configuration uses a combination of centrifugal chillers, cooling towers, chilled water loop pumps and condenser water loop pumps — with redundant water sources.


Rackspace precision Heating, Ventilation and Air Conditioning (HVAC) environment includes HEPA-equipped air handling units that remove dust and contaminants. In the event of an HVAC system failure, we have redundant HVAC systems for immediate failover.


Rackspace robust network includes nine backbone providers, allowing us to shift traffic as needed. This configuration, co-developed with Cisco, guards against single points of failure at the shared network level (extendable to your VLAN environment).

The platform is inline with code of ethics and best practice setup by the Open Web Application Security Project (OWASP) and adheres to the Data Protection Act (DPA), General Data Protection Regulation (GDPR), the Regulation of Investigatory Powers Act (RIPA), Criminal Procedure and Investigations Act (CPIA), the European Convention on Human Rights (ECHR).

As the platform is highly configurable, it is recommended that you work with our support team to ensure that the platform is setup and adheres with your specific compliance requirements. Zinc staff adheres to our security polices and standards implemented (documentation available on request).


General Data Protection Regulation (GDPR) & Data Security

View our GDPR & Data Security portal

Hosting Infrastructure
Hosting Infrastructure
Platform Infrastructure

Disclaimer: Illustration representation only.
For detailed infrastructure information please contact the Synapse Support Team.

Anymore questions?
Give us a call and someone will be there to assist you.

Your login details have been used by another user or machine. Login details can only be used once at any one time so you have therefore automatically been logged out. Please contact your sites administrator if you believe this other user or machine has unauthorised access.