Capterra and Software Advice
Get a demo Get a demo

Administration Portal

Centralised control, seamless configuration.

Powerful administration capability empowering you to control everything from one place.  Manage users, access levels, workflows, forms, automations, templates, and system-wide settings with ease.

Configure your platform, to ensure ongoing governance, and scale confidently across teams, sites, and organisational units.

Console - complete administration of the platform

Trusted by teams who adapt fast and configure smarter.

ISS & City of London Corporation
Amazon Studios
22 Bishopsgate
The Crown Estate
Kingfisher Group
NEXT
Virgin Money
The City of London Police
Allied Universal
JLL
B&Q
Knight Frank
Graff Diamonds

Zinc Systems

Effortlessly manage your platform - your way.

Speed

Agile configuration
Quickly adapt settings to meet evolving operational needs.

Resilience

Centralised oversight
Manage users, access, data, and templates from one place.

Control

Continuous improvement
Refine processes and permissions as your teams grow.

Recovery

Frictionless control
Update workflows and automations without slowing things down.

Key administration panel features

loader-icon

Configure the platform to meet evolving business needs.

Code-less administration and workflow-building provides complete control over system customisation.

  • Define and modify your organisation hierarchy and structure.
  • Customise your workflow management processes.
  • Build dynamic forms with validation rules.
  • Arrange workflow sequences with drag-and-drop tools.
  • Implement access controls at organisation, regional, and site levels.
  • Adjust display interface, content, and features.
  • Create and enforce mandatory response fields.
  • Maintain role-based permissions for security.

Control who sees what, and when.

Manage permissions, roles, and responsibilities with ease across every level.

  • Create and manage user levels with specific access rights.
  • Assign users to categories, teams and across your organisation structure.
  • Assign permissions based on module, function or location.
  • Set role-based visibility for data across the platform.
  • Enable secure login with enterprise SSO options.
  • Bulk import users via CSV or directory sync via an integration.
  • Easily add, activate, suspend, or remove users.
  • Ensure governance with granular permission controls.

Capture the right data, every time.

Adapt processes quickly to reflect operational, security, or compliance needs - without writing a line of code.

  • Build workflows and forms with drag-and-drop logic.
  • Configure unlimited forms and types for incidents, audits, checks, or inspections.
  • Define field types, field groups, steps and stages of a workflow.
  • Add mandatory fields, validation rules, and conditional logic.
  • Define escalation paths for severity/priority levels and statuses.
  • Automate notifications based on type, location, criticality and status changes.
  • Review workflows before deploying and revert historic versions.
  • Apply access levels to categories, types, fields, statuses and data.

Let the platform do the heavy lifting.

Trigger alerts, assign tasks, and escalate without manual effort.

  • Reduce human error with automated logic paths.
  • Improve response times with real-time triggers.
  • Trigger follow-up workflows based on form responses.
  • Automate notifications to staff, occupiers, or stakeholders based on a wide range of triggers.
  • Escalate incidents or events based on automated severity and priority assignment.
  • Automate incident stage progression, status changes and deadlines.
  • Schedule recurring tasks or activities.

Start fast, stay consistent.

Standardise across teams with pre-approved templates for detail screens, communications, tasks, document exports and more.

  • Embed your organisation’s formatting, policies, and language to ensure consistency.
  • Create on-screen display templates at a category level for incidents, audits, checks and inspections.
  • Setup communication templates and apply organisation-wide or customisation per location.
  • Configure page templates, sections, tabs and layout design to meet your requirements.
  • Create multi-page branded PDF export templates for differing sharing requirements.
  • Easily pull in specific data to your templates using a library of codex tags.
  • Ensure compliance with locked document template sections.
  • Setup data templates for importing, displaying or exporting data from the platform.

Mirror your business, right down to the details.

Model your business structure to reflect real-world operations - from global oversight to site-specific control.

  • Structure and manage organisations, brands, tenants, and partners with tailored permissions.
  • Define organisation structures: global, regional, site, or team.
  • Set up locations with unique workflows, templates, and access levels.
  • Segment each site into levels, departments, or zones for precise visibility.
  • Assign roles and restrictions from the top down or the bottom up.
  • Tailor configurations from organisation through to site-specific logic.
  • Support complex operational models – Reflect FM, security, H&S, and partner responsibilities.
  • Ensure data integrity and segmentation.

Zinc Systems
Zinc Systems

Configure fast, adapt faster.

  • Rapid setup
    Launch new configuration in seconds with guided admin tools.
  • Adapt & evolve to emerging risks
    Deploy updates instantly – no downtime, no dev queue, just agility.
  • No-code configuration
    Make powerful changes without writing a single line of code.
  • Drag-and-drop interface
    Easily design screens with intuitive tools – no tech background required!
  • Protect sensitive information
    Control access from global to local site levels for maximum flexibility.

Zinc Systems
Incident Management

Total control, zero complexity.

  • Scale across your estate instantly
    Spin up new sites, tenants or departments with a few clicks.
  • Secure by design
    All admin actions are protected by role-based access & authentication.
  • Audit-ready admin logs
    Audit trails ensure transparency, governance, and accountability.
  • Enterprise-grade infrastructure
    24/7 system health checks, uptime tracking, and performance visibility.
  • New features, every 2 weeks
    Rolled out continuous improvements, new features, and enhancements.
Zinc Systems

Our impact in numbers

68% Faster platform configuration
Save time with no-code tools and instant updates across teams and locations.

75% Reduction in admin workload
Automated workflows and templates cut manual tasks and repeated configuration.

91% Increase in deployment speed
New locations and users can be launched in minutes - not days.

40% Fewer user access errors
Role-based controls and automated permissions reduce misconfiguration and security risks.

40% Reduction in form building
Pre-built templates and drag-and-drop builders eliminate back-and-forth with developers.

94% Platform uptime visibility
Live health monitoring and platform performance status tracking ensure IT stays one step ahead.

Zinc Systems

Case studies

22 Bishopsgate, London - Protected by Zinc
Media City, Salford UK
Paddington Square, London - Protected By Zinc
The City of London
Graff Diamonds
Next
Culver Studios, California
Virgin Money - protected by Zinc
Victoria Secrets - VS&Co

22 Bishopsgate is the tallest skyscraper in the City of London standing at 278 m (912 ft) tall with 62 storeys. It's game-changing workspace occupies a prominent site in the financial district.

As Britain's smartest building, Zinc's platform manages and controls all security, safety and risk events, as well as providing critical alerting to occupiers during fire evacuations.

Read more

With over 300 stores, B&Q is one of the largest multinational DIY and home improvement companies and have worked closely with Zinc over the last 10 years to evolve how to capture, analyse and report criminal incidents.

"Synapse allows our Crime Centre team to spend their time doing what they do best, engaging with stores, security and law enforcement to ensure we have the best possible chance of a successful prosecution.”

Read more

MediaCityUK is a 200-acre mixed-use property development on the banks of the Manchester Ship Canal and its principal tenants are media organisations such as ITV, BBC and also the Quayside MediaCityUK shopping centre.

Integrating Zinc into the MediaCity security team, is a significant step forward in safeguarding the vibrant hub where security is paramount in such dynamic environments.

Read more

A super-connected building situated above Paddington Station and is the only station in London with direct access to all mainland stations. The smart mixed-use building is home to major global companies offices, 40 shops and restaurants.

The team use Zinc to report, manage and analyse all critical events and activities, ensuring the highest levels of safety and security.

Read more

The City of London Corporation, officially the municipal governing body of the City of London is the historic centre of London and the location of much of the United Kingdom's financial sector.

Zinc has been rolled out across all property assets to report, investigate and analyse all critical events across the complex property portfolio.

Read more

Graff is a British multinational jeweller with global locations and home to the most fabulous diamonds and jewels in the world.

"We were looking for a global incident and intelligence platform to encompass all our requirements. Zinc allows us to analyse all global threats, which allows us to manage the risks and inform teams of all operational tasks & threats from one very easy to use platform."

Read more

Next plc is a multinational clothing, footwear and home products retailer with around 500 stores in UK & Eire and 206 franchised stores in 33 countries.

"Our vision… bringing all aspects of our operational company risk under one reporting and management model, applicable anywhere in our business from Store to Distribution Centre to Corporate Office. Having accurate and timely data, with sufficient context, allows myself and other Senior leadership to make sound judgements and risk-led decisions to protect our people, our consumers, and our profit."

Read more

Amazon Studios is an American television and film producer and distributor that is a subsidiary of Amazon. It specialises in developing television series and distributing and producing films in more than 240 countries and territories worldwide.

Zinc was awarded a contract to delivery command, control and communication for all incidents at premier film studios.

Read more

Virgin Money is a financial services company offering retail and business banking and part of the Virgin Group.

"What could have been a daunting and complex mobilisation, turned out to be seamless and enjoyable, we felt engaged every step of the way. SYNAPSE is a game-changing addition to our organisation; we continue to refine the system to our needs and the team have been open to our feedback in this regard. Been a smooth process all the way through." Physical & Personal Security Team

Read more

Victoria's Secret is the world's go-to label for giving women everywhere one-of-a-kind lingerie, sleep, beauty and accessories.

"Implementation of any system is a challenge in any business and aligning all departments and actions was no easy task - but the team at Zinc were on hand literally day & night to ensure we achieved success."

Read more
Zinc Systems

Why Zinc?

Join our growing community of world-leading customers and unlock rapid ROI with Zinc's innovative platform. Easily adaptable to your unique challenges, Zinc empowers your organisation to accelerate success and drive measurable impact.

Why Zinc? Loved by users

Loved by users
Outstanding usability and flexibility, ensuring a positive experience every time.

Why Zinc? World-class support

One unified platform
Expand at your own pace with an industry-leading and award winning modular platform.

Why Zinc? Reliable & secure

Reliable & secure
Highly trusted for reliability and robust security - providing complete peace of mind.

Why Zinc? Agile & Innovative

World-class support
Delivering exceptional rapid support, assistance - ensuring customer satisfaction.

Why Zinc? Join our community

Agile & innovative
Consistently delivering cutting-edge solutions evolving market and customer needs.

  • Is your platform evolving as fast as your operations?

  • BOOK DEMO

Explore our modules.

Incident Management Module

Navigate Crises, Maintain Continuity

Incident Management

Evidence & Investigation

Secure Evidence, Connect The Dots

Case Management

Daily Occurrence Book (DOB)

Stay Agile, Ensure Resilience

Daily Occurrence Book

Mass Notification

Inform Quickly, Protect People

Mass
Notification

Patrol Management

Secure Operations, Ensure Compliance

Patrol
Management

Audits, Checks & Inspections

Get Compliance Right, Every time

Audits, Checks & Inspections

Tasks & Procedures

Get Things Done, The Right Way

Tasks &
Procedures

Incident Management Module

Promote Wellness, Prevent Hazards

Health & Safety Management

Data Reporting & Analytics

Smarter Insights, Stronger Outcomes

Data Analysis & Reporting

Threat Intelligence

Actionable Insight, Seamless Integration

Threat
Intelligence

Administration Panel

Configure Fast, Adapt Instantly

Administration
Portal

Icon - Integrations-MicroApps

Connect Systems, Scale Smarter

Integrations

Resources: Frequently Asked Questions

Gathering the details of injured parties during an incident is crucial for several reasons, each contributing to effective incident management, legal compliance, and compassionate response. Collecting these details should be done sensitively and in compliance with privacy laws to respect the dignity and rights of the injured. Overall, the practice is not only a procedural necessity but also a cornerstone of ethical and effective incident management. Here’s a breakdown of why these details are essential:

Immediate Medical Response:

Collecting information about injuries allows first responders and medical teams to provide appropriate and timely medical care. Knowing the nature and severity of injuries helps prioritize treatment efforts, especially in large-scale incidents or emergencies.

Accurate Incident Reporting:

Detailed records of injuries contribute to the accuracy and comprehensiveness of incident reports. Such reports are vital for investigations, understanding how the incident occurred, and implementing measures to prevent future occurrences.

Legal and Insurance Purposes:

Information about injured parties is critical for insurance claims and legal proceedings. Detailed injury data can support claims for compensation and is often required for legal scrutiny and compliance with workplace safety regulations.

Health and Safety Compliance:

Organisations are generally required to follow health and safety laws that mandate reporting and documentation of any injuries occurring on their premises. Gathering detailed information helps in complying with these regulations and in conducting safety audits.

Future Safety Enhancements:

Data collected from incidents, including details about injuries, can be analyzed to identify trends or recurring safety issues. This analysis is crucial for improving safety protocols and preventing similar incidents in the future.

Psychological Support:

Knowing who has been injured, along with the extent of their injuries, helps in providing appropriate psychological support and counseling to victims and witnesses. This support is essential for their recovery and well-being.

Family and Community Communication:

Accurate and timely information about injuries is crucial for communicating with families and the community, especially in high-stress situations or disasters. It helps in managing the emotional and social impact of the incident.

Operational Continuity and Recovery:

In a workplace setting, understanding the impact of an incident on personnel allows for better management of staff shortages and operational disruptions. It aids in planning for temporary replacements or adjustments in operations.

 

An MG11 witness statement is a formal document used in the legal system of England and Wales. It records the evidence of a witness related to a criminal case. This document is an account of what the witness saw, heard, or experienced concerning the incident in question.

The MG11 witness statement is a foundational document in the justice process, providing crucial evidence and helping to ensure that the judicial system works transparently and fairly. An MG11 template is available into our platform. Here are some key aspects of the MG11 witness statement:

Purpose:

The primary purpose of the MG11 is to provide a detailed and accurate account of the witness's testimony, which can be used by the police, prosecutors, and the courts during criminal proceedings. It serves as an essential piece of evidence in building a case against the accused.

Format:

The MG11 is formatted to ensure consistency and comprehensiveness in witness testimonies. It includes the witness's personal details, the statement itself, and a declaration that the witness understands they are liable for prosecution if they are found to have lied in the statement.

Usage:

Once completed, the MG11 can be used by the prosecution as evidence in court. If the case goes to trial, the witness may be required to attend court to testify in person and confirm their statement under oath.

Voluntary Statement:

Typically, an MG11 is provided voluntarily by the witness. It is taken by a police officer or another authorised person, who will guide the witness to ensure all relevant details are included.

Confidentiality:

The details in the MG11 are handled with confidentiality but are shared with both the defence and prosecution as part of the evidence disclosure process. This ensures that the accused has a fair opportunity to review all evidence and prepare a defence.

Legal Significance:

Signing an MG11 is a serious matter. The witness's signature at the end of the statement confirms that they believe the information is true to the best of their knowledge and understanding, and they are aware of the penalties for making a false statement.

 

In essence, such a library is a fundamental tool that contributes to the security and operational efficiency of organisations dealing with critical events, enhancing their ability to manage risks and protect assets.

Building a library of suspects or offenders is crucial for several reasons:

Enhanced Preparedness and Response:

A library of known suspects or offenders allows for quicker identification when similar incidents occur. This enables a more tailored and swift response, potentially preventing escalation.

Pattern Recognition:

By maintaining a comprehensive database, organisations and law enforcement can identify patterns of behaviour and connections between different events. This is vital for predicting and preventing future crimes.

Resource Allocation:

With a detailed understanding of the individuals involved in past incidents, resources such as personnel and technology can be more effectively allocated based on the anticipated threat level and known tactics of these offenders.

Legal and Compliance:

Such libraries help in adhering to legal and compliance requirements by ensuring that all actions taken during and after an incident are well-documented and justifiable in a court of law if necessary.

Continuous Improvement:

Analysing past incidents and the offenders involved provides critical insights that can be used to strengthen security measures, training programs, and overall incident response strategies.

Public Safety:

For public safety organisations, having a well-maintained library helps in community policing efforts, aids in disseminating information to the public when necessary, and enhances the overall safety of the community.

Collaborative Efforts:

Sharing information about suspects or offenders with other agencies and organisations promotes a collaborative approach to managing and mitigating critical events, enhancing the effectiveness of collective security measures.

Historical Data Analysis:

Over time, the accumulated data can be analysed to understand long-term trends in criminal behaviour, the effectiveness of interventions, and the evolution of crime in response to societal changes.

 

Building an effective banning register for a location, such as a retail store, entertainment venue, corporate location, or community centre, involves several best practices to ensure it is lawful, efficient, and respectful of privacy. By adhering to these best practices, an organization can manage a banning register that not only enhances the security and safety of the location but also respects the rights and dignity of all individuals involved. Here’s a step-by-step approach:

Define Criteria for Banning:

Clearly outline the behaviours or actions that would lead to someone being added to the banning register. This might include theft, violent behaviour, harassment, or other specific conduct that threatens the safety or well-being of others.

Legal Compliance:

Ensure the register adheres to local and national data protection and privacy laws, such as the GDPR in Europe or the CCPA in California. Consult legal experts to align your practices with these regulations, especially regarding the collection, storage, and sharing of personal data.

Consistent Documentation:

Document incidents consistently and thoroughly before adding an individual to the banning register. This should include detailed descriptions of the incident, any witness statements, and outcomes of any initial interventions.

Privacy and Security:

Keep the register secure to protect personal information. Access to this information should be restricted to authorised personnel only, and it should be stored in a way that protects it from unauthorised access or breaches.

Clear Policies:

Establish clear policies regarding the length of time individuals remain on the register, how they can appeal a decision, and under what circumstances they might be removed from the register.

Transparency:

Inform individuals at the time of banning about their inclusion on the register, the reasons for it, their rights regarding data protection, and how they can appeal the decision if applicable.

Training Staff:

Train staff on how to handle incidents that may lead to banning, how to document these incidents properly, and how to use the banning register respectfully and legally.

Regular Reviews:

Regularly review the register to ensure it is up to date and that any data no longer necessary or relevant is removed. This also involves reviewing the policies and procedures related to the register to refine and improve them.

Integration with Other Systems:

If applicable, integrate the banning register with other security and management systems to streamline operations and enhance overall security measures.

Community and Stakeholder Engagement:

Engage with community leaders and stakeholders to align the register’s objectives with community safety goals and ensure it is seen as a fair and necessary tool.

 

Yes, using our APIs you can export involved parties into a 3rd party facial recognition system and update the record or create new face match workflow alert within our platform to notify security staff.

Integrating facial recognition technology with an suspect/offender gallery can be a powerful tool, aiding significantly in the identification and tracking of known offenders. Integration of facial recognition with an offender gallery can enhance the capabilities of law enforcement but needs careful implementation to balance effectiveness, ethics, and legal obligations. Here’s how such an integration can be approached and what considerations should be kept in mind:

Steps to Integrate Facial Recognition with our Offender Gallery

  1. Offender Gallery Setup: Establish a comprehensive and up-to-date database or gallery of known offenders, which includes high-quality images and relevant biographical data for each individual.
  2. Facial Recognition Technology: Choose a facial recognition software that meets the operational requirements and has proven accuracy and reliability. This technology should be capable of analysing, processing, and comparing facial features from various image sources.
  3. Integration: Integrate the facial recognition system with the offender gallery via our APIs. This involves ensuring the software can query the database and retrieve matches based on facial analysis.
  4. Data Input Sources: Implement systems to input live or recorded images from cameras or other image sources into the facial recognition system. This could include CCTV footage, body cameras, or photos taken during specific incidents.
  5. Processing: Set up the system to perform adhoc or real-time facial recognition/matching checks against the offender gallery, providing immediate alerts if a match is found. This feature is particularly useful in monitoring and surveillance operations.
  6. Verification and Alerts: Establish protocols for what happens when a match is detected. This should include steps for verification by trained human officers and subsequent actions, whether that's apprehending a suspect or further monitoring.
  7. Privacy and Legal Compliance: Ensure that the use of facial recognition technology complies with relevant privacy laws and regulations. This includes obtaining necessary permissions, conducting impact assessments, and implementing measures to protect personal data.
  8. Training and Policies: Train personnel in the proper use of the technology, including understanding its limitations and the handling of data. Also, develop clear policies regarding when and how this technology can be used to prevent misuse and protect civil liberties.

Considerations

  • Accuracy: Facial recognition technology is not infallible and can sometimes produce false positives. Ensuring the technology is as accurate as possible is crucial to its effectiveness and ethical use.
  • Ethical Concerns: There are significant ethical considerations and public concerns about privacy and surveillance related to the use of facial recognition technology. Transparent operation and clear communication with the public are essential.
  • Legal Restrictions: The legal landscape for facial recognition varies by country and jurisdiction. It’s important to comply with all relevant laws, which may include restrictions on the use of such technology.
  • Security: Secure the data and systems against unauthorised access to prevent breaches that could lead to misuse of sensitive information.

 

You are In safe hands

  • ISO 27001 & Cyber Essentials
  • G-Cloud Government Framework Approved
  • Crown Commercial Service - CCS
  • Google Partner
  • AWS - Amazon Web Services Secure Hosting Infrastructure
  • SIA - Security Industry Authority
  • OWASP - The Open Worldwide Application Security Project
Request
Case Study