Secure
A platform ensuring data protection and user privacy through robust authentication and tiered access control measures.
Scalable
Automatically expands capacity and functionality while maintaining secure, tiered access and authentication integrity.
Restrictions
Adaptable platform offering customisable access, data controls, and configuration settings to meet diverse needs.
Open
Open identity standards (OAuth2.0, SAML 2.0 and OpenID Connect) and integrates with an extended ecosystem.
Access via web browser - Google Chrome, Microsoft Edge, Firefox or Apple Safari (Command & Console only).
Access via iOS & Android apps - device biometric authentication on installable Apps (FaceID, fingerprint scanning, iris recognition) (Reporter only).
Access via Android app - device biometric authentication on installable Apps (fingerprint scanning, iris recognition) (Verify only).
Access via application programming interface (API) token key (Marketplace only).
User Pools provides a secure identity store that scales to millions of users.
Users can sign-in via social and enterprise identity providers (Google & Apple, Microsoft Active Directory)
Common identity management standards including OpenID Connect, OAuth 2.0, and SAML 2.0 are also available.
Users can verify their identities using a Time-based One-time Password (TOTP).
Detects unusual sign-in activity from new locations and devices and also if credentials that have been compromised elsewhere.
Use the same login authentication details for Command, Verify, Reporter & Console
Manual creation of user profiles by adding contact details, allocation to the organisation hierarchy and assignment of an access level.
Import thousands of users in bulk by utilising the CSV import tool for rapid creation of user profiles.
Automated management of users and integration with your own user systems/databases with our Users API service.
Allows restrictions on a module by module basis to defined levels.
Restrict users to an assigned Site(s).
Restrict users to an assigned Region(s) and all site(s) within.
Restrict users to an assigned Organisation(s) and all site(s) within.
Restrict Access Levels to specific event category(ies), sub-category(ies) and specific event type(s).
Restrict Access Levels to specific question(s) within an incident workflow (who can answer, edit and view the question).
Restrict Access Levels to specific event status(s) i.e. a user can not select a restricted status.
Restrict Site(s) to specific question(s) within an incident workflow allowing you to ask different questions at different locations.
Restrict users to view data on a specifically assigned Site(s).
Restrict users to view data on a specifically assigned Region(s).
Restrict users to view data on a specifically assigned Organisation(s).
Show and hide tabs based on answers to questions.
Restrict response forms down by access level.
Restrict the question to question incident categories, sub-categories and types.
Restrict specific forms questions within a critical event workflow to specific Organisation(s) and Site(s).
Yes, the platform can be configured to segregate access levels across different departments/teams, such as security and health & safety.
This is typically achieved through the Access Levels module, where users are assigned roles and restrictions that define their access permissions. By implementing such a system, you can ensure that members of the security team have access to certain data and functionalities, while the health & safety team has access to others relevant to their responsibilities.