Core platform

Product Hero Image


Evolve your platform
using customisation tools

Console provides ultimate configuration for the Command, Reporter & Verify platforms. Console has been designed to enable not only the basic setup of your organisation’s structure but complex configurations to ensure your readiness is proactive, not just reactive.

Easily configure settings, adjust access controls, and customise functionalities to align with your organisation’s procedures and policies. Create and adjust existing templates for communications based on specific triggers and scenarios, setup specific task types, response procedures, along with defining data capture and workflows that automate processes and fit your unique needs.

Key benefits

  • Pre-configured features allow you to be up and running in virtually no time.
  • Configure the workflows to the exact needs of your business.
  • Adapt the user interface based on role.
  • Define your own access levels and user permissions at a granular level.
  • Setup triggers for automation covering tasks, notifications, rules and processes.
  • Manage locations and the hierarchy of your organisation.
Synapse Divider


Directing, responding escalating and making key decisions to manage and resolve critical events effectively.

Maintaining control, overseeing response activities, and ensuring efficient use of resources during emergencies.

Rapidly share vital information through multiple methods with stakeholders through clear, consistent, audited and timely communications.

Evaluating data to understand risks, make informed decisions, and improve future response strategies.

Synapse Divider

Frequently Asked Questions

Workflow configuration and setup for critical event or incident types involves creating a systematic series of actions and procedures that are automatically triggered by specific types of incidents or events. This process is crucial for ensuring a coordinated, efficient, and timely response to emergencies. Here’s a detailed look at what this involves and why it's important:

Definition of Workflow Configuration and Setup

  1. Identifying Incident / Critical Event Types: The first step involves defining various types of incidents that the organisation might face, such as natural disasters, cybersecurity breaches, or operational failures. Each type of incident requires a unique response strategy.
  2. What do you need to know? Identify the key questions that are needed at the different stages of the incident management process. For example, the initial questions that you would like to be completed by the user when reporting the incident into you, followed by the investigation questions and post incident analysis questions. These stages, steps and question groups can be fully configured for specific types of users, locations and groups of people. It’s important to note that these stages often overlap and may require going back and forth. For example, additional findings in the Analysis stage might prompt further Investigation. Effective incident management relies on flexibility and the ability to adapt as new information becomes available.
  3. Mapping Response Procedures: For each identified incident type, specific response procedures are mapped out. These procedures detail the steps that need to be taken, including who needs to be notified, what actions they should take, and what resources are required.
  4. Automation of Tasks: Workflows include the automation of repetitive or time-sensitive tasks to increase response speed and reduce human error. For example, upon detecting a cybersecurity breach, the system might automatically initiate protocols to isolate affected networks and notify IT security teams.
  5. Role Assignments / Triage: Specific roles and responsibilities are assigned to different team members within the organisation. The workflow ensures that each person knows their responsibilities in the event of a specific type of crisis.
  6. Communication Templates: Predefined communication templates (e.g., emails, SMS, notifications) are set up for quick dissemination of information to relevant stakeholders, ensuring clear and consistent communication during an emergency.

Importance of Workflow Configuration and Setup

  1. Efficiency and Speed: Well-defined workflows allow for rapid and coordinated responses to incidents, minimising the impact on the organisation. Automated steps ensure that critical actions are not overlooked and are executed as quickly as possible.
  2. Consistency: Having predefined workflows ensures that responses are consistent across the organization, regardless of who is on duty. This uniformity helps maintain standards of response and ensures that all necessary protocols are followed.
  3. Accountability: Clear role assignments and responsibilities help establish accountability within the organisation. Everyone knows what is expected of them, which is crucial for effective emergency management.
  4. Scalability: Configured workflows allow the organisation to scale its response according to the severity and specifics of the incident. This flexibility ensures that the response is proportionate to the event.
  5. Continuous Improvement: After an incident, the response can be analysed to identify areas for improvement. The workflows can then be adjusted based on real-world experiences, enhancing future responses.
  6. Regulatory Compliance: Many industries have regulations that dictate certain responses to emergencies. Custom workflows help ensure that these regulatory requirements are met automatically.

In summary, workflow configuration and setup for critical events in a CEM platform is about preparing an organisation to handle emergencies efficiently and effectively. It ensures that every potential incident is met with a rapid, coordinated, and appropriate response, thereby safeguarding both the organisation and its stakeholders.

Continuously customising the platform ensures that it remains a robust, effective tool tailored to the organisation's current needs, capable of managing any crisis effectively. This ongoing process ensures readiness and resilience, helping to safeguard the organisation and its stakeholders.

It is crucial for several reasons, reflecting the dynamic nature of both the organisation it serves and the external environment in which it operates.  Here are some key reasons why ongoing customisation is necessary:

Evolving Threat Landscape

The nature of risks and threats to organisations changes over time due to new technologies, geopolitical shifts, environmental changes, and societal trends. Continuous customisation allows the platform to adapt to these evolving threats, ensuring that the organisation remains prepared for new types of emergencies.

Organisational Changes

As organisations grow, scale down, or change their operational structures, their needs for crisis management evolve. Continual customisation ensures that the platform remains aligned with the current organisational structure, communication channels, and operational priorities.

Technological Advancements

Technology is always advancing, and with these advancements come new capabilities for enhancing platform efficiency and effectiveness. Regularly updating the CEM platform ensures it leverages the latest technology for improved data processing, communication, and automation.

Regulatory and Compliance Updates

Regulations related to safety, data security, and emergency management can change. Continuous customisation helps ensure compliance with current laws and standards, thereby protecting the organisation from legal and reputational risks.


Over time, users of the platform identify strengths and areas for improvement. Continuously customising the platform allows the organisation to integrate user feedback, improving usability and functionality, which in turn enhances user adoption and effectiveness in actual crises.

Lessons Learned

After each incident or critical event, organisations have the opportunity to learn from what went well and what could be improved. Continuous customisation enables the integration of these lessons learned into the platform, thus refining response strategies and tools to better handle future crises.

Resource & Asset Changes

As resources and assets within an organisation change (such as new facilities, equipment, or critical personnel), the platform must be updated to accurately reflect available resources and responsible parties during an emergency.

Interoperability Needs

Organisations often change or upgrade other systems and software that need to work seamlessly with the platform, such as communication systems, HR databases, and operational software. Continuous customisation ensures these integrations are functional and efficient.

Phased Implementation

Implementing changes gradually allows for the integration of feedback from users at each stage, leading to continuous improvement and better alignment with organisational needs.

Budget Management

Spreading out the customisation process can be more financially manageable, allowing organisations to allocate costs over multiple budget cycles and reduce the initial financial burden.

Training and Adaptation

Gradual implementation gives staff time to adapt to new features and processes, reducing resistance and enhancing training effectiveness. It allows for step-by-step training sessions tailored to each new component or update.

Specific Risk Profiles

Every organisation faces a unique set of threats based on its location, industry, size, and other factors. Customising the platform allows for tailored responses to specific risks, enhancing preparedness and response efficiency.