You can use the Crises Control system from anywhere in the world from your desktiop, laptop, tablet or mobile phone. All you need is internet access for all devices except with mobile phones, The Crises Control App can receive messages via SMS and telephone ene when you have no data signal or internet access.
Two simple steps will get you up and running. The first step is to click the FREE TRIAL link and setup your Company. The second is to start using the system after you have been through the basic tutorials. The turorial are really simple to follow and you can run them at any time as a refresher.
You can then download the App for your mobile device from this link.
if you need help along the way for what ever reason you can contact us on +44 (0) 208 5841385 to contact us using this link.
Our research came up with over 200 different incident types. These vary from high severity types like fire, flood or IT system failure to more widely occurring incidents that can cause disruption and risk to the business i.e. accident or injury at work.
Our Incident Library provides a comprehensive list of incidents that you can deploy straight away. The incidents can be personalised with the option of easy to consume media assets associated to the task, for example short 'how to' videos. These media assets make it easy for people to absorb information quickly in a crisis situation.
A rich set of pre-configured incidents, and the ability to instantly communicate with the right people are core capabilities that underpin the credibility of the crisis response component of your risk management strategy.
Each user is associated with a company by their email address and password. All messages from Crises Control to the user's mobile phone are secure and destined only to that device. Crises Control offer the incident manager up to 5 channels of communication Email, SMS, PUSH, Telephone and Web. Any combination or all of these channels can be used to deliver the message to the user.
It is easy to integrate Crises Control with other established applications such as Service Desk software, CRM and HR database, Security Monitoring systems and many more
Crises control is designed to receive “Triggers” from these systems and perform the actions that you have set up. For example, you can launch an incident from an IT alerting system, or you can update your users adding new starters and removing leavers when a trigger is received from the HR system.
We offer our customer flexibility and choices for integrations.
- Active Directory Integration
- Trigger imports via Email, SFT and SM. These can launch an Incident or send mass notification Ping.
- Import Bulk User (CSV, excel file format)
- Scheduled user data imports, export and much more
- Data import and on-demand.
- Single-sign on integration(optional).
- Open APIs (for developers and accredited partners)
Triggers can use to build integration with a physical monitoring system such as building alarms, fire alarms, temp control systems, server monitoring software,antivirus software, or any system capable of generating an alert by Email, SMS or SFTP.
PING is like your own private and secure "WhatsApp" but much more powerful. PING can be used to send messages between people in your organisation securely because it is private for you organisation.
The messages are transmitted from device to device encrypted and can have associated photos and or videos, however the photos and videos are not sent to the message receiver. Therefore, they are not downloaded to their device, they are kept in our cloud and only a link is sent to the message receiver. GDPR rules require PII to be protected from unauthorized or unconsented distribution.
Yes, like WhatsApp you can do that however the photos and videos are not sent to the message receiver's device, they are kept in our cloud and only a link is sent to the message receiver. GDPR rules require PII to be protected from unauthorized or unconsented distribution.
Yes, you can to any person or combination of people, Groups and Locations that you have rights to.
You can send up to 250 character in one PING message.
All messages in transit are SSL encrypted (256bit).
SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication. The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
When a Photo or Video is sent you from another user, you do not receive the photo or video with the message, you receive a link to the Crises Control cloud where you can view the Photos and Video.
You can use one or all communications channels to send a PING message. It depends on your preference. The more channels you use the greater the certainty that your message will be received by the recipient.
The system will allow you to configure your "Priority' and "Severity" settings to any configuration of channels to be used.
Messages can also be cascaded with a time gaps between channels selected to optimise reach and cost control.
The Crises Control App and the web portal both display the people that have Acknowledged and those that have not, in real time.
Yes, you can set up different response options as a multiple choice.
Yes, our communication network is very extensive and covers most of the world. There are some places like China where communication services can be partially blocked for Geopolitical reasons.
Notifications and Alerts
If you are not receiving emails from Crises Control it is probably because your Network Spam filters are blocking incoming email or they are going to your Junk folder.
Spam filters are customizable and can block emails containing specific words, and some networks or organisations have strict rules that automatically block or mark messages sent outside of a whitelist. You can whitelist www.Crises-Control.com so they aren't blocked by your organisation.
Whitelist Information for Crises Control
Domains & IP Blocks
If you're behind a firewall that blocks access to all traffic except for certain domains or IPs and the network has granted access to just www.crises-control.com, the network administrator needs to add all our domains, subdomains, and IP blocks for the site to work properly. Otherwise, you might experience issues, for example certain pages won't load or you won't be able to upload or view files or you can’t see tutorial videos on "how to do things".
The asterisk (*) is a wildcard used to account for any subdomains we use. The last item in the list is for Vimeo, which we use to host video tutorials and training materials.
Of course there may be some things that may not be possible, for example if your mobile cannot receive emails this option will not be available.
Phone number validity
- Incorrect/non-existing phone number
- Recipient phone number inactive
- Incorrect international country code
- Sending a message to a landline
- Incorrect sender ID
- Keyword filtering
- Repeated messages
- Using cheap routes
- Portability issues
Message delivery can also be affected because of several reasons, such as a recipient’s inbox becoming full, frozen messaging application, roaming limitations, and errors on operator’s SMS servers.
Some phones cannot accept some types of messages, such as WAP push messages, binary text messages, or texts with special characters.
Different operators and countries stipulate different SMS encoding standards. So, when a text message fails to send, it could mean the wrong encoding was used. For example, some carriers in Europe will not deliver messages sent in Unicode characters.
Billing and Upgrades
If you sign up for Crises Control, you will be given the option to pay annually in advance or monthly in advance. You can discuss this and other payment option with us by calling sales +44 (0)208 584 1485, or you can contact us via emails [email protected]
You can continue to use Crises Control until your account automatically closes at the end of your current billing period. To see when your account will close, click View billing details from Your Account.
The way it works is as follows:
You pay for what you have used. You buy credit for the calls and SMS text message services in advance. You can pay for this by credit card. Once you have used your credit, you top up again. We maintain a current statement for your account so that at any point you know how much you have used and what it cost. A monthly detailed account statement will be available on the web portal on the 1st day of the month.
When using the SMS and Call notification features, these are charged per unit according to the price package agreed with the customer. Price packages do offer the benefit of discounts for bulk purchases. Unit price varies according to the length and geographical location. One unit is equivalent to an SMS message containing less than 160 characters, or a local phone call of under 1-minute duration. Conference call rates vary according to the destination, the duration of the call and the number of participants on the call.
You can increase the number of Users to suit your needs. This is done on your Crises Control account from SETTINGS > SETUP USERS and ADD USER.
If you exceed the contracted number of users you will be given given an alert message, the message will explain the additional cost you will incur if you choose to add user(s).
The Task Manager Module includes new functiionality that makes allocating, tracking and managing tasks easier then ever before. This unique module can simplify the process of risk management, compliance monitoring and root cause analysis. Learn more about Task Manager.
- Creation of task lists in advance or during a real time incident
- Allocation of each task to a task owner or group, plus an alternative owner
- Setting of timeline KPIs for when tasks must be accepted and also completed
- Escalation process if first task owner does not accept within KPI
- Delegation option for first task owner
- Workflow option to set predecessors before a task can be completed
- Tracking of task completions
- Post-incident audit trail with complete timelines
Please contact our sales team to obtain a quote for this Module to be added to your system.
This is very easy and depends on your mobile device operating system. In most cases when your user account is created, you will receive an email notification containing the links to download the app.
You can download the App for your mobile phone from this link.
You can send a Ping (mass communication notofication) messages to the users that you have chosen across the world.
You can, create a conference call bridge on demand.
You can launch a business continuity incident, communicate with your responders, share "action plans" and track the progress of the incident until resolved.
You can receive, accept, manage and complete your incident tasks.
You can use the SOS panic button to alert your security teams. If you are in danger or in need of immediate help, use the SOS.
You can enable "track me during travel" if you entering a dangerous and want to be tracked until you are safe.
You can see your responsiveness ratings.
Yes, Crises Control does not require a user to have the App installed on their phone, we understand that some people may not want to install the App on their private phones.
Crises Control can still send alert messages to the user's phone by SMS, telephone, Web and Emails, these four channels do not require the App.
The App however provides a richer experience and uses the PUSH channel in addition to the others. Its is more cost effective because we do not charge for PUSH alert messages.
An incident is an unexpected event that can cause disruption to the normal running of your business.
For example, an incident, in the context of occupational health and safety, is an unintended event that disturbs normal operations.
An incident, in the context of information technology, is an event that is not part of normal operations that disrupts operational processes.
An incident may involve the failure of a feature or service that should have been delivered or some other type of operation failure. Security incident are events that indicate that an organization's systems or data may have been compromised.
An incident can be: fire, flood, denial of access, loss of internet, loss of telecommunications, injury or death at workplace, power outage, cybercrime, data breach, supply chain disruption by severe weather, damage to an aircraft, bomb, terrorism, and many more incidents that require you to rapid make people aware and share information with them.
Definitely. You can run simulation anytime.
Yes, the incident(s) can have different types of media asset(s) that complement the incident(s). For example, these can be documents, diagrams, photos, web links, videos, and sound files.
Yes. You can customise your Standard Operating Procedure based on your needs. You can add Standard operating procedure to an incident by following the steps below:
Once you have created the Standard Operating Procedure you need for the specific incident, go to set up incident, click on add incident > create incident > under incident details, look for Standard Operating Procedure field, click on file action, select SOP.
A Tasks serves as a guide for respective users and dept /groups in the incident you created. You can assign tasks to different users within your dept/group that will help you overcome incidents that might occur within your organization. It has the ability to escalate different assigned tasks of other users who are unable to fulfill the same tasks which can serve as your back up.
Yes. Under iSOP Wizard Menu, click on Add new Document > On New SOP Document page, fill out the details related to your SOP including frequency on when you need to review SOP so that you can modify or update it on a specific timeframe. Fill out next Step labelled as Sections and under Section content, enter the details of your Standard Operation Procedure and on Step 4 under Generate Document, you can attach your SOP related to the incident.
Yes. You can create Tasks that are assigned to People and set up timeline on when they need to respond and accomplish the task and add a person that the task can be escalated to when the 1st person assigned to the task is unable to attend to it on the set time and date.
You can go to an incident with the task > go to incident Tasks Tab > either click on add task to add new tasks and fill out the details of the new task related to the incident > Under assigned to User and/or Dept. / Group, select user(s) and Dept. /Group, choose the person and dept. /group the tasks needs to be assigned to and under escalation table > choose the time to accept and time to complete or modify.
You can create a new one by going to iSOP Wizard menu and Add new document. On New SOP Document Page, fill out the details below:
- Basic Details
- Generate Document
Yes. Customize your Standard Operation Procedure and simply go to iSOP Wizard menu > Add new document and fill out the details below:
- Basic Details
- Fill out the details of your Standard Operation Procedure related to your incident
- Generate Document
Yes. You can store most file formats associated with the following:
- Images (tif, tiff, bmp, jpeg, jpg, gif, png, pdf)
- Word ( doc, docx, etc)
- Spreadsheet ( xls, csv)
- Audio file
Yes. Once you have created your Standard Operation Procedure, it will be available to you by attaching it to the incident it is related to.
Yes. You can enter the date and frequency on when you would want to review your Standard operation Procedure. The system can send a review reminder email if you choose.
You can schedule Incidents or Pings. A Ping / Incident will provide you option via the Scheduler > Schedule Settings for you to customise on when you would want to do the Simulation.
Yes as long as the monitoring software has the ability to send an email.
Yes. Once you have set up your location and added users in that location, they will receive your incident alert worldwide.
Yes. Once you have set up your Dept. /Group and added users in that Dept. /Group, they will receive your incident alert worldwide.
Yes. You have the liberty of choosing which users you would want in each Dept. /Group and have them be part of any of the Dept. /Group whenever you think necessary.
Yes. You can choose the incident @ location when you launch the incident so that users know where the incident occurred.
Yes. Before you launch the incident, you need to ensure you click the radio button and choose track our people and that location is turned on in their respective devices.
Yes. In their devices, they can go to settings and use the slide button across the "Track Me during Travel" and "Track Me During incident" options.
Yes. They click on SOS button for any emergency situation.
Yes. On your launched incidents menu, click on actions then go to incident timeline to check on current status of the incident you launched and you can also click on actions and then go to view reports to get updated Incident summary, incident stats, incident message listing and BCM listing where you can view the Map and locations of users you notified.
You can inform as many users as needed. This will also depend as well on your company’s contract agreement with Crises Control on numbers of users, administrators and Key holders allowed. They can always increase anytime and modify the contract by contacting our Sales team.
Yes. Go to the incident you want to clone and click on edit. Once you are inside the incident, click on the clone incident at the top right of your screen.
You can create as much incident as possible that is customized based on the need of your company. You can even add incidents that you can use for simulation.
Task Manager Module allows Incident managers/owners to create critical task(s) that needs to be executed during the incident. They can assign these tasks to user(s) with an escalation path.
The incident manager can specify the workflow and the execution sequence of the task(s).
The incident manager can track the progress of the incident, activities of the responders (including their location), can communicate with them and support their efforts to a swift recovery.
The incident manager can reallocate tasks, set acceptance and completion time KPIs.
- It distributes and manages the assignment of Tasks to the incident response teams.
- It helps the responders to report progress by disseminating information to other stakeholders.
- It makes it easier for incident managers to monitor responders’ activities and progress.
- It speeds up the time to recovery.
- The data collected helps your organisation to learn and improve.
- It provides audit and compliance data.
Make the process of creating incident resolution plans easy.
Once you have laid out different type of Tasks applicable to your incidents, you benefit from the orderly distribution of these tasks to the assigned people, supporting your operatives with information and help, the capturing of data during the incident life cycle and the data analysis for improvements
Provides realtime visibility of all communications, activity and decisions being made by the responders.
Auditorse can make improvement to process.
The General Data Protection Regulation (GDPR) is a sweeping new EU law that went into effect in all EU Member States on May 25, 2018. It mandates how companies can collect, store, delete, modify and otherwise process personal data of EU citizens. It applies to any company that processes personal data of EU citizens, regardless of whether it has any physical presence in the EU, or even whether it has any EU customers. Companies are also required to pass these obligations down to all of their vendors and suppliers who may also handle personal data of EU citizens anywhere in the world. Despite Brexit, the UK is committed to stay compliant with the GDPR
Under EU law, personal data means any information relating to an identified or identifiable natural person (“data subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. It doesn't have to be confidential or sensitive to qualify as personal data.
Where we are the Processors of your data, our obligation is to ensure that this data is processed lawfully, fairly and transparently as agreed by our clients and to maintain appropriate security controls. Processing here means maintaining the confidentiality, availability, integrity and security of the data, the servers and network where the data is held. Where it is exceptionally necessary to access a client database to investigate a client issue, we will always seek the client’s permission. We work hard to protect Crises Control and our users from unauthorised access to or unauthorised alteration, disclosure or destruction of information that we hold. In particular:
- We encrypt many of our services using SSL.
- We offer two factor authentication (2FA) verification when you access your Crises Control Account.
- We use Cloudflare Advance Security to protect and secure the application and APIs against denial-of-service attacks, customer data compromise, and abusive bots.
- We encrypt data whilst at rest.
We use Cloudflare for fast Global Content Delivery Network, which speeds up web page loading times. Cloudflare are certified under the EU-US and Swiss-US Privacy Shield frameworks for onward transfers of EU data to the United States. (See https://www.cloudflare.com/privacyshield/).We have Data Protection Addendum (DPA), which is a contractual agreement in place with Cloudflare to protect our customer’s data to EU- GDPR standards.
We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorised access to systems.
- We restrict access to personal information to Crises Control employees, contractors and agents who need to know that information in order to process it for us and who are subject to strict contractual confidentiality obligations. They may be disciplined, or their contract terminated if they fail to meet these obligations.
- We are ISO 27001, ISO 9001 certified
- We employ certified GDPR practitioners to maintain and improve security standards.
Technical, Security and Resilience
Crises Control is wholly owned by Transputec, a privately owned limited company. Transputec is an established IT services and solutions company with over 30 years of innovation, managed serices and excellent customer service.
Crises Control data storage has high levels of security built into the architecture, we use MS SQL security framework to encrypt the data at rest.
Our service is a SaaS model as standard which has no touch points with a client’s own network. There is SSL encryption for traffic between the client device and the Crises Control application servers.
Our data is backed up every 10 minutes and replicated to the fail over data centre.
Crises Control provides GDPR compliance assurity by taking the necessacery stept to protect data at all points from secure hosting, encryption of data both at rest, and SSL data encryption in transit. Learn more
The data centres and are ISO 27001 certified, PCI-compliant and secured to UK government IL4 standards, ensuring our solution is protected by exceptional levels of security, all the time. Plus, our solutions are protected by a Cisco ASA Firewall as standard.All the data centres are UK based and offer state-of-the-art, 24/7/365 security, enterprise-grade infrastructure, super-fast networks, application backup and failover.
Crises Control for Gov is hosted with UKFast the largest privately-owned hosting provider in the UK. With over 18 year’s experience in cloud technology and dedicated hostingUKFast is a government-approved supplier on the G-Cloud 10 framework and ISO-certified data centres located in the UK.
Through G-Cloud, public sector organisations have access to Crises Control which has been assessed and approved to provide its’ services to government and the public sector.
No payment data, such as client’s bank account details, is held on the Crises Control systems, all credit card payment processing is done by our banking partner Worldpay.Worldpay’s secure online payment gateway provides
- Advanced fraud protection
- Accept all major credit and debit cards as well as PayPal
- Secure your payments with our fraud screening to help protect you and your customer
- Manage your invoices and transactions with our simple online reporting tools
- Set up recurring payments and subscription-based payment plans for your customers
- Accept payments in over 116 currencies
- Our payment processing systems are compliant with PCI DSS industry security standards
Crises Control uses WorldPay, who process any credit card payments. Crises Control does not hold any credit card information, all credict card transactions are processed throught WorldPay gateway.
Crises Control system has no touch points with the client operating environment and so will not breach your PCI compliant zone boundaries.
WorldPay are PCI compliant, Worldpay is a global leader in payments processing technology and solutions for our merchant customers.
Our primary messaging partner (SMS and voice calling) is Twilio which is a leader in the industry. Twilio maintains redundant inbound and outbound connectivity with dozens of network carriers around the world. Their real-time systems dynamically route each call or message via the carrier with the best connectivity at any point in time, responding automatically to carrier availability and reliability.
Crises Control is available on the UK government digital service framework G-cloud. This service is operated from two distinct environments to provide public sector consumers with choice and price flexibility, dependent upon their Information Assurance requirements.
Our Standard Offering is hosted on a Government Community Cloud platform suitable for Information Assurance needs up-to “OFFICIAL” and is only connected to the public internet.Our Secure Offering is hosted on a Government Community Cloud platform which holds pan-government accreditation for information up-to and including the “OFFICIAL-SENSITIVE” impact level, with connections to GSI, PSN, N3 and PNN networks as well as the Internet.
In addition to our standard SaaS service, and the G-Cloud platform for government customers, we also offer on premise hostingfor customers who wish to have their own private installation of the Crises Control software.
We can support single-on via Centrify a Cloud Identity Service provider for single sign-on. The Crises Control application and API will be using SAML for integration with Centrify Identity Manager. Additional service providers are frequently considered for future integration.
|1||A fault exists that results in a total loss of service or functionality affecting a whole site (sites), or whole system or services.||15 minutes to respond.
4 working hours to resolve.
|95% of all Severity 1 Incidents will be resolved within the SLA|
|2||A fault exists which results in partial loss of service or functionality affecting multiple users.||15 minutes to respond.
8 working hours to resolve.
|95% of all Severity 2 Incidents will be resolved within the SLA.|
|3||A fault exists which results in loss of service or functionality for a single user.||15 minutes to respond.
24 working hours to resolve.
|95% of all Severity 3 Incidents will be resolved within the SLA.|
Transputec is fully certified to the ISO 9001:2015 Quality Management
Transputec is fully certified to the ISO 27001:2013 Quality Management
Transputec in the process of achievingISO 14001:2013 Quality Management
Crises Control is a Corporate Partner of the Business Continuity Institute and Continiuity Forum. The Business Continuity Institute (BCI) is the world’s leading institute for business continuity. Established in 1994, the BCI has established itself as the leading membership and certifying organization for Business Continuity professionals worldwide.
We offer you full 24/7 technical support to assist you when you need it. We recognise the importance of a rapid response to and resolution of any issues that you encounter. Our team will aim to resolve your issue immediately over the phone.
Standard Support is provided by e-mail for day-to-day questions and issues for Business solution customers. We will aim to respond to your query within 2 hours and resolve it within 8 hours. Exceptionally, where you need urgent assistance for an emergency notification and you are experiencing difficulties, all users can call our Emergency Live Operator phone line and a representative will assist you in sending a broadcast notification.
Premium Support is provided by e-mail or by telephone for day-to-day questions and issues for Enterprise solution customers. We will aim to respond to your query within 2 hours and resolve it within 4 hours. In addition to the support options noted above, we also offer a Concierge Service. This includes proactive assistance in helping you to get the most out of your Crises Control service.
If you are the registered administrator you can get support at any time of the day.
We offer 24/7 English email support for all customers - even on holidays! (Email support in a variety of languages is available during limited hours.)
English phone support is a Premier feature. We offer phone support 24/7 via our service desk. Call our Help Desk on: +44 (0) 20 8584 1385 (option 2).
Regardless of the type of support you have, the one constant for all support organisations is that we are here to help resolve issues.
- Send an email
- Call you on the telephone
All support requests, from all channels, become Crises Control Support tickets. Tickets capture your initial request for support and all the conversations your people have with our agents along the way to solving the support issue.
- Demonstrate its ability to consistently provide product that meets customer and applicable statutory and regulatory requirements.
- Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity to customer and applicable statutory and regulatory requirements.
- The QMS is applicable to the design, build, integration, implementation and support of business software and hardware solutions, hardware and software product sales, with associated support, provision of fully managed service contracts, including full infrastructure and platform services, support contracts, contract fulfilment and consultancy services.
Transputec is also fully certified according to the ISO 27001 Information Security Management Standard. In order to achieve the certification, Transputec's compliance with ISO 27001 standards was validated by a leading independent audit firm, Lloyds Register Quality Assurance, after demonstrating an ongoing and systematic approach to managing and protecting company and customer data.
ISO 27001 certification ensures that controls are in place to reduce the risk of security threats and avoid any system weaknesses being exploited. It provides assurance and confidence to customers, suppliers and trading partners that all security risks are being addressed on an ongoing basis.
The scope of the ISO certification includes design, build, integration, implementation and support of business software and hardware solutions. It also includes the provision of full IT managed services, including infrastructure platform services, support contracts, contract fulfilment and consultancy services.
Start using Crises Control today
An efficient, user friendly, mass notification system made to support you when you need it the most