technical overview


All systems and modules in the Redkite Smart Software Suite™ are supplied as a SaaS on the Redkite Systems dedicated secure hosted servers and are accessed by authorised users at an appropriate level via a web browser. All standard web browsers are supported. Nothing is installed on PC’s, Notebooks, smartphones, bar code or RFID readers. All Redkite Systems products are leased and not sold.

Dedicated hosted server   Your dedicated applications are installed on our dedicated, secure hosted servers in secure data centres located in London, England and are managed by Rackspace who provide server support 24 x7 x 365, with a guaranteed uptime of 99.98%.

Rackspace hold ISO 27001 : 2013 and SOC 2 amongst other security certifications.

Redkite Systems hold ISO 9001:2015 and apply rigorous cyber essentials policies.

Back up: an incremental system back up is undertaken each day and a full back up of your applications and data is undertaken weekly.  Backups are held for 4 weeks at two secure sites.

Disaster Recovery: Data piping is undertaken to pipe data from the operational server to an identical reserve server on a separate secure site to provide rapid disaster recovery with a maximum RPO of 24 hours and RTO of 24 hours.

Firewall and Cyber Security: Your data and applications are further protected with a Cisco systems firewall and Armor Anywhere.

Encryption: All data is encrypted in transit using Thawte 256-bit SSL (https) and sensitive personal data is encrypted at rest

Penetration and Vulnerability Tests: The software and hosted server have met rigorous penetration testing standards undertaken independently by numerous clients. With prior permission you are free to undertake your own PT/VA tests.

Your unique dedicated system is not shared by any other customer and your data is held in a separate SQL Server database. All SQL licenses are included.

A secure single log-in portal is provided to allow easy access to your systems and up-to-date on-line User Guides. The portal allows you to set comprehensive security settings for users.

Data Protection: We adhere to data protection rules applicable in the country of usage.

Additional requirements Access to Adobe Reader and MS Excel or similar is needed on local workstations for report generation.

For further information please contact us at +44(0)1926 814846 during normal UK office hours or email


Main Menu

Download Brochure

Competence Management

Asset Management

Incident Log