Everbridge 360 (Critical Event Management) Features
What are the features of Everbridge 360 (Critical Event Management)?
Prevention & Preparation
- Scenario Planning
- Document Database
Top Rated Everbridge 360 (Critical Event Management) Alternatives
Filter for Features
Safety
Job Hazards | Identify work hazards by job, location, and type of work. | Not enough data | |
Drills | Allow users to conduct safety drills to prepare for real life situations. | Not enough data | |
Claim Management | Provide workflows to create, approve, and process claims. | Not enough data |
Health
Medical Records | Capture and manage health information for all employees. | Not enough data | |
Ergonomics | Apply ergonomics standards to improve work conditions. | Not enough data | |
Programs | Define and manage health programs including clinical visits and immunizations. | Not enough data | |
Industrial Hygiene | Manage the risk of exposure to hazardous agents such as toxins. | Not enough data |
Audit and Inspections
Templates | Include templates for multiple types of health and safety inspections. | Not enough data | |
Workflows | Provide workflows to assign tasks for audit and inspections. | Not enough data | |
Corrective Actions | Identify corrective actions to address incidents and accidents. | Not enough data |
Training
Content | Deliver learning materials for health and safety training. | Not enough data | |
Certifications | Manage certifications to comply with regulations and standards. | Not enough data | |
Best Practices | Provide best practices that employees can use to prevent accidents. | Not enough data |
Reporting
OSHA | Generate Occupational Safety and Health Act (OSHA) reports. | Not enough data | |
Root Cause Analysis | Analyze incidents to determine the root cause and avoid future problems. | Not enough data | |
Nonconformance | Monitor non compliance with health and safety regulations and policies. | Not enough data |
Platform
Reporting and Analytics | Produces summative reports for threats, and creates threat trend analysis using historical data. | Not enough data | |
Connections and Integrations | Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases. | Not enough data | |
Collaboration Tools | Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats. | Not enough data |
Threat Monitoring
Threat Alerts | Allows real-time rules and alerts to be triggered based on pre-set criteria. | Not enough data | |
Continuous Monitoring | Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. | Not enough data | |
Investigation Management | Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons. | Not enough data |
Threat Assessment
Graphical and Link Analysis | Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily. | Not enough data | |
Threat Scoring | Allows threat methodology to be applied to individual threats to assess their priority. | Not enough data |
Threat Identification
Proactive Listening | Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats. | Not enough data | |
External Data Mining | Compiles data from various public research databases, including OSINT, public records, and criminal and civil records. | Not enough data | |
POI Profiles | Enables users to create individual records for persons of interest, pulling in data from connected systems as well as user input. | Not enough data | |
Threat Reporting | Offers a public and/or private portal to collect tips and reports about potential threats. | Not enough data |
Planning
Program Management | Allows users to create programs to deal with potential threats. | Not enough data | |
Resource Modelling | Dependency mapping of resources includes what-if scenarios. | Not enough data | |
Recovery Plans | Ability to create and compare recovery plans using standard out of the box templates. | Not enough data | |
Templates | Includes a library of procedures and standard plan templates. | Not enough data |
Execution
Crisis Management | Procedures to implement crisis management plans and actions. | Not enough data | |
Emergency Notifications | Notifications can be sent to anyone, not only the users of the solution. | Not enough data | |
Workflows | Workflows to assign tasks to users based on their role and the severity of the issue. | Not enough data |
Analytics
Business Impact Analysis | Identify the impact of threats on various departments or business entities. | Not enough data | |
Plan Reporting | Analyse plan characteristics such as completion time or performance. | Not enough data | |
Recovery KPIs | Provide information on recovery KPIs such as recovery time progress and recovery time actual. | Not enough data |
Integration
Integrated Risk Management | Integrates with Integrated Risk Management software. | Not enough data | |
Disaster Recovery | Integrates with Disaster Recovery software. | Not enough data | |
EMNS | Integrates with Emergency Mass Notification Systems. | Not enough data |
Artificial Intelligence
Heat maps | Generate heat maps to identify where high risk activities are taking place | Not enough data | |
NLP Insights | Analyze data from documents such as inspection reports to identify recurring risks | Not enough data | |
Internet of Things (IoT) | Analyze IoT data from multiple locations for health and safety purposes | Not enough data | |
Video analysis | Analyze live or recorded videos to identify potential safety issues and historical trends | Not enough data | |
Predictive | Identify potential safety issues and estimate their severity and urgency | Not enough data | |
Monitoring | Provide real-time monitoring of workplace activities and use AI/ML to identify unsafe acts | Not enough data |
Emergency Management
Mass Alerts and Notifications | Broadcasts real-time updates and alerts to internal and external individuals when an incident escalates, and allows targeted updates to users based on location. | Not enough data | |
Threat Monitoring | Offers risk intelligence tools to proactively monitor and assess threats as they arise. | Not enough data | |
Geolocation | Utilizes geolocation to track personnel, and supports geo-tagged media for field updates. | Not enough data | |
Integrated Response | Integrates with necessary business systems, such as IT and communications platforms, to facilitate faster alerts and responses. | Not enough data | |
Crisis Communication | Enables collaboration and communication between public and private partner organizations to resolve an incident. | Not enough data | |
Post-Event Analysis | Generates reports and insights after each event to assess response efficiency and compliance, and identify areas for improvement. | Not enough data |
Emergency Planning
Scenario Planning | Stores emergency planning documentation and task assignments for a variety of scenarios. | Not enough data | |
Automated Workflows | Configures thresholds for triggering automated incident initiation responses based on user preferences. | Not enough data | |
Auditing & Compliance | Maintains audit trails and mandated compliance for emergency management protocols. | Not enough data |
Prevention & Preparation
Scenario Planning | As reported in 10 Everbridge 360 (Critical Event Management) reviews. Supports the implementation of emergency or disaster plans, and provides response templates for different scenarios. | 83% (Based on 10 reviews) | |
Document Database | Stores and maintains emergency training, procedures, and documents, and organization charts, maps, and contact information. 10 reviewers of Everbridge 360 (Critical Event Management) have provided feedback on this feature. | 68% (Based on 10 reviews) | |
Equipment Management | Helps first responders track and manage their equipment inventory for repairs, inspections, and service history. | Not enough data | |
Threat Monitoring | Offers risk intelligence tools to proactively monitor and assess threats as they arise. | Not enough data |
Response
Mass Alerts and Notifications | Broadcasts real-time updates and alerts to internal and external individuals when an incident escalates, and allows targeted updates to users based on location. | Not enough data | |
Geolocation | Utilizes geolocation to track personnel, and supports geo-tagged media for field updates. | Not enough data | |
Automated Workflows | Configures trigger thresholds for automated incident initiation responses based on user preferences. | Not enough data | |
Incident Dashboard | Visualizes emergency or disaster response and maintain task checklists, activity logs, and communications to ensure resolution. | Not enough data | |
Third-Party Data Mining | Integrates with or pulls signals from disparate data sources, such as weather and traffic APIs, healthcare and EMS systems, and social media. | Not enough data | |
Collaboration Tools | Enables emergency managers to communicate in real-time as situations escalate, and support different levels of task ownership for emergency responses. | Not enough data |
Recovery
Auditing & Compliance | Maintains audit trails and mandated compliance for emergency management protocols, both pre- and post-emergency. | Not enough data | |
Incident Mapping | Visualize incidents and emergencies on grids to identify any trends. | Not enough data | |
Post-Event Analysis | Generates reports and insights after each event to assess response efficiency and compliance, and identify areas for improvement. | Not enough data | |
Cost Management | Tracks the cost related to training, resource and asset usage, and overall incident response. | Not enough data | |
Document Sharing | Supports release of reports and documentation for post-emergency compliance or notification purposes. | Not enough data |
Generative AI
AI Text Generation | Allows users to generate text based on a text prompt. | Not enough data | |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data |