Save to My Lists
Paid
Claimed

Everbridge 360 (Critical Event Management) Features

What are the features of Everbridge 360 (Critical Event Management)?

Prevention & Preparation

  • Scenario Planning
  • Document Database

Filter for Features

Safety

Job Hazards

Identify work hazards by job, location, and type of work.

Not enough data

Drills

Allow users to conduct safety drills to prepare for real life situations.

Not enough data

Claim Management

Provide workflows to create, approve, and process claims.

Not enough data

Health

Medical Records

Capture and manage health information for all employees.

Not enough data

Ergonomics

Apply ergonomics standards to improve work conditions.

Not enough data

Programs

Define and manage health programs including clinical visits and immunizations.

Not enough data

Industrial Hygiene

Manage the risk of exposure to hazardous agents such as toxins.

Not enough data

Audit and Inspections

Templates

Include templates for multiple types of health and safety inspections.

Not enough data

Workflows

Provide workflows to assign tasks for audit and inspections.

Not enough data

Corrective Actions

Identify corrective actions to address incidents and accidents.

Not enough data

Training

Content

Deliver learning materials for health and safety training.

Not enough data

Certifications

Manage certifications to comply with regulations and standards.

Not enough data

Best Practices

Provide best practices that employees can use to prevent accidents.

Not enough data

Reporting

OSHA

Generate Occupational Safety and Health Act (OSHA) reports.

Not enough data

Root Cause Analysis

Analyze incidents to determine the root cause and avoid future problems.

Not enough data

Nonconformance

Monitor non compliance with health and safety regulations and policies.

Not enough data

Platform

Reporting and Analytics

Produces summative reports for threats, and creates threat trend analysis using historical data.

Not enough data

Connections and Integrations

Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases.

Not enough data

Collaboration Tools

Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats.

Not enough data

Threat Monitoring

Threat Alerts

Allows real-time rules and alerts to be triggered based on pre-set criteria.

Not enough data

Continuous Monitoring

Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.

Not enough data

Investigation Management

Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons.

Not enough data

Threat Assessment

Graphical and Link Analysis

Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily.

Not enough data

Threat Scoring

Allows threat methodology to be applied to individual threats to assess their priority.

Not enough data

Threat Identification

Proactive Listening

Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats.

Not enough data

External Data Mining

Compiles data from various public research databases, including OSINT, public records, and criminal and civil records.

Not enough data

POI Profiles

Enables users to create individual records for persons of interest, pulling in data from connected systems as well as user input.

Not enough data

Threat Reporting

Offers a public and/or private portal to collect tips and reports about potential threats.

Not enough data

Planning

Program Management

Allows users to create programs to deal with potential threats.

Not enough data

Resource Modelling

Dependency mapping of resources includes what-if scenarios.

Not enough data

Recovery Plans

Ability to create and compare recovery plans using standard out of the box templates.

Not enough data

Templates

Includes a library of procedures and standard plan templates.

Not enough data

Execution

Crisis Management

Procedures to implement crisis management plans and actions.

Not enough data

Emergency Notifications

Notifications can be sent to anyone, not only the users of the solution.

Not enough data

Workflows

Workflows to assign tasks to users based on their role and the severity of the issue.

Not enough data

Analytics

Business Impact Analysis

Identify the impact of threats on various departments or business entities.

Not enough data

Plan Reporting

Analyse plan characteristics such as completion time or performance.

Not enough data

Recovery KPIs

Provide information on recovery KPIs such as recovery time progress and recovery time actual.

Not enough data

Integration

Integrated Risk Management

Integrates with Integrated Risk Management software.

Not enough data

Disaster Recovery

Integrates with Disaster Recovery software.

Not enough data

EMNS

Integrates with Emergency Mass Notification Systems.

Not enough data

Artificial Intelligence

Heat maps

Generate heat maps to identify where high risk activities are taking place

Not enough data

NLP Insights

Analyze data from documents such as inspection reports to identify recurring risks

Not enough data

Internet of Things (IoT)

Analyze IoT data from multiple locations for health and safety purposes

Not enough data

Video analysis

Analyze live or recorded videos to identify potential safety issues and historical trends

Not enough data

Predictive

Identify potential safety issues and estimate their severity and urgency

Not enough data

Monitoring

Provide real-time monitoring of workplace activities and use AI/ML to identify unsafe acts

Not enough data

Emergency Management

Mass Alerts and Notifications

Broadcasts real-time updates and alerts to internal and external individuals when an incident escalates, and allows targeted updates to users based on location.

Not enough data

Threat Monitoring

Offers risk intelligence tools to proactively monitor and assess threats as they arise.

Not enough data

Geolocation

Utilizes geolocation to track personnel, and supports geo-tagged media for field updates.

Not enough data

Integrated Response

Integrates with necessary business systems, such as IT and communications platforms, to facilitate faster alerts and responses.

Not enough data

Crisis Communication

Enables collaboration and communication between public and private partner organizations to resolve an incident.

Not enough data

Post-Event Analysis

Generates reports and insights after each event to assess response efficiency and compliance, and identify areas for improvement.

Not enough data

Emergency Planning

Scenario Planning

Stores emergency planning documentation and task assignments for a variety of scenarios.

Not enough data

Automated Workflows

Configures thresholds for triggering automated incident initiation responses based on user preferences.

Not enough data

Auditing & Compliance

Maintains audit trails and mandated compliance for emergency management protocols.

Not enough data

Prevention & Preparation

Scenario Planning

As reported in 10 Everbridge 360 (Critical Event Management) reviews. Supports the implementation of emergency or disaster plans, and provides response templates for different scenarios.
83%
(Based on 10 reviews)

Document Database

Stores and maintains emergency training, procedures, and documents, and organization charts, maps, and contact information. 10 reviewers of Everbridge 360 (Critical Event Management) have provided feedback on this feature.
68%
(Based on 10 reviews)

Equipment Management

Helps first responders track and manage their equipment inventory for repairs, inspections, and service history.

Not enough data

Threat Monitoring

Offers risk intelligence tools to proactively monitor and assess threats as they arise.

Not enough data

Response

Mass Alerts and Notifications

Broadcasts real-time updates and alerts to internal and external individuals when an incident escalates, and allows targeted updates to users based on location.

Not enough data

Geolocation

Utilizes geolocation to track personnel, and supports geo-tagged media for field updates.

Not enough data

Automated Workflows

Configures trigger thresholds for automated incident initiation responses based on user preferences.

Not enough data

Incident Dashboard

Visualizes emergency or disaster response and maintain task checklists, activity logs, and communications to ensure resolution.

Not enough data

Third-Party Data Mining

Integrates with or pulls signals from disparate data sources, such as weather and traffic APIs, healthcare and EMS systems, and social media.

Not enough data

Collaboration Tools

Enables emergency managers to communicate in real-time as situations escalate, and support different levels of task ownership for emergency responses.

Not enough data

Recovery

Auditing & Compliance

Maintains audit trails and mandated compliance for emergency management protocols, both pre- and post-emergency.

Not enough data

Incident Mapping

Visualize incidents and emergencies on grids to identify any trends.

Not enough data

Post-Event Analysis

Generates reports and insights after each event to assess response efficiency and compliance, and identify areas for improvement.

Not enough data

Cost Management

Tracks the cost related to training, resource and asset usage, and overall incident response.

Not enough data

Document Sharing

Supports release of reports and documentation for post-emergency compliance or notification purposes.

Not enough data

Generative AI

AI Text Generation

Allows users to generate text based on a text prompt.

Not enough data

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data