evacuation management & emergency roll-call

Robust evacuation management and emergency roll-calls, even if your electricity or network has failed.

Request Info

how can we help?

book demo
456

Looking for a Musterd demo?

Please fill the form below and we'll get in touch.

nobody left behind.


Musterd
Sweep & Clear

An evacuation management system for sites

without access control, Musterd Sweep & Clear

helps ensure safety during an emergency.

or


Musterd
For Access Control

Musterd keeps in touch with your access

control system and helps you locate your

personnel when the alarm goes off.

nobody left behind.


Musterd
Sweep & Clear

An evacuation management system for sites without access control,
Musterd Sweep & Clear helps ensure safety during an emergency.

or


Musterd
For Access Control

Musterd keeps in touch with your access control system and helps
you locate your personnel when the alarm goes off.

what's musterd?

Musterd is an evacuation management and emergency roll call system. Using software, smartphone and cloud technology, Musterd ensures the safety of all personnel on a physical site during an emergency. Know who's where, when.

Musterd integrates with your access control system, so it stays informed about the up-to-date locations of all people on your site -- in real-time.
Musterd uses fast, secure communications to synchronize this data across a network of hand-held Musterd devices. In an emergency, any Musterd device can instantly produce a list of 'unsafe' people for roll-call, mustering and rescue operations – even if your access control system has been disabled.
Musterd operates across your whole site, and manages combined, real-time 'safe' and 'unsafe' lists of your personnel. If anyone hasn't reported for roll-call at a Musterd device, then Musterd tells you where they might be found
Questions? Check out our FAQ

musterd works on locations of all sizes

how musterd works in an emergency

When an emergency strikes, Musterd ensures the safety of your personnel. By giving safety teams a real-time view of site personnel location and safety status, Musterd tells you where your people are to be found, who's safe and who's not.

alarm

  • An alarm is raised - either manually or automatically - and a threat type is assigned
  • Fire marshals with hand-held Musterd devices move to muster points to initiate the evacuation and roll-call process

evacuate

  • Musterd directs safety crews and personnel towards safe muster points
  • Musterd combines access control and Musterd device data, to provide all safety crews with a live, up-to-date view of an evacuation in progress

safe

  • Personnel register with Musterd devices at safe muster points
  • Safe and unsafe lists are built and updated in real-time across multiple devices and muster points
  • A list of last-known locations of remaining unsafe personnel is immediately available to rescue crews

musterd in action

Musterd hand-held devices manage evacuations and roll-calls in real time, as an emergency unfolds.

Musterd works quietly in the background, while you focus on your business

how musterd is resilient

Musterd is built to survive. In an emergency, Musterd continues to work after the power fails, the network has crashed or the access control system has been disabled.

Musterd’s Cloud Support and real-time updates allow Musterd to “go it alone”, continuing to protect personnel by providing last known locations even when critical infrastructure is damaged
If WiFi fails, then Musterd automatically switches to the local GSM / Mobile Phone Network
Musterd hand-held devices remove the need for printed lists or network-dependent technology. Musterd works even when printers or other systems are jammed, disconnected or out of reach
Musterd works with many types of emergencies, and more than one simultaneously:

how musterd stays synchronized

Musterd doesn't sleep. Day and night, Musterd stays in touch with your access control, capturing the data it needs to build a complete picture of your personnel and where to find them.

Musterd is compatible with most Access Control Systems.

Musterd Cloud Servers provide real-time data on the whereabouts and movements of people across your site.

In an emergency or a drill, Musterd Hand-held devices put personnel location data in the hands of the Fire Marshals and Rescue Teams who need it.

access control synchronization

Musterd is compatible with most Access Control Systems.

musterd cloud integration

Musterd Cloud Servers provide real-time data on the whereabouts and movements of people across your site.

musterd hand-held devices

In an emergency or a drill, Musterd Hand-held devices put personnel location data in the hands of the Fire Marshals and Rescue Teams who need it.

everything else

Musterd is designed to enhance the safety of personnel on any site.

Musterd delivers real-time, dynamic safety information in an emergency

Musterd keeps working even if your access control, power or network is disabled

Unlike a paper roll-call list, Musterd works in the rain, and in the dark

Musterd separately tracks the locations of fire marshals, first aiders and other specialists

Musterd captures and reports fire drill performance. See who's taking safety seriously - and who isn't

Musterd replaces expensive, hard-wired fixed muster points

Musterd handles multiple threats simultaneously (e.g. a combined fire and gas leak emergency)

Musterd uses secure, encrypted communications, to keep your data safe and synchronized

Musterd is cloud-based, and can be hosted on Microsoft Azure or your private servers.

everything else

Musterd is designed to enhance the safety of personnel on any site.

Musterd delivers real-time, dynamic safety information in an emergency

Musterd keeps working even if your access control, power or network is disabled

Unlike a paper roll-call list, Musterd works in the rain, and in the dark

Musterd separately tracks the locations of fire marshals, first aiders and other specialists

Musterd captures and reports fire drill performance. See who's taking safety seriously - and who isn't

Musterd replaces expensive, hard-wired fixed muster points

Musterd handles multiple threats simultaneously (e.g. a combined fire and gas leak emergency)

Musterd uses secure, encrypted communications, to keep your data safe and synchronized

Musterd is cloud-based, and can be hosted on Microsoft Azure or your private servers.

what our clients say

Frankly – I love Thinking Software!

Lindsay Southward, Malmaison & Hotel du Vin

Printing roll call reports was slow and unreliable, especially in emergencies. Musterd seamlessly integrates with our access control system, and provides a reliable, cloud-based solution to our mustering problems.

I can’t speak highly enough of the team; we receive a level of “Service and Support” from Thinking Software which is exemplary, they’re in a league of their own.

Mandy Maxwell, Albert Bartletts

We’ve enjoyed working with Thinking Software – we would certainly recommend them – and we look forward to their help in meeting our needs as we expand Somerset Care.

Keith Crockett, Somerset Care

Over the years we have established strong links with named Thinking Software staff, some of whom have been with us since inception, the support staff at Thinking Software are always promptly available online and by phone to help

Steve Carthew, Crealy Adventure Park

We hadn’t anticipated all the planning problems we’d face, but lucky for us, the trainers and developers at Thinking Software stayed with us and solved the problems as they arose

William Brannan, Glasgow Science Centre

We love working with Thinking Software, and we wouldn’t hesitate to recommend them to any business looking to save time and money.

Heather Jones, Holiday Inn

frequently asked questions

What is Musterd?

Musterd is an Evacuation and Roll-Call System. It’s designed to help people assemble and stay safe in a Fire or other Emergency.

How does Musterd actually work?

Musterd watches your access control and knows where everybody is at any time. So if there’s an emergency, Musterd can improve your Roll-Call process and help you find anyone who’s missing.

How does Musterd stay synchronized with my access control system?

Musterd uses a small, read-only service component to watch your access control system and capture the events it needs to keep in step with the location of the personnel on your site.

How can musterd still work if my access control system is disabled by damage, loss of network or a power-failure?

If your site is suddenly disabled by loss of power or network, Musterd will know the locations of your personnel at the moment of failure. Musterd then "goes it alone", helping Fire Marshals and Rescue Teams to assemble your personnel and monitor their safety at your site's muster and assembly points.

How does Musterd make my personnel “safe” if they’ve forgotten their access control fobs?

Musterd has a Manual Make-Safe option to cover personnel who’ve lost or forgotten their access control fobs.

Is there an upper or lower limit on the number of personnel who can be covered by Musterd?

Musterd can operate in sites of any size.

What kind of site can be protected by Musterd?

Musterd is suitable for nearly any sort of site -- factories, offices, retail or service businesses, warehousing, production or distribution facilities -- in fact, any place in which a smartphone is safe for business use.

How much does Musterd cost?

The cost of a Musterd System is based on the number of people on your site, together with the number of Musterd-enabled, hand-held Devices you decide to deploy (the general rule is one Device per muster point).

Please contact us for a quick estimate of your cost to get Musterd into operation at your site.

frequently asked questions

What is Musterd?

Musterd is an Evacuation and Roll-Call System. It’s designed to help people assemble and stay safe in a Fire or other Emergency.

How does Musterd actually work?

Musterd watches your access control and knows where everybody is at any time. So if there’s an emergency, Musterd can improve your Roll-Call process and help you find anyone who’s missing.

How does Musterd stay synchronized with my access control system?

Musterd uses a small, read-only service component to watch your access control system and capture the events it needs to keep in step with the location of the personnel on your site.

How can musterd still work if my access control system is disabled by damage, loss of network or a power-failure?

If your site is suddenly disabled by loss of power or network, Musterd will know the locations of your personnel at the moment of failure. Musterd then "goes it alone", helping Fire Marshals and Rescue Teams to assemble your personnel and monitor their safety at your site's muster and assembly points.

How does Musterd make my personnel “safe” if they’ve forgotten their access control fobs?

Musterd has a Manual Make-Safe option to cover personnel who’ve lost or forgotten their access control fobs.

Is there an upper or lower limit on the number of personnel who can be covered by Musterd?

Musterd can operate in sites of any size.

What kind of site can be protected by Musterd?

Musterd is suitable for nearly any sort of site -- factories, offices, retail or service businesses, warehousing, production or distribution facilities -- in fact, any place in which a smartphone is safe for business use.

How much does Musterd cost?

The cost of a Musterd System is based on the number of people on your site, together with the number of Musterd-enabled, hand-held Devices you decide to deploy (the general rule is one Device per muster point).

Please contact us for a quick estimate of your cost to get Musterd into operation at your site.

Technical Specifications
+

1 Diagram

2Data flow

(based on the Diagram) and security of data This diagram represents the boundaries of a typical Site. A Musterd System is built on various on-Site and off-Site elements, including:  
  • An Access Control Server (ACS)
  • The Musterd Monitor Service (MMS)
  • The Local Area Network (LAN)
  • The Local WiFi Network (WIFI)
  • The Musterd Cloud Database (MCD)
  • One or more Mobile Devices (MDs)
  The Musterd Monitor Service (MMS) is a standard Windows Service, and is generally installed on the same hardware which hosts the Access Control Server (ACS). The MMS listens for "changes" on the ACS (by changes, we mean new Access Events, or alterations in Personnel Details or Access Control configuration). When the MMS senses change(s) in the ACS, it collects and pushes them into the Musterd Cloud Database (MCD), which is the SQL Server Database residing in the Microsoft Azure Cloud in the Diagram.  
  1. Communication between the ACS and the MMS uses either:
    • A Named Pipes connection if both the ACS and the MMS reside on the same PC, or
    • A TCP connection if the ACS and the MMS are connected via the LAN. This connection can be encrypted (TCP over SSL) if the ACS supports it. In the case of a SQL Server, this encryption is generally supported, and either a self-signed certificate or one from a Certificate Authority can be used to protect it.
  2. Communication between the MMS and the MCD is encrypted by a mandatory TCP over SSL connection directly to the database (encryption is imposed by Azure, which prevents unencrypted connections to its databases). There is also protection from the Azure SQL Server Firewall, with exceptions for the public IPs used by the MMS.
  3. While at rest in the MCD, Musterd's data is encrypted using “Transparent Data Encryption” (TDE).Azure SQL Database TDE helps increase security by performing real-time encryption and decryption of the database(together with its associated "at-rest" backups and transaction log files). TDE encryption employs a symmetric key called the Database Encryption Key (DEK). Within a SQL Database, the DEK is protected by a built-in server certificate (B-ISC). The B-ISC is unique for each SQL Database Server. If a database is in a GeoDR relationship, it is protected by a different DEK on each server. If two databases are connected to the same server, they share the same B-ISC. Microsoft automatically rotates these B-ISCs at least every 90 days. (For more about TDE, see the various Microsoft articles on this subject.)
  4. Each MCD authenticates using a different password, and these are encrypted using multilevel proprietary encryption.
  5. Connection between the MCS and the MCD is protected in the same way as the connection between the MMS and the MCD described above.
  6. Communication between the MCS and the Mobile Devices (MDs) relies on an internet connection provided by WIFI or GPRS, and travels across HTTPS secured by a 256-bit SSL Certificate issued by a Certificate Authority.
  7. Data stored on a Windows Embedded Mobile Device (WEMD) is encrypted using the AES128 algorithm and stored in the SQL Server Compact database. The decryption password is randomly generated on each device and stored using the Data Protection API (DPAPI). The DPAPI in turn protects the encrypted password from being moved off the device. The SHA-2 algorithm is used for device authentication, and additionally, the data on a WEMD can be wiped remotely.
  8. MDs authenticate to the MCS with a User Name and a Password. After the first authentication, the Password is invalidated and replaced by a JSON Web Token (JWT). The JWT is encrypted using DPAPI, digitally signed with a 256-bit key, and then stored on the particular mobile device for use as an authentication credential in subsequent communication. Each mobile device uses a different JWT, and any JWT can be revoked at any time.
 

3 Network Ports

  1. The MMS on site communicates with the MCD using port 1433. As it only sends data, no inbound ports need to be opened, only outbound.
  2. The MCS uses two endpoints:
      a. The OUTBOUND endpoint uses port 443.
      b. The INBOUND endpoint uses port 444.
      These are for communication between WEMDs and MCS only.

4 bandwidth requirements

Due to the nature and size of the data being transferred, Bandwidth usage is minimal. Data is densely packed by a proprietary serialisation technique, and the packet size is adjustable to accommodate for particular network conditions. This functionality has been tested with packet sizes between 512 bytes up to 64 KB. The default packet size is 16 KB, which means that one request will return with a quantity of data not greater than this. Musterd’s initial synchronisation with the ACS will require more bandwidth, but this is effectively a one-off operation. After synchronisation, only changes of relevant data in the ACS are transferred to the MCS, and this normal runtime operation uses very little bandwidth. For example, a single Access Event (one person’s swipe of a credential on an Access Control Reader) generates around 128 bytes of traffic. Access Events are responsible for 99% of communications traffic.
CLOSE
CLOSE