
Discover new insights
Learn
Find the perfect platform for your business
Standard
Fast, reliable job management for businesses specialising in urgent, reactive maintenance.
Premium
Take control of every job with live tracking, intelligent scheduling, and mobile management.
Enterprise
Optimise resource allocation, automate scheduling, ensure compliance, and maximise profitability.
Helping HVAC businesses grow
Playbook
Discover how forward-thinking businesses use smarter digital tools to stay ahead of rising costs, labour gaps, and compliance demands.
Download now
Future-proofing fire & safety
Playbook
Discover how to manage complex schedules, compliance targets, and improve team performance.
Download nowContract Management
Service Delivery
Finance Management
Field Engineers
Suggested features for
Contract Management
Suggested features for
Service Delivery
Suggested features for
Finance Management
Suggested features for
Field Engineer
Choose the right plan for your business
Pricing Plan
See how much you could save
ROI Calculator
Joblogic’s journey to creating the best software for our customers is far from over. We have been working hard to deliver significant improvements to the infrastructure. Since November 2017, multiple changes have been made to improve security and performance.
Take a look below at our visual representation of these server changes:
Prior to November 2017:
[Red actor shows what happens currently if the initial hypervisor is encountering problems, a redirection to the secondary hypervisor.]
New and Improved since December 2017:
As a result of these changes, you will notice the following benefits:
“In the event of a server failure users are moved to one of the three backup servers. This means that you can continue using Joblogic with minimal interruption.”
We are continuously working to improve our infrastructure. To achieve this, we will be increasing the number of databases to our system, which improves reliability. Moreover, we are working on a process called a ‘penetration test’. This is a test performed on a computer system which simulates an attack and evaluates the security of a system.
Read our guide on the extra security steps you and your field service business can take to stay safe.