ADS helps you save time, money & resources in your management and use of Ordnance Survey PSMA data including OS MasterMap, ITN and VectorMap Local. ADS provides a cost effective and resource free alternative to translating, storing, updating and serving base mapping data to internal and public users.
- OS PSMA data as Web Services for base mapping
- Includes OS MasterMap, ITN and VectorMap Local
- Translation, storage, updating and serving of base mapping data
- Base mapping for use within web mapping and desktop GIS
- Syndicated OpenData from Edubase, NHS Choices and Police.co.uk
- Optional Vector Data Download Service
- Download MapInfo TAB (styled), ESRI Shape or PostgreSQL (pgdump) file
- National Coverage
- Quarterly updates (where OS data available)
- Save time and money in management of OS PSMA data
- Removing need for customer to load data locally
- Removing need for software to translate data locally
- Removing need to maintain software to translate data
- Removing need for officer time to translate data
- Removing need for significant server processing time for larger areas
- Removing need for lengthy translation processes for larger areas
- Serve base mapping data to internal and public users
- Regular Updates (Quarterly where available)
£1500 to £6000 per unit per year
- Education pricing available
- Free trial available
Astun Technology Ltd
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Most planned maintenance will be undertaken without interrupting service availability however in the event that this is not possible downtime will be scheduled and agreed with the customer in advance.|
|System requirements||OS PSMA Membership or equivalent for OS Premium Service|
|Email or online ticketing support||Email or online ticketing|
|Support response times||The support desk is available during normal business hours (Monday to Friday 8.30am to 5.30pm).|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||First line support is provided via a permanently staffed Service Desk with second and third line support by consultancy and development teams for fault diagnosis and resolution. Customer access to web based Service Desk provides real time ticket management and correspondence on all customer tickets.|
|Support available to third parties||Yes|
Onboarding and offboarding
Customers will be provided with organisation specific service URL’s within 2 working days of ordering processes being completed.
No training is required to use Astun Data Services which are delivered by OGC standards compliant protocols.
Support is available in configuring WMS and WFS clients during normal office hours.
|End-of-contract data extraction||Not applicable|
The customer access to the services is removed.
Any further "Off-boarding" assistance is chargeable in accordance with Astun's SFIA rate card.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||None|
|Accessibility standards||WCAG 2.0 AA or EN 301 549|
Astun Technology is committed to making its solutions as accessible as possible to users with visual, hearing, motor or cognitive impairments. All public facing elements of the service comply with Web Content Accessibility Guidelines (WCAG) 2.0, at level AA (with an obvious caveat for map images).
Testing: We test our software against text browsers (screen readers) such as Lynx - (My Nearest).
Note: iShare web accessibility benefits have been mentioned in various publications including a commendation in the British Standards Institute book - “Web Accessibility – making PAS 78 work”
|What users can and can't do using the API||ADS is delivered by OGC compliant protocols|
|API documentation formats||
|API sandbox or test environment||No|
|Independence of resources||Resource monitoring of the service.|
|Service usage metrics||Yes|
|Metrics types||Customers can obtain metrics from Support.|
|Reporting types||Reports on request|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Not applicable|
|Data export formats||Other|
|Other data export formats||
|Data import formats||Other|
|Other data import formats||Not applicable|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
ADS is hosted on a high availability cloud infrastructure with a failover backup hosted in a different geographic region for maximum resilience.
Internal availability testing indicates availability in excess of 99.6%
Response times for map rendering are typically less than 1 second at the server.
The services are continually monitored with automated messages sent to several staff in the event of a deterioration or failure.
|Approach to resilience||
ADS is hosted within the Amazon Elastic Compute Cloud (Amazon EC2).
The entire cloud environment is backed up to a second geographic availability zone to provide additional resilience in the unlikely event that the primary availability zone becomes unavailable.
Astun set up a series of alarms to monitor the customer's cloud service. These alarms are triggered if any pre-set limits to system resources are reached (e.g. disk space). This enables Astun to address the majority of issues before any potential outage.
We also use our GeoHealth check system to monitor servers and ensure they are up and working.
The customer is informed of any potential problems by email or phone.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Access to management interfaces are restricted to login in via remote desktop over a dedicated VPN between customer network estate and the virtual private cloud environment dedicated to the customer. Access by Astun is also over VPN.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||No|
|Security governance approach||We are currently working towards ISO 27001.|
|Information security policies and processes||We are currently working towards ISO 27001. Operational customer data is stored or processed within iShare in the Cloud. Information assurance accreditation has not yet been sought for iShare in the Cloud, however we consider that iShare in the Cloud would be classified as BIL0 or BIL1, users should make appropriate decisions regarding what data to deploy within iShare in the Cloud. Integration with back office systems can support the dynamic spatialisation of data sets that are not hosted within the iShare SDW for added security.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Changes to all components are managed and tracked through their lifetime via a centralised bug-tracking, issue-tracking and project-management software application (JIRA) and associated private code repository (BitBucket) managed under source control. The software is built through a repeatable build process and after passing formally defined test cases is tagged to a specific version number at the point of release. Only released software is deployed to the customer virtual private cloud environments. Potential security impacts are assessed via a process of peer review.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Information on potential treats is continuously assessed through review of key online resources (release notes, security articles etc) for all third party components (operating systems, databases, frameworks etc). Penetration testing of the full system (including Astun components) is undertaken by independent third parties on all significant software releases. Whilst patch releases are routinely issued on a monthly basis, key security vulnerabilities are patched and released as soon as Astun become aware of them, irrespective of the stage in the release cycle.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||All cloud servers are set up with alarms that monitor key system resources on the server itself allowing the detection of compromises such as denial of service attacks. In addition external monitoring services are set up to make routine periodic requests to the servers (typically every 15 mins), to check that they remain responsive, and send out alerts if any servers are unavailable. Incidents are responded to as soon as we become aware of them. Logging is enabled on the servers to provide an audit trail of potential compromises for subsequent investigation.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Security related incidents are categorised as a Priority 1 within our Service Desk system, and allocated to third line support personnel (developer) for immediate investigation and resolution. Users are able to report such incidents via the Service Desk (phone, email and web form), which is routinely monitored throughout the working day by first line support staff. Contemporaneous notes are taken during the incident and recorded against the service desk ticket, which provides a detailed report of the incident itself. Key performance indicators are also published from the Service Desk System and routinely reviewed by management on a weekly basis.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£1500 to £6000 per unit per year|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
The scope of the trial will be by agreement.
The customer may be required to pay for the services required to set up the trial.
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|