Motorola Solutions UK Limited

CommandCentral Aware

CommandCentral Aware provides a common operational picture through the real-time aggregation, correlation and analysis of systems and disparate data sources including CAD, records systems, video feeds, local and/or national public safety related data sources, social media, asset and resource information, radio console connectivity.

Features

  • Real-time common operating picture to increase situational awareness
  • Geospatial mapping
  • Synopsis of fixed/mobile streaming video sources
  • Streamlined, intuitive management of data and multimedia from disparate systems
  • Unified voice and data collaboration. User-centric workflow and automation.
  • Mapping showing location of all resources and events
  • Video panel showing live&recorded video from all connected cameras
  • Monitoring tables showing all alarms and events coming into system

Benefits

  • Enables real-time data management for faster analysis
  • Improves threat detection and alerting
  • Intuitive management of data and multimedia from disparate systems
  • Ensures unified voice and data collaboration
  • Improves visibility of current events and resources
  • Enables live video without sacrificing other on-screen information
  • Easy visibility of all incoming alarms and events

Pricing

£16000 per licence per year

Service documents

G-Cloud 10

135277259971626

Motorola Solutions UK Limited

Andy Glover

07736636880

andy.glover@motorolasolutions.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No
System requirements
  • Accessed by web browser on suitable desktop computer
  • Flash enabled – Video content is viewed using Adobe Flash

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard support is included with the service. Users may raise a case 24/7 via helpdesk. Customers may also contact their Business Relationship Manager. Resolver groups for faults 24/7. Resolver groups for changes and requests Mon - Fri 9-5. Response target within 2 working days.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels Standard support is included with the service. Users may raise a case 24/7 via helpdesk. Customers may also contact their Business Relationship Manager. Resolver groups for faults 24/7. Resolver groups for changes and requests Mon - Fri 9-5. Response target within 2 working days.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Welcome pack and technical onboarding support. Training as required.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data can be extracted and/or deleted at the end of the contract as defined in the Offboarding process.
End-of-contract process At the end of the contract, should the Customer decide to discontinue use of the Service, the Supplier will support the Customer in extracting their data for an agreed period. If the data is not extracted within the agreed Off boarding period, it will be deleted.

Using the service

Using the service
Web browser interface Yes
Supported browsers Chrome
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Not applicable
Accessibility testing Not applicable
API Yes
What users can and can't do using the API Integrate 3rd party systems to allow ingress of video, audio, alerts and other data.
API documentation No
API sandbox or test environment No
Customisation available Yes
Description of customisation By choosing the systems they wish to connect with CommandCentral Aware. I.e. which surveillance system, which facial ID software etc.

Scaling

Scaling
Independence of resources Our architecture is dynamically scalabe and continuously monitored to assure that the service is unaffected by variances in demand.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach A specific user interface feature is provided to extract data from CommandCentral Aware. Bulk data export can be provided and supported by Motorola at additional cost.
Data export formats Other
Other data export formats
  • AVI
  • Metadata
  • CAD data
  • Data sourced from other systems
Data import formats Other
Other data import formats Dependent on connectors and data format requirements.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Commercially reasonable efforts will be made to ensure monthly availability of 99.9%. This is not guaranteed due to other components of the solution impacting availability.
Approach to resilience Our architecture consists of multiple instances of backend services with load balancing dynamically managing demand and resilience.
Outage reporting Email

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels Internal User Database or Active Directory Integration
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information No audit information available
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We have our own internal governance that supports the ISO/IEC 27001 standard
Information security policies and processes We have our own internal business and process security policies supporting the ISO/IEC 27001 standard

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configure, Audit, Validate, Report exceptions, investigate exceptions, resolve.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Identify vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls, monitor effectiveness of controls
Protective monitoring type Supplier-defined controls
Protective monitoring approach Collect events, look for pattern anomalies, report, manage through incident management
Incident management type Supplier-defined controls
Incident management approach Categorise, Prioritise, Triage, Diagnose, resolve, resolution and recovery, close incident

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Other

Pricing

Pricing
Price £16000 per licence per year
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑