Crimson - Investigation Management
Crimson is an efficient and intuitive investigation management system designed to streamline the management of incidents, intelligence, investigations and general records management. It delivers an intelligent secure database for any type of organisation. From complex investigations to straightforward lower level crime management, Crimson supports every stage of the investigative process.
- Incident, intelligence and record management system with intelligent secure database
- Investigation module manages Actions, Statements, Exhibits, Investigation log and more
- Case preparation, disclosure capabilities and court bundles
- Management Information and Dashboard features gives overviews of investigative activities
- Search facility provides easy access to all information, including scanned-documents
- Ability to attach documents including video and audio files
- The ability to create forms bespoke to the organisation
- Ability to create an event timeline and visual link chart
- Integration with e-mail for the electronic allocation of tasks/actions
- Optional Crime-in-Action module to manage time-critical and fast-paced incidents
- Instantly share valuable intelligence and data
- Effective way to identify links between sources of information
- Ability to create/export case files, creating a disclosure schedule
- Ability to create case files and court bundles
- Multiple agencies can use the same database, flagging cross-border crime
- MIS allows users to identify and analyse trends
- Attachment of external documents can be stored and amalgamated centrally
- Bespoke forms used to capture information specific to organisation requirements
- Search facilities provide access to all information, including scanned documentation
- Visual link chart and timeline features allow for easy interrogation
£50 per person per month
1 7 0 8 3 3 8 4 5 5 8 4 4 5 3
WPC Software Ltd
0117 908 1484
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Crimson - Investigation Management is offered as Cloud software with WPC Software collaborating with UKCloud to provide cloud-based delivery of the Crimson software. An outline of the standard offering is outlined in the Service Description.|
|System requirements||Up to date, modern browser (e.g. IE11 or above)|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Support is available 8:30am to 5:30pm Monday to Friday excluding English Public Holidays. Responses are provided in line with our SLA with all queries responded to within a maximum of 4 hours. Major and Critical issues should be reported by telephone to the Service Desk to ensure a timely response.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
WPC Software operates a standard support level which is fully outlined within our Support Issue Management Process (which is available upon request).
This document provides an outline of our incident management process including escalation points; roles and responsibilities; Incident Categorisation, Target Times, Prioritisation and Escalation; and Service Levels.
WPC Software operate a Service Desk between 08:30 to 17:30 Monday to Friday excluding English bank holidays. WPC Software has its own in-house written Service Desk management toolset which is used to log, monitor and manage Incidents and Service Requests through to resolution and closure. Each customer is assigned a dedicated Business Manager.
A brief summary of our standard support target times are:
Critical (system unavailable to users); 4 working hours to respond and fix.
Major (many users affected but limited impact); 4 working hours to respond; 8 working hours to fix.
Minor (few users affected with little impact); 8 working hours to respond; 2 working days to fix
Cosmetic (no impact on functionality); 2 working days to respond; Next release or earlier by agreement to fix.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||As part of the set-up process WPC will work closely with the customer to customise and set-up the solution to fit your working practices. This is normally in the form of a kick-off meeting, followed by a period of system configuration. This is normally included as standard as part of our implementation package. In addition to the system configuration, we normally offer a "train-the-trainer" course for up to 8 people, although this can be customised depending on individual customer requirements. We also offer a full set of user documentation including training and administration guides as part of our standard implementation package.|
|End-of-contract data extraction||WPC is committed to working with the user and providing a complete data extract of all data upon termination of the contract.|
|End-of-contract process||The provision of data back to the customer at the end of the contract is included in the basic pricing and licensing offered with the solution.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The application is a mobile-friendly solution that has been designed to work on a desktop and a variety of mobile devices.|
|Description of service interface||The solution is delivered as a web-based solution, through a browser.|
|Accessibility standards||WCAG 2.1 AAA|
|Accessibility testing||Testing is conducted in line with WPC's Testing Procedure and working directly with client where required.|
|Description of customisation||There is a large element of customisation available within the Crimson solution. Customisation of Crimson is done through the front-end by a User with suitable permissions. Some of the customisable options within Crimson include User Groups, Log Type, Form Type, Investigation Type, Investigation Outcome and many more.|
|Independence of resources||
The standard Crimson Cloud Software is offered as a multi-tenanted server environment within UKCloud. Separation between customers is ensured with completely individual databases dedicated to the customer along with dedicated credentials. Demand on the service is carefully monitored with additional multi-tenanted environments created to guarantee users are not affected by other usage.
If a multi-tenanted environment is not acceptable, then we can provide a completely dedicated/separate environment for customers, although this is not part of our standard offering.
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Other data at rest protection approach||We can also offer transparent database encryption.|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Data can be exported from the application in a variety of formats depending on user access and privileges. Data can be exported via document templates (MS Word) or via an export to CSV.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Crimson as cloud software is delivered through the UKCloud platform, as part of their Standard service level which offers 99.95% availability. Availability indication based on an average 730 hours per month. Excludes planned & emergency maintenance. Unavailability applies to existing VMs where the VM becomes unresponsive due to a fault recognised at the hypervisor layer or lower:
• i.e. fault is not within the Consumers control (OS, Applications, user networks).
• Fault is within UKCloud controlled components such as the virtual infrastructure, storage, power and physical firewalls & routers etc.
• External connectivity providers (e.g. internet, PSN, GSi) and components collocated at UKCloud are also not included in the availability calculation.
|Approach to resilience||
WPC Software utilise UKCloud as our data centre partner, and definitions on the data centre resiliency is available through their own service definitions and assurance documentation. WPC can provide this upon request.
In addition, to the data centre assurance information on resiliency, a range of back-up and restore facilities can be offered. As standard, Crimson is provided with a Daily VM snapshot for backup, and is stored for 14 days. An additional daily back-up facility is also provided whereby a scripted database back-up is taken to a secondary physical location in a sister-data centre (again with UKCloud). This ensures services can be resumed within a short space of time, with minimal loss of data.
|Outage reporting||UKCloud report outages through an online dashboard. This is managed by WPC Software as part of the service offering by WPC Software, with any interruption to the software service notified to customers at the earliest available opportunity by email.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Access to the solution is limited to named members of staff who are all vetted to NPPV Level 3, and only have restricted access for maintenance of the system.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||24/07/2019|
|What the ISO/IEC 27001 doesn’t cover||N/A|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials Plus Certification (renewed annually)|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
WPC Software has a robust Information Security Management System in place, which is in line with ISO27001, and are in the process of achieving certification.
Our service is hosted through UKCloud, who provide the data centre and infrastructure for the SaaS we offer. UKCloud are fully accredited to ISO27001.
|Information security policies and processes||WPC Software has a comprehensive Information Security Manual, which it is very difficult to summarise within the word limit. Although not yet formally accredited to ISO27001, the Information Security Management System that WPC adopts is very much built around this framework. UKCloud were carefully selected as our hosting partner due to their comprehensive policies detailing information security in line with ISO27001. A copy of our Information Security Manual can be made available upon request.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
The status, location and configuration of service components are fully tracked through their lifetime. A Configuration Management Database (CMDB) is maintained through a combined process of automated and manual discoveries, ongoing monitoring and updates, and physical validation by asset protection. UKCloud’s effective management of assets has been evidenced during external assessments of UKCloud’s ISO20000 and ISO27001 certifications, undertaken by LRQA.
Additional information on Configuration and Change Management can be provided by WPC Software upon request and in consultation with UKCloud.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
The service is protected by a dual-approach to vulnerability management through both the application and processes deployed through our data centre partner UKCloud.
All solutions are regularly tested for security flaws and subject to regular penetration tests through internal testing and customer-provisioned independent audits. Internally, we make use of the Burp Penetration Test suite and Nessus scanner.
UKCloud uses Shavlik software to identify and deploy newly issued or missing software patches, and Nessus to identify vulnerabilities which are identified within associated networks. All operating system and patches are tested within a controlled environment prior to being released onto operational platforms.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||UKCloud’s Assured Platform is protected by a GPG13 aligned protective monitoring system, provided externally by QinetiQ and subject to formal DSAS accreditation on an annual basis. This monitors and alerts on the twelve control areas documented within GPG13 (PMC1-12) at the DETER Level, and includes the production and retention of user activity logs to support monitoring, incident identification, response and investigative activities. It also includes activities related to the formal notification to the relevant authorities (e.g. CESG, GovCERT etc.) as appropriate.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
WPC Software and UKCloud have formal policies and procedures for incident management activities, including specific activities for identifying, remediating and resolving security incidents.
All incidents should be reported by a customer to WPC, who will work with UKCloud through their Incident Management Policy. WPC's and UKCloud's documentation provide clear definitions of an incident. Any such reports received are logged through our comprehensive incident recording system and immediately forwarded to the relevant team for analysis and determination of an appropriate course of action. Customers are kept informed via email and telephone as described within our policy documentation and procedures.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£50 per person per month|
|Discount for educational organisations||No|
|Free trial available||No|