PublicSonar (CrowdSense B.V.)


PublicSonar enables information managers, operators and responders to real time monitor the open internet and social media by gathering, processing and analysing and presenting available data. It has been designed to support in case of critical incidents, major events, emergency planning and response, public order and crime prevention.


  • Create complex searches in a user friendly manner
  • Unlimited number of searches simultaneously querying multiple open sources
  • Use of natural language semantic search engine, to reduce noise
  • Location searches on both terms & geo-tags
  • Repository with pre-build and adjustable searches on relevant topics
  • Sentiment and emotion detection
  • Dashboards, reports & alerts
  • Overviews of messages, posts, pictures, video and locations (map view)
  • AI: Automated word suggestions / summarisation, entity recognition
  • Language detecting reduces false positive


  • Real time insights as events progress: early warnings
  • Adds context to incidents and events
  • Easy to set up new searches with the expandable repository
  • Relevant sources and type of connections
  • Complex algorithms resulting in completeness of data without data overload
  • Easily fulfill the continuously changing and evolving information need
  • Scalable architecture to adapt to the continuously changing playing field
  • NLP and advanced filtering to reduces false positives
  • Unlimited number of accounts to support your entire organisation
  • Built-in compliance controls


£13,500 to £31,500 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 2 7 3 2 6 7 1 0 5 9 9 8 4 3


PublicSonar (CrowdSense B.V.) Sjors van den Dries
Telephone: +31628558285

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
  • Internet connection must be present
  • Supported browser must be installed

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 60 minutes, during office hours
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Onsite support
Support levels
In tool support (ZenDesk) 24/7.
Mail and phone support during office hours.
P1 support: 24/7 (in case of unavailability of the service)

Support levels are included in the contract.
Support available to third parties

Onboarding and offboarding

Getting started
PublicSonar provides onsite training, online training through webinars and documentation.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • MS Word
  • MS Excel
End-of-contract data extraction
Information can be retrieved at any moment via an API or via csv export depending on the type of data which needs to be extracted.
End-of-contract process
At the end of the contract user access is revoked. Unless the contract is renewed.
Data and searches can be exported with standard functionalities. This is all included in the price.
Client data will be deleted at the end of the contract.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Application has been designed using responsive design methodology. This means that the application offers the same functionality on both mobile and desktop, but will change to an alternative interface to be mobile friendly if used on a mobile device.
Service interface
Description of service interface
PublicSonar is offering a web interface through which the users can create new searches, review collected messages, images, video's, locations and analyse the data.
The searches can be created without any programming knowledge in a user friendly way. AI is used to help users, automate tasks, prevent mistakes and optimise results.
Accessibility standards
None or don’t know
Description of accessibility
While CrowdSense do not have its PublicSonar application specifically tested for accessibility standards, a special focus is always put on the simplicity of the interface.
Accessibility testing
We haven't performed any specific testing with users of assistive technology. Modifications of the interface could be implemented based on customer’s request.
What users can and can't do using the API
Interface relies on REST API methodology.
API allows users to collect the messages related to their monitors (information collections) by search, sources or cases.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Users can add sources to their environment. They can include these new sources in searches they perform and filter and use the information. Sources can be rss-feeds, social media platforms, websites, forums, et cetera.
Users can create dashboards and reports, they can add multiple cases.
Users can create and add building blocks. They can can add words to ignore, et cetera.


Independence of resources
Application is built on a microservice architecture and is relying on auto-scaling capability to guarantee a satisfactory user experience.


Service usage metrics
Metrics types
Such metrics are not available in a dashboard but specific needs can be reviewed
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
According to ISO 27001 standards
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
PublicSonar allows user to export messages collected in their monitors.
The feature is accessible in the service/user interface
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Guaranteed availability is 99,5%.
Refunds are SLA / contract specific
Approach to resilience
PublicSonar application is based on micro-service architecture and high-availability services. It relies on the deployment of several instances of any critical services in different geographical area.
Outage reporting
Outage are announced in PublicSonar application via a system of banner.
Severe outage are also communicated via email.

Identity and authentication

User authentication needed
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
VPN is managed by our cloud provider. VPN access can only be requested by our DevOps team.
Access rights to VPN are reviewed every quarter and approved by the technical lead.

Username/Password are managed by the development lead.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Standards Institution (BSI Group)
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Everything needed is covered
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information security refers to the technology, practices and processes used by organisations to keep the information they hold secure. While it is impossible to protect data without strong information security, it is nonetheless a distinct discipline for which the most important provision is the International Standard ISO 27001. Both the PublicSonar service and any subsidiary service provider that we use are certified compliant with this Standard, and we exceed the standard in relevant areas.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
PublicSonar relies on an internal software development lifecycle (SDLC) based on SCRUM methodology. Any changes are discussed in a team session to evaluate the impact. Then the company uses a software called Jira to track component impact.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
PublicSonar is hosted in the cloud. Patching of different components is managed by our supplier
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We identify potential compromises through various channels, including:
• Security news in which security leaks are made known.
• Notifications via Responsible Disclosure
• Internal security checks, both manually and by means of software
• Penetration tests

The steps we go through with a potential compromise:
1. Activate incident response team
2. Identification incident
3. Limiting damage
4. Determine cause
5. Impact analysis
6. Classification incident
7. Scaling incident response team
8. Drafting incident reports
9. Client communication
10. Data supplier notification
11. Recover
12. Evaluation and follow-up actions

The reaction time depends on specific contract / SLA.
Incident management type
Supplier-defined controls
Incident management approach
We follow the standard that is part of the ISO27001 Standards. We have procedures and policies in place. These are in line with GDPR legislation and the Data Protection Act 2018.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£13,500 to £31,500 an instance a year
Discount for educational organisations
Free trial available
Description of free trial
The free trial only has limitations in the amount of users/departments that can access the software. There are no limitations as far as functionality is concerned.
Included is initial set up, support of max 10 hours.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.