Our new product, Computer Operated Police Simulator (C.O.P.S), is being used to improve technical and non-technical skills for the UK Police. Our simulations combine the use of motion sensors, voice commands and gesture control to ensure that users become fully immersed in undertaking a specific activity.
- Virtual Reality
- Augmented Reality
- Immersive learning
- Speed of learning
- Return on investment
- Group training
£3000 to £4500 per unit per month
- Education pricing available
VR Simulation Systems Ltd
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||Only use of VR headsets which we can supply|
|Email or online ticketing support||Email or online ticketing|
|Support response times||1 hour 9-5 Mon - Fri|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||No|
|Onsite support||Onsite support|
Our support includes full bug fixes, hardware replacements and software updates our annual fee is normally 5% of contract value.
We have a dedicated QA lead and head of support.
We appoint technical account managers for each client.
|Support available to third parties||No|
Onboarding and offboarding
We provide initial full on site installation and training for each client.
We provide full user manuals and support if provided online as well
|End-of-contract data extraction||Data can automatically be extracted in the form of a PDF and saved onto a clients network|
|End-of-contract process||No additional costs are incurred at the end of a contract|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||No|
|Independence of resources||We manage each project with a dedicated account manager and a producer ensures sufficient resource has been allocated to each client. This is reviewed weekly.|
|Service usage metrics||Yes|
|Metrics types||Our software offers full user tracking for each training session delivered this is then presented in the form of a report|
|Reporting types||Regular reports|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with CSA CCM v3.0|
|Data sanitisation process||No|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Users are able to export their data directly from the software in the form of a PDF|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||We have a full SLA which meets the needs of our clients and offers guaranteed levels of availability.|
|Approach to resilience||Our service and datacentre supplier information is available on request|
|Outage reporting||Email alerts|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
Users can use the Restrict access settings to control the availability of learning materials based on any one or more of these condition(s). You may also combine the use of these conditions to add a set of nested restrictions to apply complex logic
Date (you can set from and until dates)
User progress for a previous assessed activity in the module
Group setting in the module
User Profile field
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We use external bodies to ensure our security meets the required standards|
|Information security policies and processes||
The following information security principles provide overarching governance for the security and
management of information at VRSS
1. Information should be classified according to an appropriate level of confidentiality, integrity
2. Staff with particular responsibilities for information) must
ensure the classification of that information; must handle that information in accordance
with its classification level; and must abide by any contractual requirements, policies,
procedures or systems for meeting those responsibilities.
3. All users covered by the scope of this policy must handle
information appropriately and in accordance with its classification level.
4. Information should be both secure and available to those with a legitimate need for access
in accordance with its classification level.
a. On this basis, access to information will be on the basis of least privilege and need to know.
5. Information will be protected against unauthorized access and processing in accordance with its classification level.
6. Breaches of this policy must be reported
7. Information security provision and the policies that guide it will be regularly reviewed,
8. Any explicit Information Security Management Systems (ISMSs) run within the business will be
appraised and adjusted through the principles of continuous improvement
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||VRSS develops, disseminates, and periodically reviews/updates: (i) a formal, documented, configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
We undertake independent testing of our service each month in order to test the vulnerability of the process.
We use third parties to test the vulnerability of the system.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||VRSS use third parties to test our security and identify potential threats|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Guidance has been improved in Incident Management on how to prioritize an Incident.
Additional steps have been added to Incident Resolution by 1st Level Support to explain that Incidents should be matched to existing Problems and Known Errors.
Incident Resolution by 1st Level Support and Incident Resolution by 2nd Level Support have been considerably expanded to provide clearer guidance on when to invoke Problem Management
The Incident Management sub-process Incident Closure and Evaluation now states more clearly that it is important to check whether there are new Problems, Workarounds or Known Errors that must be submitted to Problem Management.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£3000 to £4500 per unit per month|
|Discount for educational organisations||Yes|
|Free trial available||No|