USMART is a next generation scalable data sharing, analytics and visualisation platform for reference, batch, real-time and big data:
- Data Sharing - secure sharing, open data publication, data monetisation;
- Data Analytics - dataset matching, spatial and temporal analytics
- Data Visualisation - maps, dashboards, interactive.
- Open data publication
- Secure data sharing and repository
- Data monetisation
- Data matching services
- Spatial and Temporal Analytics
- Scalable for any size of data set
- Data visualistion (graphs and maps)
- Automatically generated data APIs
- CKAN scraping & CKAN federation functionality
- Data consumer community (developers and data scientists)
- Generate value from data by secure sharing and open data
- Unlock innovation to solve your problems and deliver benefits
- Engage and collaborate with communities to give improve their areas
- Improve dataset accuracy through dataset matching and machine learning
- Understand the impact of interventions through spatial and temporal analytics
- Improve organisational perception by exceeding transparency and data sharing targets
- Provide real-time insight on service performance
- Turn your data into a revenue generating stream
£0 to £3000 per instance per month
- Education pricing available
- Free trial available
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
24 hours during business hours
Next business day at weekends
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||
We are using a solution provided by a third party (Slack).
Slack is committed to improving accessibility of their product.
|Web chat accessibility testing||We are using a solution provided by a third party (Slack). No web chat testing with assistive technology users was carried out by UrbanTide.|
|Onsite support||Yes, at extra cost|
Day-to-day USMART product support is already included in SaaS subscription pricing.
Additional services supporting open data, data sharing, data analytics and data visualisations are costed in the rate card.
|Support available to third parties||Yes|
Onboarding and offboarding
Onsite training (non-chargeable)
Onsite training (chargeable)
Train the trainer training (chargeable and non-chargeable)
User community on Slack
|End-of-contract data extraction||
Email or phone to request cancellation of subscription.
Data will be provided in open formats and made available for download.
All metadata is available through the DCAT endpoint for consumption by any relevant service allowing for easy migration from USMART to another solution.
|End-of-contract process||No additional cost.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||No differences. USMART is fully responsive allowing the service to be accessed on any device type.|
|Accessibility standards||WCAG 2.0 AA or EN 301 549|
Primary interface testing has been from proprietary data software management solutions providing data to USMART via both "push" and "pull" solutions.
API PUSH – This is effectively a web socket solution. A user can configure a dataset to allow publication into the dataset via a web socket connection. It is also possible to increase security by providing an API key and secret to only allow publication into the dataset if those credentials are used.
REST API PULL – this option can be selected but we do not have the option to configure the request frequency.
File Transfer Protocol PUSH – similar to the PUSH API a dedicated key and secret is provided to allow data to be systematically pushed into USMART.
File Transfer Protocol PULL – we are using this option to ingest data from our clients' data providers.
|What users can and can't do using the API||All functionality is available though our API.|
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||Yes|
|Independence of resources||
Our product is based on independently scalable microservices. We monitor load on each service and scale it accordingly.
Our storage endpoints are based on a data lake architecture, providing unlimited storage capabilities.
Our processing services are also fully scaleable.
User interface files are delivered via a CDN.
|Service usage metrics||Yes|
System management activity
Data entry activity
Data consumption activity
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||No|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||System administrators can request data extracts via email or phone.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||We can provide SLAs for 99.9% availability (excluding agreed maintenance). Users can request a refund for periods of no service if we do not meet this level of availability.|
|Approach to resilience||Available on request.|
|Outage reporting||Public dashboard.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||User permissions control which areas of the application can be accessed by specific users. Support channels are also controlled via user accounts.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
We are using an information security risk management methodology and our security strategy is explicitly linked with business and IT
Our security policies address each aspect of strategy, control and regulation and we monitor our processes to ensure compliance.
We continuously evaluate and update our security policies,
standards, procedures and risks assessments.
|Information security policies and processes||Security issues have to be reported to the Chief Technology Officer who is in charge of organisational information security.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Change is managed through our integrated software release management process which includes testing of all changes before deployment to the production system. This process also manages the tracking of software versions which allows us to control what versions are released at any point in time.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||We monitor whether any of the components used in our solution have vulnerabilities and are able to patch vulnerabilities as soon as they occur. We can do this as part of our automated continous deployment process without incurring downtime for the users.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||We are monitoring and tracking access to our services and their performance. Once suspicious activity is identified we can suspend affected services to investigate the cause of the issue. We will inform affected clients if services are compromised and keep them up-to-date with our efforts to remedy the situation.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Incidents should be reported via our online support pages. Updates to incident reports are provided via email as soon as an incident status changes. Users can track the status of their reports via their online support account.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£0 to £3000 per instance per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
We offer a FREE subscription plan which provides basic data sharing and visualization functionality for up to three users.
You can also request a trial our PLUS subscription plan for 1 month which additionally includes unlimited data publishers, data APIs, map visualisation, data conversion and data stories.
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|