CDR Group

Precisely Spectrum Spatial

Spectrum Spatial is the solution that gives you the power, control and flexibility to overcome key business challenges. Spectrum Spatial makes it easy to operationalize geospatial data for your unique needs. Integrate into workflow and customise experiences to drive more efficient decisions. Open data standards, interoperability and scalable, omnichannel visualisation.


  • Out-of-the-box usability. Provide a common tool for users.
  • Enrichment create data flows to enrich data and business processes
  • Mobile Compatible Access, update, visualize, anytime, anywhere, on any device.
  • Out of the box standard Web GIS functionality.
  • OGC Compliant API services, SOAP, REST or POST/GET requests
  • Open data standards. Export and import different formats including OGC
  • Embed spatial rules and logic within operational systems, custom workflows.
  • API enabled. System integration and design is quick
  • SSO Integration Use multi-level security manage access levels enterprise-wide
  • Development Tools Integrate with 3rd party applications.


  • Extends the expertise of the GIS Department across the organisation
  • Reduces duplication of effort for numerous overlapping projects.
  • Facilitates collaborative decision making.
  • Improves citizen/customer engagement.
  • Generate business insights through an easy-to-use web GIS application.
  • Spatially-enable business systems.
  • Rapid return on investment.
  • Ready for immediate use.
  • Built on service orientated architecture supporting OGC and web standards.
  • Enterprise Spatial Data Management create a Single Source of Truth


£18,000 to £120,000 a server a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

3 5 9 5 7 2 7 0 0 2 8 3 9 1 5


CDR Group John Ievers
Telephone: 01433 621282

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Planned maintenance is 6am-10am each Sunday.
System requirements
None required

User support

Email or online ticketing support
Email or online ticketing
Support response times
Graded accordingly and explained in the Support Handbook
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Maintenance is included in all Precisely software agreements and entitles you to the services, based on four maintenance levels, outlined in the Maintenance Service Matrix in the Software Support & Maintenance Handbook.
Support available to third parties

Onboarding and offboarding

Getting started
On site training and user documentation is provided by Precisely and CDR Group in partnership.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
On expiry of the contract, Precisely will return or delete all data to the customer, subject to the terms of the contract. Data is held in standard databases and repositories.
End-of-contract process
Spectrum Spatial will cease to operate beyond the licence expiration. Data remains unaffected and can be migrated by the client.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
No difference. Fully compliant with touch gestures whether on mobile or desktop. The interface adjusts automatically to the device screen size.
Service interface
Description of service interface
Users have access to the Map and Data interface as defined by the options available to Administrators of the application. Administrators have access to Spectrum Spatial Manager for the management of datasets in the repository, Spectrum Management Console to administer modules, security and users, and access to a Map Project Settings interface.
Accessibility standards
Accessibility testing
What users can and can't do using the API
Spectrum Spatial supports the application programming interface (API) specifications defined by the Open Geospatial Consortium and has been certified on the WMS 1.3, WFS 1.0 and CSW 2.0.2 specifications. Full API documentation available at
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
The Spectrum™ Platform includes a developer SDK for C, C++, JAVA, and .NET for integrating Spectrum web services (including custom designed data flows) into other applications. Spectrum Spatial’s Location Intelligence Module also provides a JavaScript SDK to help with mapping integration into custom web and mobile applications. The end user application, can be customised and extended with the Extensibility SDK, which allows web developers to write Angular modules on top of the Spectrum Spatial™ application.


Independence of resources
Precisely have in place its own internal procedures to ensure users are not affected by demand by other users. Using industry standard tools, Precisely are able to closely monitor activity across all of its services and load balance where appropriate.


Service usage metrics
Metrics types
Percentage availability

Reporting types
Regular reports


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is not loaded into the application. Data resides in your databases and Spectrum Spatial connects to it. Users can be assigned to be read only or read and write. Data queries can be exported as csv files if their role allows it. Geometries can be exported as kml if their role allows it.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
99.5% system availability
Approach to resilience
Available on request. We are supplying the application and not the server/service where it would be installed.
Outage reporting
Email alerts.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Spectrum Spatial Manager allows admin users to view and manage named resources such as MapInfo tab files, database connections, tables and views and manage web service configurations such as third-party tile maps in the repository. These resources could include tables, views, layers and maps.
Having a hierarchical view of this repository allows easy browsing and searching of resources.
Spectrum Spatial Manager also provides data security and user access security, meaning data and resources are only accessed by those that need and should be doing so. This may be restricting certain views to public or private use with a login required.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
This is accreditation for the data centre services provided by Telstra.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Precisely corporate policies and control framework are aligned with the ISO 27001 Information Security Program Management Standards. This includes pragmatic policies, procedures, standards and guidelines to support the information security requirements, with a focus on the most critical assets. This enables us to maximize efficiency and effectiveness by leveraging a common set of controls and policies to comply with many regulations.

Precisely information security policy framework includes documented policies, procedures, standards and guidelines to support our relevant information security requirements.

There are 2 separate teams; one for privacy and one for Information Security

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The servers are monitored through SSCM and all assets are maintained through a central inventory. The servers are scanned and patched for vulnerabilities periodically.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Scan is run on servers, once every month using Vulnerability Assessment tool. The vulnerabilities are identified, remediation for the identified vulnerabilities are completed within 30 days. All stakeholders are informed and the same change management process applies to the remediation process. There are various ways including the VA update and emails where we get inputs on potential threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
At the desktop Level, AVs are installed and updated which does real time monitoring on potential threats. At the network level, the traffic are regulated through firewall. We also have IDS which analyses traffic and whenever a potential attack is identified an automatic ticket is raised under security incident queue and get resolved based on the severity. The responses are provided based on the severity level.
Incident management type
Supplier-defined controls
Incident management approach
Multiple IDS devices are situated in the perimeter of the network which continuously monitor the inbound and outbound traffic. A 24x7 team monitors these incidents and provides real time solution. Timely escalations make sure all incidents are worked on priority and necessary patching or fixes are done following the change management process.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£18,000 to £120,000 a server a year
Discount for educational organisations
Free trial available
Description of free trial
Details provided upon request

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.