JTOL Limited

GeoTime

Desktop or Cloud based solution for importing communications (CDR) data, ANPR, Phone downloads (XRY, UFED) etc into a single data analysis solution that visualises the data in a unique 3D Map format for fast analysis whilst offering many automated tools e,g, Proximity (co-Location) quick summaries and full PPT ready reports.

Features

  • 3D Geospatial Visualisation
  • Import & Analysis of Communications Data Records
  • Import & Analysis of GPS, ANPR, Finance, Loyalty....
  • Import & Analysis of any Time, Date, Positional Data
  • Linked Network Charts & Activity Matrix
  • Reporting and Annotation
  • Video capture, replay and export
  • Pattern Tools (Meeting Finder, Active Site...)
  • Export Full Report, Screen Capture's and Video Direct to PPT
  • Rapid TimeLine explorer

Benefits

  • Rapid import of data
  • Enhanced productivity & data analysis through 3D visualisation
  • Enhanced productivity through automatic pattern analysis tools
  • Single tool for Import, analysis, reporting and exporting to PPT
  • Full workflow for GeoSpatial Analysis (Data entry to court presentation)
  • Bulk CDR Data import

Pricing

£3960 per licence

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

3 8 5 8 0 1 3 8 2 9 2 2 2 7 1

Contact

JTOL Limited

Duanne Watkins

07785500325

duanne@jtol.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Hardware Specifications should be reviewed.
System requirements
User Licenses

User support

Email or online ticketing support
Email or online ticketing
Support response times
Mon-Fri, Email Support question response time <4hrs :
Weekend, Email Support question , best effort.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Baseline Support (Included in License Costs)
Telephone Support: 09:00 to 17:00 (UTC) Monday - Friday
○ Calls received outside of support hours are first forwarded to available support team members, followed by a backup answer phone service.
● Email Support: 09:00 to 17:00 (UTC) Monday - Friday
○ Emails received outside of support hours will be collected, however no action can be guaranteed until the next working day.
Support available to third parties
No

Onboarding and offboarding

Getting started
Onsite Training, Webinar Training and Documentation
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
On Premise installation data is continueably accessible.
End-of-contract process
Perpetual License. Maintenance renewal required for further Software Updates, Upgrades and Map Refreshes.

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
Backend IT monitor resource usage and manage compute resources via virtual systems

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Uncharted Software Inc. (Canada)

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Export to local client, system or shared drive as CSV, Excel, PDF or HTML
Data export formats
  • CSV
  • Other
Other data export formats
  • Proprietary OGB Format
  • Excel
  • HTML
  • PowerPoint
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel (XLS, XLSX)
  • KML, KMZ, XML, Exif, JPG, TIFF, Shp, Gpx, Txt

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA availability on request
Approach to resilience
Available on Request
Outage reporting
Email from IT Support

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Not required
Access restriction testing frequency
Never
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Internal Security Officer
Information security policies and processes
As an SME VAR, all data is validated by either the MD or a Director for its sensitivity and secured appropriatley, either online in a cloud storage or if deemed sensitive as per UK GPM is stored offline and held in locked storage.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Application issues (feature requests, bugs) are managed in a database, issues are assessed for priority and risk. In priority order they are addressed and validated by our QA department. There are no specific flags for the vulnerability nor are there monitoring processes involved.
Vulnerability management type
Undisclosed
Vulnerability management approach
Not Known
Protective monitoring type
Undisclosed
Protective monitoring approach
Not Known
Incident management type
Undisclosed
Incident management approach
Not Known

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£3960 per licence
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
For a designated period the Full Software package, plus training and support will be made available to enable the user to assess the effectiveness of the software.

Service documents

Return to top ↑