Xenium Solutions Limited


mWebDB is a forms based solution that mobilises existing or new corporate database applications by enabling users to view, synchronize, edit and update SQL database information from mobile devices, laptop/desktops. Customised mobile solutions can be created in a point and click environment in a few short hours.


  • On line and off line functionality
  • Add a mobile layer without re-inventing processes or systems:
  • IT management and control with graphical management tools
  • Out of the office, but still connected
  • End-users control which records they synchronize to their device
  • Non-mobile users can same applications/data as the mobile users
  • Read access can be defined differently for each database table
  • User and Groups are defined once in SecSQL Directory database
  • View available in graphical, GPS mapping, photo and text
  • Operates on phone or tablet for iOS, Android and Windows


  • Provides security for row level to any SQL database/application
  • Application of SecSQL to an existing database
  • Limiting Create or Delete records or tables by user
  • Read or Update control applies across all database tables
  • Update can be defined differently for each database table
  • Can be applied at design stage or for existing databases/applications
  • Records can be synchronized across all mobile or desktop applications


£1250 to £1250 per user per year

Service documents

G-Cloud 10


Xenium Solutions Limited

Bruce Murchie



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints We are unaware of any constraints.
System requirements
  • For iOS devices either tablet or phone
  • For Android devices either tablet or phone
  • For Windows OS tablet or desktop
  • Operates with MS SQL Server any versions
  • Integrates with third party systems with api's
  • Support for web services

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We can provide a range of support from 9-5 Monday to Friday or extended daily support from 8-10 pm Monday to Friday or 24 x 7 support
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AAA
Web chat accessibility testing Can use any testing methodology that is supported by the force.
Onsite support Yes, at extra cost
Support levels Annual support and maintenance is charged in advanced for the year based on the number of users and covers system updates and product maintenance that covers upgrades to new operating system updates. We also work with our customer base to provide with two update product releases that add new features. this service is provided on a discounted cost basis above annual support and maintenance. All support is remote.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started A series of customer designed online training tools have been developed to assist new customers. As each customer operates under a difference set of business rules and models these can be used as a guide to establish a new customers training criteria.

In general there is little training that is required to use the application given that the existing user will have prior knowledge of how to use the desktop versions of the mobile applications.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Their data is not stored in our SaaS as all data that is entered in the mobile client is uploaded as soon as the user presses the send key given that they a have a mobile on-line connection. Data is only stored in the police forces databases and not as stated in the SaaS.
End-of-contract process There are no additional costs for end of service.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The same functionality is provided on both desktop and mobile device be that a smartphone or a tablet. A thick on device client is installed for use on a mobile device or windows tablet. On a desktop the application uses a browser to access the application.
Accessibility standards None or don’t know
Description of accessibility We provide a web link to down load the desktop or mobile client and the application server client that will be a SaaS
Accessibility testing Tests have been completed on a range of mobile device and operating systems in the UK and also in Canada. We support a range of operating systems and versions that are two many to list here but we can answer those questions as and when they arise.
What users can and can't do using the API As the application is based on custom code base we provided dedicated api's based on the customers requirements and needs.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The service can be customised by the users. The user has TOTAL control if required to customise the forms. What we provide is a framework for either ourselve to generate the form or you the customer to generate the forms.


Independence of resources This has been tested with over several hundred concurrent users across the EU with no desegregation of data or capability for use of the service.


Service usage metrics Yes
Metrics types These are available and are specified by the customer
Reporting types Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach They do not as it connect to the users back end systems that reside behind their own firewall.
Data export formats
  • CSV
  • Other
Other data export formats Non possible
Data import formats
  • CSV
  • Other
Other data import formats Not required

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability SLA's are provided on a customer by customer basis. As one example one customer required that is SLA's were not achieved then a deduction of the annual maintenance allowance would be withheld.
Approach to resilience Its available on request
Outage reporting Can be interfaced to third party tool sets via API's

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access is defined according to user defined roles and controlled usually in conjunction with Microsoft Active Directory (AD) defined roles. This is done in conjunction with the customers requirements where necessary
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes These are available on request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All change management is defined and discussed with the customer as required by the level of their standard set usually with a UK police force.
Vulnerability management type Supplier-defined controls
Vulnerability management approach In conjunction with our customers we seek to operate three systems covering demonstration, UAT and live and through these three systems we coordinate with the customer when and how and what patches need to be released when approved by the customer from UAT to live. The potential threats if any are informative by the customer and monitoring tools.
Protective monitoring type Undisclosed
Protective monitoring approach We respond is accordance with the degree of urgency that is required by the customer to address any issues that arise.
Incident management type Undisclosed
Incident management approach We have a customer portal that allows for direct reporting of any and all issues that generate incident reports to the support team for immediate response.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)


Price £1250 to £1250 per user per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Full system for 25 users for 3 months from day of the connection being operational.
Link to free trial Email a request


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑