Centerprise International Ltd

Centerprise Video and Evidence Management by Getac

The Centerprise Video and Evidence Management Service by Getac provides Evidence and Device management for Getac Branded hardware, but also enables the ability for clients to import and integrate disparate systems into one ecosystem.

Features

  • Evidence Management
  • Real Time Command
  • AVL Mapping
  • Livestreaming
  • Device Management
  • Evidence Sharing
  • Case Management

Benefits

  • Device Consolidation
  • Evidence Consolidation
  • CAD Integration
  • Motorway/City Camera Integration

Pricing

£120 to £675 a device a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tendersteam@centerprise.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

4 7 8 6 1 1 7 7 5 5 9 8 1 5 4

Contact

Centerprise International Ltd Tenders Team
Telephone: 01256 378 000
Email: tendersteam@centerprise.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
No
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is provided Mon-Fri 08:00-18:00. Questions are responded to on a priority basis.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide a first line support telephone number, email ticketing support and online ticketing support - all of which are supported by our second and third line resolver groups. Questions are responded to on a priority basis. Our user can manage status and priority of support tickets as well as accessing our technical support team via email or online portal. All our support levels are charged at the same rates. Our architects, consultants and technical support teams are wholly dedicated to ensuring the infrastructure supporting your applications and data are implemented and maintained to ensure peak performance.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Our Solution Engineers work with customers to design a service which is tailored to the customer’s needs. Migration and project managed deployment enables a smooth transition to the new solution. Technical Account Managers are on hand to provide walkthroughs of the management interfaces.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Mass data exports are available and may be scheduled via the Account team for proper techniques and safe extraction
End-of-contract process
Prior to the contract expiry date OR upon receipt of a contract termination notice served on either party, Centerprise will work with the customer to confirm that all accounts and resources will be deleted. We can assist with the migration of data as a chargeable professional services engagement. The off-boarding of all instances' data and resources would be the responsibility of the customer.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There are no material differences between mobile and desktop access.
Service interface
No
API
No
Customisation available
Yes
Description of customisation
Depending on customer requirements, there are multiple customisation options available

Scaling

Independence of resources
Virtual machines are provisioned for each user, along with logical separation of data through VRFs (Virtual Routing and Forwarding).

Analytics

Service usage metrics
Yes
Metrics types
Storage - Number of recorded evidence files - Number of units - Number of Users
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
GVS Enterprise

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Centerprise will deliver the defined dataset back to the Customer at the termination of the contract in the agreed format set out in the Call Off Contract.
Data export formats
  • CSV
  • Other
Other data export formats
  • MP4 (H.2640)
  • MP4A (Audio only)
  • JPG
  • XML
  • PDF
  • Excel
Data import formats
  • CSV
  • Other
Other data import formats
  • JPG
  • MP4
  • MP3
  • Excel
  • Word
  • PDF

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
99.9% Uptime
Approach to resilience
The service is operated within the Microsoft Azure UK Cloud instance. This facility has the benefit of operating Azure Paired regions.

An Azure region consists of a set of data centres deployed within a latency-defined perimeter and connected through a dedicated low-latency network. This ensures that Azure services within an Azure region offer the best possible performance and security.

An Azure geography defines an area of the world containing at least one Azure region. A regional pair consists of two regions within the same geography. Azure serialises platform updates (planned maintenance) across regional pairs, ensuring that only one region in each pair updates at a time. If an outage affects multiple regions, at least one region in each pair will be prioritised for recovery.
Outage reporting
24/7 Monitoring is conducted. In the event of an incident, a ticket is raised and the customer contacted by email or phone.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Upon authenticating with credentials, users are granted access to the enterprise server, which is controlled based on profile settings
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcumus ISOQAR
ISO/IEC 27001 accreditation date
24/04/2008
What the ISO/IEC 27001 doesn’t cover
N/A - everything is covered by our ISO 27001 certification
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
SecurityMetrics
PCI DSS accreditation date
10/11/2018
What the PCI DSS doesn’t cover
N/A - everything is covered by our PCI DSS certification
Other security certifications
Yes
Any other security certifications
Cyber Security Essentials Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The Information Security Management System (ISMS) is intended to be an enabling mechanism for information sharing, for electronic operations, and for reducing information-related risks to acceptable levels. The scope of the ISMS covers all Centerprise information assets associated with the provision of the service. The scope specifically excludes the internal support functions of administration, marketing and finance. The ISMS is subject to continuous, systematic review and improvement. Centerprise has established a top-level Information Systems Management Forum (ISMF), chaired by the CEO that includes the Information Security Officer and other management staff or roles to support the ISMS framework and to periodically review the information security policy. This policy and all changes to this policy are subject to approval by the Centerprise CEO.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
To achieve the above objectives towards information security best practice, Centerprise has adopted a framework for information security management based on the principles of ISO 27001.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Critical vulnerabilities can be patched via a hot-fix process pushed to all servers automatically. Typically the time frame between identifying and remediation with 72 hours. Information regarding potential threats comes from a variety of sources primarily relating to our underlying operating system.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Centerprise have a defined protective monitoring process with includes a number of different methodologies and techniques. Due to the sensitive nature of the details of this process Centerprise do not make these details publicly available but they can be discussed on request. When a potential compromise is found it is reported to the Information Security Manager as set out in Centerprise's incident management policy. The Centerprise ISM is responsible for coordinating and managing the response within 24 hours.
Incident management type
Supplier-defined controls
Incident management approach
Centerprise's Incident Management process is based on ITIL principles, and provides 1st Line service desk support via phone and email. Standard resolution templates are used for common issues, and an ITSM tool provides audit trails and log of ticket volumes, categories etc. Due to the sensitive nature of the details of this process Centerprise do not make these details publicly available but they can be discussed on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£120 to £675 a device a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Upon request, hardware spanning from the entire GVS suite and access to the Enterprise for request days, typically set for 30/60/90 days. Extended trials are available if needed.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tendersteam@centerprise.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.