Informed Solutions Ltd

InformedINSIGHT – Geographic Information Services

InformedINSIGHT Geographic Information Services offers solutions to new GIS cloud or on-premise services, or migrating systems to cloud based services. With experience in Land, Property, Environment, Transport and Utilities we provide configurable, technology independent GIS platforms based on leading technologies including ESRI, FME, Snowflake, GeoServer, Leaflet, OpenLayers and QGIS.

Features

  • Offers industry leading, configurable GIS capability
  • Offers complex Land Planning capability
  • Offers Land Cadastre and Property Registration services
  • Offers GIS data capture, discovery, analytics, reporting and quality assurance
  • Proven end-to-end delivery methodology
  • Based on an open service orientated architecture
  • Seamlessly integrates with existing IT systems
  • Service levels are flexible according to individual requirements
  • Can be hosted on a range of cloud platforms
  • Accessible from mobile devices

Benefits

  • Provides a definitive picture to inform your strategic decision making
  • Provides an understanding of your organisation’s GIS data
  • Delivers a cost-effective solution
  • Combines the best web-based workflow, data analytics & GIS technology
  • Reduces cost and complexity of producing management information
  • Provides a competitive advantage by basing strategies on ‘real-time’ insights
  • Reduces cost and complexity of GIS data governance
  • All staff BPSS cleared as a minimum
  • Staff fully familiar with GDS standards and assessment process
  • Staff familiar with coaching client staff in Agile and DevOps

Pricing

£400 to £1400 per person per day

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

499770194036694

Informed Solutions Ltd

Philip Lucas

0161 942 2000

Philip.lucas@informed.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Informed Solutions offer flexible SLAs, tailored to our client's precise requirements and ranging from support for business critical national infrastructure solutions (where we implement 24/7 service desks though our global 'follow-the-sun' model), through to SLAs based on core UK business hours. For all services, Informed Solutions provide clients with access to our on-line self-service portal, PRISM, which offers a full suite of incident reporting, tracking and service monitoring features.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing All of our services undergo appropriate functional, non-functional and accessibility testing.
Onsite support Onsite support
Support levels Informed Solutions offer flexible SLAs, provided at highly competitive rates and tailored to our client's specific requirements. SLAs range from dedicated support for 24/7 business critical national infrastructure solutions through to SLAs based on core UK business hours. For all services, Informed Solutions provide clients with access to our on-line self-service portal, PRISM, which offers a full suite of incident reporting, tracking and service monitoring features, as well as a nominated point of contact within our Service Management team, as well as regular service reviews with clients.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Informed Solutions has 25 years' experience in supporting our clients to get the best out of their investment in software. We adopt a tailored approach to helping users start to use the service, including skills transfer and training as part of solution configuration, providing managed transition into go-live (including early life support and dedicated service), as well as a comprehensive suite of training and on-line documentation (training options include direct end-user training, train-the-trainer and on-line eLearning). Critically, the system has been designed from the ground-up in a user-centric manner, and continually refined in-line with user feedback, resulting in a highly intuitive user experience 'out-of-the-box'.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Informed Solutions understand the importance of flexibility to our clients, and avoiding lock in to a specific supplier or technology. To this end, our solution is based on use of open data standards and formats, as well as open interfaces. We are able to provide clients with a full export of their data in a range of open formats (including full database exports, structured/linked data, csv/spreadsheet). We can arrange for this information to be provided via secure file transfer or via physical media (transported in a suitably secure manner). All data export activities are undertaken in line with our ISO27001 accredited Information Security Management System.
End-of-contract process Informed Solutions have a proven service decommissioning approach, which forms part of our ISO9001 Quality Management System. We work with clients to tailor the off-boarding approach to their specific needs (including the provision of a managed decommissioning plan). This typically includes handover of documentation and data assets, extraction and handover of data, secure deletion/destruction of data (in line with our ISO27001 Information Security Management System), handover of any client-specific source code or configuration, handover of service and operational logs.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The service has been designed from the ground up to support seamless user experience across the full range of modern mobile devices (including tablets and smart phones). The interface employs responsive design best practices, adapting to the specific resolution/input configuration of the end user's device.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing The software has undergone numerous accessibility testing cycles (including comprehensive testing with various leading screen readers) by independent experts for a range of public sector clients.
API Yes
What users can and can't do using the API InformedINSIGHT provides comprehensive APIs for spatial services (including OGC compliant web services)
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The software provides a flexible suite of customisations that enable it to be tailored to client's specific requirements (including interface design and look and feel, user experience, content and interaction design, workflow configuration and integration with existing systems).

Scaling

Scaling
Independence of resources We employ logically segregated environments, sized for the needs of each of our clients, to avoid resource contention between different client deployments. Within a specific deployment, we make use of cloud and datacentre technologies such as elastic scaling and multiple availability zones as required to ensure that the service remains available and responsive, and can offer dedicated performance testing and optimisation services to ensure service performance in cases where clients anticipate exceptional user numbers or peaks in demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types Standard service metrics include web analytics, service uptime/availability metrics, data volumes, and resource usage (all of which can be accessed via our PRISM self-serve on-line portal). Further, we are able to provide tailored service metrics as required (e.g. user behaviour statistics and metrics, operational reporting, MI and service KPIs).
Reporting types Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Informed Solutions is able to provide clients with a full export of their data in a range of open formats (including full database exports, structured/linked data, csv/spreadsheet). We can arrange for this information to be provided via secure file transfer or via physical media (transported in a suitably secure manner), additionally clients can be provided with access to self-serve data exports. All data export activities are undertaken in line with our ISO27001 accredited Information Security Management System.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Shapefile
  • Linked data RDF
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Shapefile
  • Linked data RDF
  • Expertise in proprietary/legacy formats

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability The service can be provided to a range of different availability levels depending on client requirements (including the use of dedicated physical infrastructure i.e. private cloud if required), and 'zero downtime' solutions which use dynamic scaling and load balancing to maintain service availablity during maintenance and patching activities. We work with clients at outset to shape the most cost effective solution for their needs.
Approach to resilience The service has been architected from the ground up to take advantage of datacentre level reslience and modern cloud technologies (including the use of elastic scaling, distributed database and storage as a service and cross-availability zone deployments). Depending on client requirements, we can also provide tailored business continuity and disaster recovery plans and services.
Outage reporting Service outages are reported through multiple routes including via our on-line self-serve portal (PRISM), through email alerts and SMS notifications, and direct communications with nominated client-side contacts (based on pre-agreed communications and escalation procedures).

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels All services are secured using a combinataion of authentication methods (including 2-factor authentication, Public key authentication (including by TLS client certificate), Identity federation with existing provider (for example KeyCloak), Limited access over government network (for example PSN), Dedicated link (for example VPN or bonded fibre), Username/password) and authorisation (role based permissions).
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Cabinet Office Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Informed Solutions' ISO27001 accredited Information Security Management System incorporates a comprehensive set of policies and processes, which are subject to regular external audit. Specific details can be provided on request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Informed Solutions operate a robust and proven Configuration and Change Management process, which forms part of our ISO9001 accredited Quality Management System. Our Configuration Management Database is used to track components of our services throughout their lifetime, with any changes assessed for potential security impact. Specific details are available on request.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Our vulnerability management process includes a range of measures which cover potential threats including (but not limited to) protection against malicious and mobile code, technical compliance checking, network security management, pro-active monitoring, technical vulnerability management, information leakage and information systems audits. Further details are available upon request.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Our protective monitoring process forms part of our ISO27001 accredited Information Security Management System, and includes protection against malicious and mobile code, technical compliance checking, network security management, monitoring and technical vulnerability management. Further details can be provided on request.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Our incident management process forms part of our ISO27001 accredited Information Security Management System, and includes Reporting of Incidents, Events, Non-Conformities, Assessment of Events, Reporting Security Weaknesses, Management of and response to Information Security Incidents and Improvements, Learning from Information Security Incidents and Collection of Evidence. Further details can be provided on request.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £400 to £1400 per person per day
Discount for educational organisations Yes
Free trial available Yes
Description of free trial This is agreed on an individual basis

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑