SS8

Intellego XT - Monitoring Centre

Intellego XT Monitoring Centre is the foundation platform and provides voice and data reconstruction. Allows for data to easily be sort and analyse data, the create link chart showing relationships between callers / callees. Analysts can create and map iDossier records which including names, devices, addresses of Subject of Interest.

Features

  • Hi2, Hi3 Ingestion
  • ETSI, NHIS & 3GPP standards supported
  • Secure logs and Role based assess control
  • Real time reporting
  • Encryption
  • voice and data reconstruction.
  • iDossier records which including names, devices, addresses
  • Grid based analysis and charts

Benefits

  • Automated de-provisioning with warnings
  • Clear work flow
  • Link charts

Pricing

£100,000 an instance

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.patten@btinternet.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

5 5 6 9 3 6 0 9 1 5 0 0 2 3 8

Contact

SS8 Simon Patten
Telephone: 07850763807
Email: simon.patten@btinternet.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Hardware should be trusted venders only (HP/Dell)
System requirements
Minimum compute obligation such as RAM, CPU & HDD

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is available 24/7/365 for high priority faults with a 4 hr SLA
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
SS8 offers three tiers of support Standard, Gold & Platinum. the pricing varies in accordance with the response and restore times needed.

Pricing ranges from 12% of total solution cost for standard to 24% for platinum.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Full user documentation is provided. As part of initial installation and commissioning process basic training is provided. Formal 3 day classroom lead training service for groups is available with an additional 2 day advance course.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
There are purge timers for all processed data. Though user data can be manually deleted from the GUI front end by an Administrator.
End-of-contract process
Sensitive to be discussed on application, but all hardware (were needed) Professional Services, Software and Support will be clearly broken down in the quotation and Statement Of Work documents.

Using the service

Web browser interface
Yes
Supported browsers
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
Description of service interface
The SS8 solution use a GUI front end to perform all aspects of system operation. There is also a command line interface, but this is used for support and root level administration.
Accessibility standards
None or don’t know
Description of accessibility
The solution is designed to be securely operated and there are strict role based access controls in place. The system is access from a GUI that securely logs all commands and requests. The system offers many features, but due to the sensitive nature these should be discussed on request.
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
Sensitive to be discussed on application
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Sensitive to be discussed on application

Scaling

Independence of resources
The system is designed and scaled to meet the needs of all licensed users. This take into account a pre-agreed maximum usage needs and median averages. The system is further designed to scale horizontally, so if more performance is needed the system can easily add capacity.

Analytics

Service usage metrics
Yes
Metrics types
The system has a fully define set of user metric that are reported and graphed. This includes network and system utilization. The system is designed in such a way that any key component of interest can be measured.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The solution is configured to securely stream data in real time to set ETSI and NHIS formats. Log files and other control logs are exportable from the command line. Due to sensitive nature of this work more detail will be provided on application
Data export formats
  • CSV
  • Other
Other data export formats
Json
Data import formats
  • CSV
  • Other
Other data import formats
Json

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Government grade encryption with underpinning layer of IPsec tunnels. Sensitive to be discussed on application.

Availability and resilience

Guaranteed availability
The solution is designed to meet high availability needs such as 99.99% availability. Each system offers local Active-Active redundancy and full Geo redundancy with active sync and replication to ensure in the event of failure the system maintains service. SS8 provides a 24/7/365 support service and will action immediately any critical service impacting (P1 graded) failure with resolution within 4hrs.
Approach to resilience
It is available on request.
Outage reporting
The SS8 solution use SNMP to monitor and report alarms. The system can be deployed using Zabbix an open-source monitoring software tool or integrated into other established motoring software tools such as HP OpenView. There is a mechanism to provide email and SMS alerts.

Due to the sensitive nature of the work this detail is only available on request.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Support is through salesforce portal and completely separate management interfaces.
Access restriction testing frequency
At least once a year
Management access authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
We follow best practices in the industry and developed our own security processes and procedures. These are in accordance with HMG guidelines.
Information security policies and processes
SS8 has developed an internal set of security processes and procedures. The Chief Security Officer is responsible for those and works with the Chief Operations Officer to ensure that they are followed.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
SS8 has an internal change management process, and as a software company, we follow these processes to manage any changes in products, primarily our software and documentation.,
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We have several processes for vulnerability management:
1. Internal threats.
2. External threats.
We use internally developed and third party tools to monitor both potential internal and external threats. We also follow US Government (USG) issued threat letters and other external sources to assess potential threats. Security patches are applied immediately as needed for high severity and critical threats. Otherwise, they are applied in our regular quarterly or semi-annual software releases.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use internally developed and third party tools to monitor our network traffic. We have a process to communicate with our key stakeholders, and respond to triage any incidents quickly whilst putting plans in place to ensure any such incident is not repeated and future risk appropriately mitigated.
Incident management type
Supplier-defined controls
Incident management approach
All incident reports are filed through salesforce user portal and managed through the salesforce workflow defined by our company.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
Other
Other public sector networks
Sensitive to be discussed

Pricing

Price
£100,000 an instance
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
On request we can provide a free full demonstration version as a proof of concept. It is assumed this will be using a customer provided AWS or similar hosting environment. This will limited in time and user numbers.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.patten@btinternet.com. Tell them what format you need. It will help if you say what assistive technology you use.