Nokia UK Ltd

Video Scene and IoT analytics

The IMPACT Scene Analytics solution augments Operation Centre’s capabilities by turning surveillance cameras into intelligent IoT sensors. Abstract information vectors are derived from each video feed, including motion, direction, velocity, and density for real-time anomaly detection. Patented machine learning developed by Nokia Bell Labs leverages pattern recognition and behavioural knowledge.


  • Establishes baseline values, then generates alarms when anomalies are observed.
  • Scales from a single gateway to a centralised server cluster.
  • Easy-to-use dashboard permitting drilling down for detailed information.
  • Extensible analytics enabling plug-in integration with third-party analytics.
  • Allows integration with large, third-party video walls.
  • IoT Community that works to explore new business models.
  • Modular architecture leveraging existing network investments enabling a cost-effective solution.
  • Edge video analytics reducing network bandwidth prioritising control room streaming.
  • Multi-tenant architecture for serving multiple user groups on single instances.


  • Video Scene Analytics drives efficiency in operations
  • Video Scene Analytics uses Machine Learning to continuously improve
  • Video Scene Analytics improves security
  • Video Scene Analytics improves quality assurance
  • Reduce network and storage costs up to 99%.
  • Provides lower deployment costs and greater flexibility.


£50 to £750 per device per month

Service documents


G-Cloud 11

Service ID

5 6 6 9 8 6 5 6 8 8 3 2 1 1 5


Nokia UK Ltd

Mike Barlow

07794 920228

Service scope

Software add-on or extension
Cloud deployment model
Hybrid cloud
Service constraints
No known constraints, we work with a vast variety of IoT standards.
System requirements
Deployed as a cloud service thus reducing customer constraints

User support

Email or online ticketing support
Email or online ticketing
Support response times
Various options exists so as best to fit each clients' requirement.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Onsite support
Support levels
Support available to third parties

Onboarding and offboarding

Getting started
The Scene Analytics solution has a set of pre-defined onboarding services required for the initial setup.
In addition, Nokia will work with each customer to define and document any customized onboarding services,
Onsite training, online training, and user documentation are all provided.
Service documentation
Documentation formats
End-of-contract data extraction
Nokia will work with each customer to define any specific end-of-contract process requirements.
End-of-contract process
Nokia will work with each customer to define any specific end-of-contract process requirements and any chargeable end of term items.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Service interface
Description of service interface
Users access Scene Analytics via a web browser interface.
Supports common browsers including Chrome, Internet Explorer, Firefox, etc.
Accessibility standards
None or don’t know
Description of accessibility
Users access Scene Analytics via a web browser interface.
Supports common browsers including Chrome, Internet Explorer, Firefox, etc.
Accessibility testing
What users can and can't do using the API
Scene Analytics provides an extensive North Bound API for integration into third party operational systems and Video Management Systems.
Details available on request.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
The video analytics algorithms are currently configurable.
From Q3 2018 there will be a new set of algorithms covering use cases such as car/people counting, license plate recognition, etc.
We strive to continually enhance the services provided and there are future plans for a Bring-Your-Own algorithm, however this is not formally in the roadmap as yet.


Independence of resources
The Scene Analytics solutions scales in two ways.

- Cloud compute resources can be expanded to cover increased number of end users, as well as supporting the collection and display needs of additional cameras.

- As additional cameras are added to the system, analytics processing power also needs to be added to the solution. These can either be added as edge compute gateways, or can be added as central cloud compute resources, depending on the specific customer requirements.


Service usage metrics
Metrics types
Service usage is measured by the number of endpoint camera devices connected to the network.


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Other data at rest protection approach
Scene Analytics gateways perform the video stream analytics processing. All data within these gateways is stored temporarily during processing in secure Linux Containers.
Video anomaly clips are stored for 24 hours on the main Scene Analytics servers before being deleted. Integrated security mechanisms within the cloud service provide ensure protection of this data.
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Scene Analytics supports the integration North Bound into the customer operational support systems or existing Video Management system.
The integration is near-real-time, with Scene Analytics forwarding anomaly and clip details for the external system to access.
Data export formats
  • CSV
  • Other
Data import formats
Other data import formats
  • Interface via the provided API
  • Interfaces with the cloud management system
  • Scene Analytics supports the bulk loading of camera data
  • Camera data supported formats are JSON and CSV.

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
To be discussed with customers to determine their availability requirements.
Approach to resilience
This information is available on request.
Outage reporting
As per the customers' specified BC/DR planning and policies

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Scene Analytics supports single or multi-tenanted deployments.
Scene Analytics uses hierarchical group/user structure, and configurable role definitions and assignments.
Access restriction testing frequency
Less than once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Less than 1 month
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Bureau Veritas
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Available on request
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Aligned with CTPAT
  • Aligned with AEO
  • Aligned with TAPA

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Nokia policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Nokia has a comprehensive software configuration and change management process. Changes are assessed for potential security impact.
Vulnerability management type
Vulnerability management approach
Nokia conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. Nokia has Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to Nokia Networks products and issues corresponding security recommendations for further actions within Nokia Networks. The process is continuous and concurrent to the Product Life Cycle.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Nokia embed security into all our products and services. Following are the key measures in place to ensure securing the information ecosystem • Nokia Design for Security ensures that security is built into products from the start of the development and maintained throughout the lifecycle • We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities • We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures • We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary
Incident management type
Incident management approach
Nokia’s Information Security is responsible for developing, implementing, maintaining and communicating Nokia's Threat and Incident Response process for information security incidents This process includes the following but is not limited to: 1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified 2. How and what to communicate inside and outside the Company 3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£50 to £750 per device per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑