Vysiion Ltd

Vysiion Scout

Vysiion Scout carries out hours of manual research in under 60 seconds. It provides Criminal Justice users and Police Officers a secure storage capability allowing cross referencing of multiple entities and events. Real time interrogation of multiple investigations with automated risk analysis for identification of fraud or other criminal activity.


  • Cloud hosted and entirely scalable intelligence platform
  • Conducts out hours of manual research in under 60 seconds
  • Run intelligence profiles at the click of a button
  • Single access to multiple open and closed source data feeds
  • Real time and automated collation of multiple data feeds
  • Near real time intelligence analysis, automated real time risk assessment
  • All queries stored and accessible through Scout Graph Database.
  • Integration and collation of multiple disparate data feeds
  • Case Management System


  • Hours of manual research conducted in under 60 seconds
  • Automates the manual process of collating relevant information
  • Highly intuitive and easily accessible platform interface
  • Increased operational efficiency
  • Reduced investigation costs
  • Increased opportunity to share information with partner organisations
  • High levels of security and data integrity
  • No restriction on open or closed source data


£50.00 per unit

  • Free trial available

Service documents


G-Cloud 11

Service ID

6 0 3 3 9 0 0 8 5 3 9 3 5 6 7


Vysiion Ltd

Caroline Andrewes

01249 446500


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Buyers are required to arrange tri-party API access to private data sources such as GBG, Equifax. Vysiion Scout accesses these APIs on buyers behalf.
System requirements
  • Access to an upto date browser
  • Approriate network connectivity

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Vysiion's support service includes Service Delivery Managers, support engineers and a 24/7 service desk and network operations centre. We can respond to incidents within 30 minutes and our service desk is 24/7.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Vysiion's support varies depending on that required by the customer. We will work with the customer to define the most appropriate support package.
Support available to third parties

Onboarding and offboarding

Getting started
Vysiion provides onsite coaching and training
Service documentation
Documentation formats
End-of-contract data extraction
Data will be provided as a database repository
End-of-contract process
Platform access is revoked. Data store is archived.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Service interface
Customisation available
Description of customisation
Professional Services


Independence of resources
The platform is cloud based; clients are provided their own environment; usage is constantly monitored and capacity is provided as required to meet agreed service levels.


Service usage metrics
Metrics types
A full Management Information suite is available.
Reporting types
Regular reports


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data export formats
Other data export formats
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
All data access and transmission is via a single web portal secured via HTTPS. There is no direct access to data held in files or databases, nor are any forms of external API such as SOAP or REST supported.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
Data at rest is encrypted using AWS management features to control key management. Access to data is locked-down using AWS networking features, each data domain residing in its own private VPC logical network. Where required, network links between customer data and the Scout central intelligence graph is locked-down using AWS Security Groups. All remote access required for operational and support purposes is via AWS Session Manager and all sessions fully logged for audit purposes.

Availability and resilience

Guaranteed availability
99.90% availability
Approach to resilience
The Scout application and deployment architecture utilises a number of resilience features including clustered databases, networks and multiple copies of application microservices operating in a distributed, loosely coupled environment.
Outage reporting
Any outages will be proactively managed and communicated to the customer via email alerts, and if considered a P1 incident, by telephone with regular updates.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Users must complete a authentication login web form to gain access to the system.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All services are covered
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials Plus
UK Data Protection Act 2018
UK Electronic Communications Act 2000
Freedom Of Information Act 2000
The Telecommunications (lawful Business Practice and Interception of Communications) Regulations 2000
Computer Misuse Act 1990
Regulation of Investigatory Powers Act 2000 (RIPA)
EU General Data Protection Regulation (EU GDPR), 2016
Information security policies and processes
In line with ISO27001 accreditation and governance procedures.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
In accordance with Supplier Defined Change Control policy as maintained within ISMS and ISO27001
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
In accordance with Supplier Defined Change Vulnerability Policy as maintained within ISMS and ISO27001
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Supplier Defined Audit and Log File Monitoring Policy as maintained within ISMS and ISO27001
Incident management type
Supplier-defined controls
Incident management approach
Vysiion has a well-defined ITIL aligned incident management process with a service desk and a comprehensive service toolset that allows incidents to be raised by phone, email and portal. Incident reports are regularly provided by email and users can log on to the portal at any time to get the status of an incident. Customer satisfaction surveys are carried out on closure of an incident.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£50.00 per unit
Discount for educational organisations
Free trial available
Description of free trial
Full service, limited duration, quantity of available searches

Service documents

Return to top ↑