Vysiion Ltd

Vysiion Scout

Vysiion Scout carries out hours of manual research in under 60 seconds. It provides Criminal Justice users and Police Officers a secure storage capability allowing cross referencing of multiple entities and events. Real time interrogation of multiple investigations with automated risk analysis for identification of fraud or other criminal activity.


  • Cloud hosted and entirely scalable intelligence platform
  • Conducts out hours of manual research in under 60 seconds
  • Run intelligence profiles at the click of a button
  • Single access to multiple open and closed source data feeds
  • Real time and automated collation of multiple data feeds
  • Near real time intelligence analysis, automated real time risk assessment
  • All queries stored and accessible through Scout Graph Database.
  • Integration and collation of multiple disparate data feeds
  • Case Management System


  • Hours of manual research conducted in under 60 seconds
  • Automates the manual process of collating relevant information
  • Highly intuitive and easily accessible platform interface
  • Increased operational efficiency
  • Reduced investigation costs
  • Increased opportunity to share information with partner organisations
  • High levels of security and data integrity
  • No restriction on open or closed source data


£50.00 per unit

  • Free trial available

Service documents

G-Cloud 11


Vysiion Ltd

Caroline Andrewes

01249 446500


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Buyers are required to arrange tri-party API access to private data sources such as GBG, Equifax. Vysiion Scout accesses these APIs on buyers behalf.
System requirements
  • Access to an upto date browser
  • Approriate network connectivity

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Vysiion's support service includes Service Delivery Managers, support engineers and a 24/7 service desk and network operations centre. We can respond to incidents within 30 minutes and our service desk is 24/7.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Vysiion's support varies depending on that required by the customer. We will work with the customer to define the most appropriate support package.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Vysiion provides onsite coaching and training
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data will be provided as a database repository
End-of-contract process Platform access is revoked. Data store is archived.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Service interface No
Customisation available Yes
Description of customisation Professional Services


Independence of resources The platform is cloud based; clients are provided their own environment; usage is constantly monitored and capacity is provided as required to meet agreed service levels.


Service usage metrics Yes
Metrics types A full Management Information suite is available.
Reporting types Regular reports


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Synalogik

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Print
Data export formats Other
Other data export formats Print
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks All data access and transmission is via a single web portal secured via HTTPS. There is no direct access to data held in files or databases, nor are any forms of external API such as SOAP or REST supported.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network Data at rest is encrypted using AWS management features to control key management. Access to data is locked-down using AWS networking features, each data domain residing in its own private VPC logical network. Where required, network links between customer data and the Scout central intelligence graph is locked-down using AWS Security Groups. All remote access required for operational and support purposes is via AWS Session Manager and all sessions fully logged for audit purposes.

Availability and resilience

Availability and resilience
Guaranteed availability 99.90% availability
Approach to resilience The Scout application and deployment architecture utilises a number of resilience features including clustered databases, networks and multiple copies of application microservices operating in a distributed, loosely coupled environment.
Outage reporting Any outages will be proactively managed and communicated to the customer via email alerts, and if considered a P1 incident, by telephone with regular updates.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Users must complete a authentication login web form to gain access to the system.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ACM
ISO/IEC 27001 accreditation date 10/07/2016
What the ISO/IEC 27001 doesn’t cover All services are covered
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards Cyber Essentials Plus
UK Data Protection Act 2018
UK Electronic Communications Act 2000
Freedom Of Information Act 2000
The Telecommunications (lawful Business Practice and Interception of Communications) Regulations 2000
Computer Misuse Act 1990
Regulation of Investigatory Powers Act 2000 (RIPA)
EU General Data Protection Regulation (EU GDPR), 2016
Information security policies and processes In line with ISO27001 accreditation and governance procedures.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach In accordance with Supplier Defined Change Control policy as maintained within ISMS and ISO27001
Vulnerability management type Supplier-defined controls
Vulnerability management approach In accordance with Supplier Defined Change Vulnerability Policy as maintained within ISMS and ISO27001
Protective monitoring type Supplier-defined controls
Protective monitoring approach Supplier Defined Audit and Log File Monitoring Policy as maintained within ISMS and ISO27001
Incident management type Supplier-defined controls
Incident management approach Vysiion has a well-defined ITIL aligned incident management process with a service desk and a comprehensive service toolset that allows incidents to be raised by phone, email and portal. Incident reports are regularly provided by email and users can log on to the portal at any time to get the status of an incident. Customer satisfaction surveys are carried out on closure of an incident.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £50.00 per unit
Discount for educational organisations No
Free trial available Yes
Description of free trial Full service, limited duration, quantity of available searches

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑