LPWAN network provision (IOT)
We provide secure, end-to-end, low power long range wireless networks including sensors, gateways, network servers, data storage and Application Servers. We can collect data locally and securely transfer it to the Cloud using a variety of LPWAN networks including LoRaWAN, Sigfox and NB-IOT.
- Real-time access to remote sensor data.
- Secure, long-range, low-power data collection.
- Wire-free environmental monitoring.
- Securely transfer connected-health data to the Cloud.
- Remotely monitor facilities, buildings and personnel movements in real time.
- Track or count the movements of assets and people.
- Remotely monitor and test safety alarms and predict fire risks.
- Remotely monitor attendance e.g. community care providers.
- View live sensor or environmental data in real time .
- Collect data from battery-powered devices in remote locations.
- Reduce the cost of facilities management.
- Track assets worldwide over an extended duration.
- Reduce fire risks through predictive analysis of live data.
£5000 to £50000 per instance
- Free trial available
D M Innovations
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||Our service can extend the reach of other networks by acting as a bridge from other localised networks to the Cloud.|
|Cloud deployment model||
|Email or online ticketing support||Yes, at extra cost|
|Support response times||24hr email support, 48hr at weekends as standard. Shorter response times are negotiable.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||We provide technical support for all Cloud-based components plus support for end device configuration. The levels of support provided are negotiated for each contract.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We provide full documentation supported by onsite training and telephone/email support.|
|End-of-contract data extraction||Users normally retain a live copy of their data. Where we store any data this will be supplied to users at the end of a contract in the requested format e.g. .csv|
|End-of-contract process||Our service is for the provision of real-time data. This ceases at the end of the contract. If a user changes to another provider then we will charge for any reconfiguration work that is needed .|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||No difference.|
|Description of customisation||We can customise all the component parts of our service including sensor design, data storage and any user interface. Users are not able to make any changes themselves.|
|Independence of resources||Each user's service is maintained on a dedicated server.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||We do not retain data.|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||We provide users with near real time data which is continuously exported to their own servers.|
|Data export formats||
|Data import formats||Other|
|Other data import formats||Formats accepted by the relevant LPWAN technology|
|Data protection between buyer and supplier networks||
|Other protection between networks||All data is encrypted.|
|Data protection within supplier network||Other|
|Other protection within supplier network||All data on our network remains encrypted.|
Availability and resilience
|Guaranteed availability||The level of guaranteed availability depends on the type of LPWAN network connection being used. The expected availability level will we included in any purchase agreement.|
|Approach to resilience||Available on request.|
|Outage reporting||Service availability is displayed on a public dashboard. Email alerts/SMS can be made available.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||All accessible parts of our service are protected by OAuth-2 level access control.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We agree and apply whatever security controls a particular user requires.|
|Information security policies and processes||Our responsible board member applies and oversees all security policies.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We retain an automated log of any relevant changes. All changes are assessed to ensure that data remains encrypted at all times.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Our service is designed to only accept data from known devices. All of the LPWAN networks that we support operate to agreed International standards. Any changes are applied immediately they are released.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Our service does not retain any user data.
If a server was to be compromised we would transfer our service to a new server as soon as the incident occurred.
|Incident management type||Supplier-defined controls|
|Incident management approach||The nature of the service that we provide limits the opportunity for the network to be misused for common security attacks. We will investigate any reported incident and submit an incident report in the format required by the user.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||Yes|
|Other public sector networks||Our service is accessible from any network|
|Price||£5000 to £50000 per instance|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||We provide time limited access to a fully functional online demo version of our service. This time limit is negotiable.|