Digital Biometric Forensic Services
A holistic service for the management and processing of Forensic Evidence and Records. Providing a central asset management hub and additional best of breed modules for fingerprint, photo and video analysis and face recognition software. Proven integration with third party applications and hosted in a compliant IL3 environment.
Features
- Civica FileTrail Evidence and Asset Tracking software
- FISH Forensic Image Scanning Hub
- MXServer Face Recognition Software
- Sungard IL3 Compliant Official Assured Zone Managed Cloud Services
- Full end to end Digital Biometric Forensics Management
- Complete Audit Trail and Reporting
- Fully configurable Workflow Dashboards
- Seamless integration
- Best of breed applications and hosting
- Single modular solution
Benefits
- Fully configurable to meet a wide range of requirements
- Significant reduction in staff inputting and processing time
- Demonstrable return on investment
- Automated barcode and RFID tracking
- Simple and intuitive interface
- Faster detection of offenders
- Extends an organisation’s intelligence base
- Secure hosting with full Disaster Recovery
- Relives the strain on existing IT infrastructure
- Proven track record in this field
Pricing
£0 a unit
- Minimum contract period: Year
- Excluding VAT
Service documents
Request an accessible format
Framework
G-Cloud 8
Service ID
6 1 9 0 3 2 5 1 8 9 9 3 2 9 8
Contact
Civica UK Limited
Civica UK Limited
Telephone: +44 (0) 3333 214 914
Email: g-cloud@civica.co.uk
Support
- Support service type
-
- Service desk
- Phone
- Support accessible to any third-party suppliers
- No
- Support availability
- 9 to 5
- Standard support response times
- Incidents relating to application - within 2 working hours. Incidents relating to Cloud Service - between 30-60 minutes.
- Incident escalation process available
- Yes
Open standards
- Open standards supported and documented
- Yes
Onboarding and offboarding
- Service onboarding process included
- No
- Service offboarding process included
- No
Analytics
- Real-time management information available
- Yes
Cloud features
- Elastic cloud approach supported
- Yes
- Guaranteed resources defined
- Yes
- Persistent storage supported
- Yes
Provisioning
- Self-service provisioning supported
- No
- Service provisioning time
- Dependant on customer requirements.
- Service deprovisioning time
- Dependant on customer requirements.
Open source
- Open-source software used and supported
- No
Code libraries
- Languages your code libraries are written in
-
- .Net
- C#
- VB
- ASP
API access
- API access available and supported
- Yes
- API type
- Dependent on application/module
Networks and connectivity
- Networks the service is directly connected to
-
- Internet
- Other
Access
- Supported web browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10+
- Firefox
- Chrome
- Safari
- Offline working and syncing supported
- No
- Supported devices
-
- PC
- Tablet
Certifications
- Vendor certification(s)
-
- Microsoft Systems Engineer
- Microsoft Certified Systems Administrator
- Microsoft Certified IT Professional
- Microsoft Database Administrator
- Microsoft Technology Specialist
- Citrix Certified Administrator
- VMware Certified Professional
- Cisco Certified Network Administrator
- Cisco Certified Network Professional
Data storage
- Datacentres adhere to the EU code of conduct for energy-efficient datacentres
- Yes
- User-defined data location
- No
- Datacentre tier
- TIA-942 Tier 3
- Backup, disaster recovery and resilience plan in place
- Yes
- Data extraction/removal plan in place
- Yes
Data-in-transit protection
- Data protection between user device and service
Asset protection and resilience
- Datacentre location
- Data management location
- Legal jurisdiction of service provider
- UK
- Datacentre protection
- Yes
- Data-at-rest protection
- Secure data deletion
- Other erasure process
- Service availability
- 99.99%
Separation between consumers
- Cloud deployment model
- Public cloud
- Type of consumer
- No other consumer
- Services separation
- Yes
- Services management separation
- Yes
Governance
- Governance framework
- Yes
Configuration and change management
- Change impact assessment
- Yes
Vulnerability management
- Vulnerability assessment
- Yes
- Vulnerability monitoring
- Yes
- Vulnerability mitigation prioritisation
- Yes
- Vulnerability tracking
- Yes
- Vulnerability mitigation timescales
- Yes
Event monitoring
- Event monitoring
- Yes
Incident management
- Incident management processes
- Yes
- Consumer reporting of security incidents
- Yes
- Security incident definition published
- Yes
Personnel security
- Personnel security checks
Secure development
- Secure development
- Yes
- Secure design, coding, testing and deployment
- Yes
- Software configuration management
- Yes
Supply-chain security
- Visibility of data shared with third-party suppliers
- Yes
- Third-party supplier security requirements
- Yes
- Third-party supplier risk assessment
- Yes
- Third-party supplier compliance monitoring
- Yes
Authentication of consumers
- User authentication and access management
- Yes
- User access control through support channels
- Yes
Separation and access control within management interfaces
- User access control within management interfaces
- Yes
- Administrator permissions
- Yes
Identity and authentication
- Identity and authentication controls
Secure service administration
- Service management model
Audit information provision to consumers
- Audit information provided
- Data made available by negotiation
Secure use of the service by the customer
- Device access method
- Training
- Yes