Cadcorp SIS WebMap

An easy-to-use off-the-shelf GIS application for internet and intranet web mapping. It includes facilities for presenting and interrogating GIS spatial data and is accessed through a familiar and mobile responsive web mapping interface.


  • GIS Map Overlays
  • Ordnance Survey Mapping
  • Address Gazetteer
  • Responsive Mobile Interface
  • Local Knowledge
  • Reporting
  • Map Printing
  • Measuring and Drawing
  • GPS Device Location
  • GIS Spatial Queries


  • Publish a wide range of GIS data
  • Intuitive easy to use interface web mapping interface
  • Quickly search and query GIS data from a spatial database
  • Access web mapping and GIS functionality from multiple devices
  • Fully managed GIS and web mapping Cloud Service


£975 per virtual machine per month

Service documents

G-Cloud 11



Gary Randle

01438 747996

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints Performance of the service is related to the specification of the server. When considering the specification of the server, the number of proposed users and the types of data served should be taken into consideration. Running multiple sites and services will consume more resources. Additional disk space may be required to store data.
System requirements
  • Web browser
  • Remote desktop Protocol (RDP) client
  • Domain name system redirect

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Cadcorp will use its reasonable endeavors to respond within
8 Working Hours.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Cadcorp provide a single tier support service that includes telephone support, email support and access to an interactive customer portal. All support costs are included within the service subscription fee. Customers are allocated a Cadcorp Account Manager.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started A list of customer tasks that require completion in order to use the service are included within the service definition document.

Onsite training is provided as an option within the price schedule.

Online documentation is available at
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction The application administrator will be able to directly extract their data from the hosted database when the contract ends. Options include taking a full database extract or export to shp or tab file formats.
End-of-contract process At the end of the contract the service will be turned off. The customer should extract their data during the final 30 day period before the server is decommissioned.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile users are provided with an application interface and functionality suitable for a mobile device. Mobile users have the option to switch to the full desktop service if they prefer.
What users can and can't do using the API WebMap includes Local Knowledge and Quick Search web services and an API which allows the developer to create:

Add-In Extensions – WebMap allows extender Add-Ins to be written which can add custom workflows, dialogs and functionality to the website. These can use existing interface client (JavaScript) and server (C#) API from the WML API as well as adding extra capabilities using GeognoSIS and Open Layers API.

Bespoke Applications – WebMap maps can be dropped into an aspx page with custom functionality and design.

Embeddable Maps – Using JavaScript on the client side, this approach allows the user to drop a map into any exisiting page. With additional development the MapID can be used to programmatically access the map object and add custom or packaged controls.

GeognoSIS features two API's. The SOAP API is the natural programming environment for enterprise applications when fine-grained access to the GisLink API is required. The HTTP API provides the ideal environment for modern, browser- and JavaScript-centric web development, offering a resource-centric view of the spatial data and analysis capabilities of GeognoSIS.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The application administrator can customise a range of features using a online admin page and data management application. The features that can be customised include:

a) Map Data
b) Business data
c) Application Styling
d) Quick Search
e) Spatial Queries


Independence of resources Cadcorp provide dedicated resources for each customer.


Service usage metrics Yes
Metrics types Subject to the customer having a Google Analytics account, this tool can be integrated into Web Map Layers, allowing the administrator to see from where in the world users are accessing the site and more information on page requests, sessions, users, clients and session duration.
Reporting types Real-time dashboards


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft Azure Hosted Services

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach The application administrator can directly export data from the hosted database using SIS Desktop. Additional automated data extracts can be managed using the database extraction service.
Data export formats Other
Other data export formats
  • Tab
  • Shp
  • Gml
  • Bds
  • Kml
  • Tiff
Data import formats
  • CSV
  • Other
Other data import formats
  • Shp
  • Tab

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability For all Virtual Machines that have two or more instances deployed in the same Availability Set, Microsoft Azure guarantee you will have Virtual Machine Connectivity to at least one instance at least 99.95% of the time.

For any Single Instance Virtual Machine using premium storage for all Operating System Disks and Data Disks, Microsoft Azure guarantee you will have Virtual Machine Connectivity of at least 99.9%.

If these Microsoft service levels are not met by Microsoft, Cadcorp will aim to pass on any refunds that we receive from Microsoft to the customer.
Approach to resilience Two important aspects of resiliency are high availability and disaster recovery.

High availability is underpinned by the Microsoft Azure Guaranteed Availability SLA referenced in the previous question.

Disaster recovery is the ability to recover from rare but major incidents. This service provides options for geo redundancy including backup and load balancing.
Outage reporting Microsoft Azure provides a public notice page and email alerts can be set up to notify the application administrator of service outage.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Windows security on the server and Windows forms for the application administration.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Lloyd's Register Quality Assurance Ltd
ISO/IEC 27001 accreditation date 22/03/2019
What the ISO/IEC 27001 doesn’t cover The scope of the approval is design, development, installation and distribution of software for Geographic Information Systems. Associated
project management, application development, hosted services, customer training and consultancy services. Management of information security in relation to IT infrastructure and data in support of all company activities.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Cadcorp information security policies and processes have achieved certification to ISO 27001. It is the Policy of the company to ensure that:

Information will be protected against unauthorised access.

Confidentiality of information will be assured and valuable or sensitive information protected from unauthorised disclosure or intelligible interruption.

Integrity of information will be maintained to safeguard the accuracy and completeness of information by protecting against unauthorised modification.

Regulatory and legislative requirements will be met.

Business Continuity plans will be produced, maintained and tested, this will ensure that information and vital services are available to users when they need them.

Information security training will be available to all staff.

All breaches of information security, actual or suspected, will be reported to, and investigated by the Information Security Manager.

The Information Security Manager has direct responsibility for maintaining the Policy and providing advice and guidance on its implementation.

All managers are directly responsible for implementing the Policy within their business areas, and for adherence by their staff.

It is the responsibility of each employee to adhere to the Policy.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach The Cadcorp Quality Management System in compliance with ISO 9001 fully describes the Cadcorp configuration and change management processes.

All components of the service are tracked through their lifetime. For example software components are part of a formal software release cycle and are tracked through their lifetime using version control. Similarly changes and configurations to a service implementation are tracked within the Cadcorp customer support database using a unique reference ID.

Changes are assessed for potential security impacts inline with Cadcorp ISO 27001 Security Manual and security forms part of the Cadcorp software quality assurance testing.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach The Cadcorp vulnerability management process requires anti virus software to be installed on all servers. This software provides the server administrator Status and Detection reports to allow Cadcorp to assess potential threats.

Patches will be deployed inline with the time periods described within the Cadcorp SLA.

Information about potential threats comes from a wide range of stakeholders including the antivirus Status and Detection reports.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach The anti virus software installed on all servers allows Cadcorp to identify potential compromises. This software provides the server administrator Status and Detection reports that detail potential compromises. In house and external penetration testing is also used to identify potential compromises.

When a potential compromise is identified it will be classified inline with the Cadcorp SLA response categories.

Depending on the category Cadcorp will use our reasonable endeavors to respond within 4 to 8 working hours.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach All incidents should be reported to the Cadcorp support desk. The customer will receive a report ID number to use for subsequent enquires. If the incident is related to a common event the support desk will invoke a pre-defined process. Incident reports can be provided on request.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Public Services Network (PSN)


Price £975 per virtual machine per month
Discount for educational organisations No
Free trial available Yes
Description of free trial The trial service includes the full extent of core application functionality using sample data.

The trial service does not provide administration access, allow users to upload their own data, customise the application or access the API.

There is no time limit on access to the trial service.
Link to free trial

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑