GeoTime Enterprise
An On-Premise or Private Cloud Hosted Web Browser capability for importing CDR, ANPR, (XRY, UFED)... data, into a single analysis solution providing Quick, standard & bespoke reports, an intuitive GUI that Maps, Visualises, Filters, Attributes and Annotates the data whilst also enabling collaborative work and Cross Case searching.
Features
- Auto Import of NCDS Normalised JSON CDR Data
- Auto Import of Phone Download (UFED, XRY) Data
- User Templated Import of Raw CDR, GPS, ANPR, Finance, Loyalty....
- Import & Analysis of any; Time, Date, Positional Data
- GeoSpatial Mapping Overview and Replay
- 'Amazon Style' Filtering, 'Google Auto Populate Style' searching
- Map, Tabular, Pivot, Network and Activity views...
- Cross case, Cross Enterprise data searching
- Pattern Tools (Proximity to...)
- Export Standard Reports, Bespoke Reports, Screen Capture's
Benefits
- Rapid import of data utilising Auto Import Templates
- Enhanced productivity & data analysis through visualisation
- Cost effective use of and integration with NCDS Service Portal
- Single tool for Import, analysis, reporting and exporting.
- Full workflow for GeoSpatial Analysis (Data entry to court presentation)
- Auto Import of CSP Normalised JSON Files
- No OS or Database Licensing costs
- Integration with other on-premise service/databases for data attribution
- Accessibility from any Browser
Pricing
£42,580 a server
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
6 5 4 0 4 3 7 9 4 2 2 5 8 8 4
Contact
JTOL Limited
Duanne Watkins
Telephone: 03301075930
Email: duanne@jtol.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
-
- For Amazon Secure Cloud Hosted Service...
- - Client to provide VPN Endpoint
- - Client to provide preferred Browsers (I.E 11, Chrome, Firefox)
- For Client On Premise Hosting...
- - Minimum specifications servers and storage, physical or virtual required
- - Client to provide preferred Browsers (I.E 11, Chrome, Firefox)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Mon-Fri, Email Support question response time <4hrs :
Weekend, Email Support best effort. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Baseline Support (Included in License Costs)
>Telephone Support: 09:00 to 17:00 (UTC) Monday - Friday
Calls received outside of support hours are first forwarded to available support team members, followed by a backup answer phone service.
>Email Support: 09:00 to 17:00 (UTC) Monday - Friday
Emails received outside of support hours will be collected, however no action can be guaranteed until the next working day.
Advanced Tier
>Telephone Support: 09:00 to 21:00 (UTC) Monday - Friday
Calls received outside of support hours are first forwarded to available support team members, followed by a backup answer phone service.
>Email Support: 09:00 to 21:00 (UTC) Monday - Friday
Emails received outside of support hours will be collected, however no action can be guaranteed until the next working day.
Onsite assistance: Within 48 hours, Monday - Friday
Best effort will be applied to attend the same working day based on the severity of the issue. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite Training, Webinar Training and Documentation
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Cloud Hosted: Download from Service for fixed term after contract
On Premise: data is continually accessible. - End-of-contract process
-
Cloud Hosted: User access to the Service and limited file storage for a period of 6 months. For longer file storage costs may be incurred or negotiated.
For On Premise installations, no further updates or support are provided.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Information and guidance can be provided on request.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Localisation, data format support, data connectors...
Support and guidance will be provided on request.
Scaling
- Independence of resources
- Backend IT Services monitor resource usage and manage compute resources via virtual systems. Service provider is notified and can action and communicate to the user.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Uncharted Software Inc. (Canada)
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Export to local client, system or shared drive as CSV, Excel or PDF.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel (XLS, XLSX)
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- SLA availability on request
- Approach to resilience
- Available on Request
- Outage reporting
- Email from IT Support
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Limited access network (for example PSN)
- Username or password
- Other
- Other user authentication
- Integration with local AD services.
- Access restrictions in management interfaces and support channels
- A single administrative user is assigned during installation of the service on client intranets, this user may then authorise specific users for access to management interfaces.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Limited access network (for example PSN)
- Username or password
- Other
- Description of management access authentication
- Integration with Local AD Services.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International Ltd
- ISO/IEC 27001 accreditation date
- 24/08/2020
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Internal Security Officer
- Information security policies and processes
- As an SME VAR, all data is validated by either the MD or a Director for its sensitivity and secured appropriatley, either online in a cloud storage or if deemed sensitive as per UK GPM is stored offline and held in locked storage.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Application issues (feature requests, bugs) are managed in a database, issues are assessed for priority and risk. In priority order they are addressed and validated by our QA department. There are no specific flags for the vulnerability nor are there monitoring processes involved.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Threats and vulnerabilities are collated through customer engagement and monitoring of threat awareness sites.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Password and Security Protocol logging and key usage logging are monitored and retrievable by an authorised officer/user.
The admin or SPOC is notified.
Incidents are immediately reported to the admin or SPOC. - Incident management type
- Undisclosed
- Incident management approach
- Incidents are logged and managed internally and communicated to the system admin or SPOC.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Pricing
- Price
- £42,580 a server
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- For a designated period the Full Software Suite plus training and support will be made available to enable the user to assess the effectiveness of the software.