Envitia Data Platform for Intelligence
Envitia specialises in open standards GI software and systems for managing, analysing and exploiting information related to time and space for Intelligence, National Security and Special Forces organisations. Envitia technology enables fusion of multiple facets of information geospatial, imagery, social media and multi-media to allow better insight and awareness.
- Open Standards based location information management and discovery solution
- Generate a “register of registers” for enterprise wide information
- Harvesting and cataloguing of a range of federated intelligence sources
- Authentication and access control module for managing ‘communities of interest’
- Manages automated process work-flows for delivering multi-intelligence analysis functions
- Rapidly assemble agile workflows to orchestrate new analysis requirements
- Intelligence can be shared with connected and disconnected parties
- Integrate big-data/NoSQL/Data stores/databases/event feeds/document and imagery repositories
- Visualise information in coordinated and interlinked way, via central application
- Rapid access to complete range of information available
- Open standards interfaces avoid costly vendor lock-in
- Easy comprehension and exploitation of information using visualisation techniques
- Understand intelligence as a whole, drawing more accurate conclusions
- Trace provenance and reliability of information to ensure supported decisions
- Extensible solution exploiting COTS and Open Source technologies
- Compliant with international Defence and Security standards
- Access to the overall intelligence picture
- Interoperability of this technology allows for integration with existing systems
- Allows different roles access to data relevant to them
£20200 per unit per quarter
- Free trial available
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||Minimum configuration 16 core, 64 GB RAM, 500GB Disk storage|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Acknowledgement within 24 Hours (Monday to Friday 0900-1700)|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Envitia shall use best efforts within a practical schedule to solve problems with the Software reported to Envitia by Customer (whether by telephone, writing or email) and to provide a work around. Problems will be categorised as follows:
• Level 1, critical or high priority problem will receive an urgent response to provide an operational workaround. The objective shall be to use constant effort to provide a temporary solution within 5 days.
• Level 2, significant or serious problem with functionality may involve a temporary solution. The objective shall be to provide a workaround within 10 days.
• Level 3, minor problem or enhancement will involve a workaround where possible within 90 days and to endeavour to incorporate it into the next practical release.
Envitia's standard support is included in the list price detailed in the service pricing document.
|Support available to third parties||No|
Onboarding and offboarding
Envitia will provide user documentation and onsite training for organisations who have purchased the service.
Envitia will assist the customer in the setup and configuration of the GeoRegistry and the web processing services, and in other actions required to initialise the services, including implementing business-specific web processing service configuration.
|End-of-contract data extraction||
Envitia will provide a simple and quick exit process for the customer and will return all consumer generated data (e.g. content, metadata, structure, configuration etc.).
If data will not be available for extraction, a list of data will be published. The data will be extracted in the data formats that it was originally supplied in.
Envitia will purge and destroy consumer data from any computers, storage devices and storage media that are to be retained by the Supplier after the end of the subscription period and the subsequent extraction of consumer data (if requested by the consumer).
|End-of-contract process||Data extraction/removal is included in the contract price|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Description of customisation||
Envitia GEOINT solution for Government is a open standards based extensible component based technology which allows for the integration of Envitia propriety and 3rd party web services.
(contact email@example.com for a list of supplementary available web services)
Content within the web portal can be customised through the use of the Envitia GeoRegistry component.
|Independence of resources||
Storage is sold based on fixed IOPS, meaning performance is guaranteed irrespective of other user requirements. We can also provide dedicated virtual and bare metal resource for customers who want to further protect their environment.
All customers pay for reserved bandwidth. Carrenza monitor shared inbound connections at our peering level. If a customers usage becomes unusually high we will be alerted. Where necessary customers traffic will be restricted or black holed (in a DDoS attack) to protect our other customers bandwidth requirements. DDoS service options, both Layer 3/4 and Layer 7, are available as chargeable services should customers require.
|Service usage metrics||Yes|
|Metrics types||Envitia offers real time monitoring on the availability status of your VM on the network, running services, memory consumption, and disk consumption. Graphing is provided for performance of CPU, Memory, Disk and Network.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||Physical access control, complying with CSA CCM v3.0|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Export options are available in the portal to export the data depending on type. Exports include metadata and data in various formats.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||Standard availability for software is 99.6% (Software only)|
|Approach to resilience||All components have been built in fully resilient pairs. With fully resilient networking links between all components and to external third parties, including multiple ISPs. For host availability Carrenza use VMware’s HA failover for redundancy.|
|Outage reporting||All infrastructure is monitored on the network 24/7. Should there be an outage monitoring alerts are sent to the Carrenza operations team via e-mail and SMS.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Only authorised contacts are granted access rights to Carrenza allowing them to connect to the secure VPN to manage their service. The Service Desk for support will only accept requests from authorised contacts. Communication with anybody at Carrenza will need to be pre-approved by a known individual in writing.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||Less than 1 month|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Who accredited the PCI DSS certification||Teamwork IMS|
|PCI DSS accreditation date||16/06/2016|
|What the PCI DSS doesn’t cover||
The following are out-of-scope of our cloud hosting provider Carrenza’s AOC:
Physical space (co-location)
3-D Secure Hosting Provider
Shared Hosting Provider
Applications / software
Terminal Management System
POS / card present
Internet / e-commerce
MOTO / Call Center
|Other security certifications||Yes|
|Any other security certifications||PSN Compliance Certified|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Envitia try to follow best practice as set out in ISO 27002.
Our cloud hosting provider Carrenza operate a holistic approach to our security governance practices that focus on both the technology and the people and processes that operate the business. Carrenza's risk management strategy is driven by our vision, goals and objectives.
|Information security policies and processes||
Our cloud hosting provider Carrenza complies with all ISO 27001:2013 controls and associated policies except A.14.2.1 Secure development policy (NEW) and A.14.2.7 Outsourced development as Carrenza do not develop software. Carrenza also adhere to the additional requirements set-out within PCI-DSS v 3.2 and have additional supporting processes in place to ensure continuation of compliance for these services, such as cardholder data scanning, enhanced weekly and also quarterly external approved scanning vendor (ASV) vulnerability scanning. Carrenza also comply with our PSN CoCo which is aligned to our security principles that allows us to deliver our customers PSN Secure and Protect.
Carrenza operate a rolling internal audit programme to ensure continuity of compliance to our various accreditations , as well as internal technical auditing of our systems through the use of various integrity checks. This is ensures that there is always a fully justified and documented Change Request for any modification of our secure systems.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||Change management is performed for all changes at Envitia. All non-standard changes must be pre-authorised by going through a peer, senior and CAB approval process. Standard changes are created in template form and are approved in CAB before being implement into Change controls.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||Our cloud hosting provider Carrenza run an internal penetration test once a week. All reported vulnerabilities that are reported are categorised into priority depending on the severity and a case is logged with the operation team who will fix the vulnerability under the time frames dictated by Carrenza security standards. This conforms to the PCI-DSS standard.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||Our cloud hosting provider Carrenza have a protective monitoring system where all logs are centralised and checked on a daily basis for security breaches using several key search filters. Alerts are sent out for high risk activity and are pro-actively responded to by the operations and security teams. This conforms to the PCI-DSS standard.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||Carrenza operate an ITIL aligned incident management process with associated procedures for security related incidents. The process has a clearly defined governance framework, including roles & responsibilities, clear policies and associated KPIs. This process conforms to PCI-DSS.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£20200 per unit per quarter|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Contact firstname.lastname@example.org for further information|