TCarta's ExploreMarine allows users to view sample data sets, learn more about geospatial solutions, request sample data and quotes on specific products including: satellite-derived bathymetry, seafloor classification, and global 90m GIS packages. TCarta’s high-quality datasets inform a plethora of global marine projects and applications including: offshore, subsea, nearshore and onshore.
- Delivered in ASCII gridded XYZU, GeoTIFF, or ESRI shapefile vectors
- Interactive global map compatible with desktop or mobile
- Compatible with all GIS domain systems
- Sea-floor classification
- 90m global GIS package
- Satellite-derived bathymetry
- Direct access to subject matter experts
- Bespoke and customisable solutions for each client
- High quality, affordable bathymetric data; cost-effective alternative to in-situ surveys
- Environmentally friendly
- No need for installation; accessible via desktop or mobile
- Rapid submission of enquiries for bathymetric products and sample data
- Data delivered is compatible with any GIS software
- Constantly evolving datasets to deliver optimum results
- Delivers marine data to meet multiple specifications
- This dataset is ideal for many subsea, offshore projects, research
- Satellite imagery, LiDAR, multibeam survey data, digitised nautical charts etc.
- Direct access to TCarta’s subject matter experts for bespoke solutions
£6600 per unit per year
- Free trial available
4 Earth Intelligence
0117 933 8562
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|System requirements||Subscription-based licence|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Our standard office operating hours are 9-5 Monday to Friday (excluding UK Bank Holidays). We are able to provide support during these hours only.
Average response time to questions is expected to be around 3 hours depending on the urgency of the query.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
We provide basic support levels to subscribed users of our web service.
This is provided through email or phone, Monday to Friday, 9-5 (excluding UK public holidays).
There is no charge for this service.
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||TCarta are pleased to provide customers a range of "getting started" documentation (accessible online or via PDF), an online training video, and for larger organisations, access to webinars and onsite training.|
|End-of-contract data extraction||Data is delivered directly to the client for storage on their servers. No data will be held on the platform when the contract expires.|
Our service is a subscription based model; data is purchased in 100,000 sq km increasements.
Client keeps ownership of data upon expiration of contract.
Additional data packages are available at an additional cost.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Our web app, is accessed via the internet browser and will adapt to whichever device you’re viewing them on.
We can confirm that there is no difference in the end product delivered or functionality based on whether you access this service via desktop or mobile.
|What users can and can't do using the API||
Users cannot make changes to the service through the API; however they can use the service API to request the deliverable information (i.e outlining the AOI).
Web-based API configuration returns data to the user in a range of GIS domain compatible formats: likely in GeoTIFF or .shp.
|API sandbox or test environment||No|
|Independence of resources||High level of capacity plus back up servers where necessary.|
|Service usage metrics||Yes|
|Metrics types||Reports and alerts on the amount of data used|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||No|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||
Submit to server
Server clips and processes
Users can select desired format:
and a range of other GIS supported formats
|Data export formats||CSV|
|Data import formats||Other|
|Other data import formats||Shapefile for AOI|
|Data protection between buyer and supplier networks||Other|
|Other protection between networks||
The data passed between networks is not sensitive. However we do implement the Secure Sockets Layer (SSL) protocol
SSL is supported by all currently available Web servers and Web browsers. The SSL protocol provides authentication, data encryption, and data integrity, in a public key infrastructure (PKI).
By providing strong, standards-based encryption and integrity algorithms, SSL provides users with confidence that data will not be compromised in the Internet.
|Data protection within supplier network||Other|
|Other protection within supplier network||
Access to our network is controlled, and ensures data is not vulnerable to attack during transmission across the network. We rely on anti-malware, firewalls and network segmentation to encrypt data and thus help to ensure its privacy and integrity. This ensures that:
Data remains confidential.
Data cannot be modified.
Availability and resilience
Through the deployment of multiple servers, we can guarantee a system availability of 99%.
Users will be notified well in advance of any planned maintenance that will result in service "downtime".
Unfortunately, as this service is internet access dependent, we cannot make any guarantees over third-party (i.e. users own access point) network availability.
|Approach to resilience||Available on request|
|Outage reporting||Any planned maintenance or system outages will immediately be communicated to all users via email; and at portal login.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||None required; although this requirement can be facilitated via a "super user" administrative login; whereby admin approval is required prior to data being delivered to the end recipient within the organisation.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 6 months and 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 6 months and 12 months|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Effective leadership is the key to good security governance.
With this in mind, TCarta has implemented a security governance structure that has clearly defined roles and reporting lines.
Clear links have been established by those responsible for both personnel and cyber security, ensuring that there is an effective, joined up approach in our management of company security policies.
Policies are reviewed and updated on a regular basis to ensure compliance and to take into account any newly identified risks or threats.
|Information security policies and processes||
TCarta has implemented an in-depth information security policy that is aligned with the principles of ISO 27001 and the requirements of Data Protection Act 1998. The policy has been implemented to ensure that all users or networks of the IT structure within TCarta's domain abide by the prescriptions regarding the security of data stored digitally within the boundaries of the TCarta system.
The policy covers (but is not limited to):
Acceptable use of email, internet and equipment;
Classification of Data;
Minimum system security operating requirements;
Movement of Data;
Authority and Access Control.
Breaches of the information security policy are taken extremely seriously and are escalated directly to Board level. This ensures that any breach or threat is eliminated immediately.
The information security policy is communicated upon induction and is easily accessible within the staff intranet. Staff members are given access to regular training and are encouraged to feed in any improvements to the policy.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
We conduct periodic reviews of our software development plan.
Each part of the development plan falls under our change management and planning workflow.
This includes configuration identification, control, status accounting and reporting, configuration and verification of audit and our incident management plan.
This allows us to carry out rigorous testing and analysis of each portion of our newly developed software to ensure that there are no internal or external security threats to end users.
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||As per the details contained within the Client agreed contract and SLA|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||As per the details contained within the Client agreed contract and SLA|
|Incident management type||Undisclosed|
|Incident management approach||
We have a robust incident management process in place which is detailed in the flow chart below:
Investigation and diagnosis
Resolution and recovery
Users are able to report incidents via email to our dedicated information service.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£6600 per unit per year|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||We are happy to offer a free trial to potential customers. Full access to the portal will be granted however downloads and delivery will be limited only to predefined sample data sets.|