4 Earth Intelligence

TCarta ExploreMarine

TCarta's ExploreMarine allows users to view sample data sets, learn more about geospatial solutions, request sample data and quotes on specific products including: satellite-derived bathymetry, seafloor classification, and global 90m GIS packages. TCarta’s high-quality datasets inform a plethora of global marine projects and applications including: offshore, subsea, nearshore and onshore.


  • Delivered in ASCII gridded XYZU, GeoTIFF, or ESRI shapefile vectors
  • Interactive global map compatible with desktop or mobile
  • Compatible with all GIS domain systems
  • Sea-floor classification
  • 90m global GIS package
  • Satellite-derived bathymetry
  • Direct access to subject matter experts
  • Bespoke and customisable solutions for each client


  • High quality, affordable bathymetric data; cost-effective alternative to in-situ surveys
  • Environmentally friendly
  • No need for installation; accessible via desktop or mobile
  • Rapid submission of enquiries for bathymetric products and sample data
  • Data delivered is compatible with any GIS software
  • Constantly evolving datasets to deliver optimum results
  • Delivers marine data to meet multiple specifications
  • This dataset is ideal for many subsea, offshore projects, research
  • Satellite imagery, LiDAR, multibeam survey data, digitised nautical charts etc.
  • Direct access to TCarta’s subject matter experts for bespoke solutions


£6600 per unit per year

  • Free trial available

Service documents

G-Cloud 11


4 Earth Intelligence

Chris Burnett

0117 933 8562


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements Subscription-based licence

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our standard office operating hours are 9-5 Monday to Friday (excluding UK Bank Holidays). We are able to provide support during these hours only.

Average response time to questions is expected to be around 3 hours depending on the urgency of the query.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide basic support levels to subscribed users of our web service.

This is provided through email or phone, Monday to Friday, 9-5 (excluding UK public holidays).

There is no charge for this service.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started TCarta are pleased to provide customers a range of "getting started" documentation (accessible online or via PDF), an online training video, and for larger organisations, access to webinars and onsite training.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Data is delivered directly to the client for storage on their servers. No data will be held on the platform when the contract expires.
End-of-contract process Our service is a subscription based model; data is purchased in 100,000 sq km increasements.

Client keeps ownership of data upon expiration of contract.

Additional data packages are available at an additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our web app, is accessed via the internet browser and will adapt to whichever device you’re viewing them on.

We can confirm that there is no difference in the end product delivered or functionality based on whether you access this service via desktop or mobile.
Service interface No
What users can and can't do using the API Users cannot make changes to the service through the API; however they can use the service API to request the deliverable information (i.e outlining the AOI).

Web-based API configuration returns data to the user in a range of GIS domain compatible formats: likely in GeoTIFF or .shp.
API documentation No
API sandbox or test environment No
Customisation available No


Independence of resources High level of capacity plus back up servers where necessary.


Service usage metrics Yes
Metrics types Reports and alerts on the amount of data used
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Select AOI
Submit to server
Server clips and processes
Users can select desired format:

and a range of other GIS supported formats
Data export formats CSV
Data import formats Other
Other data import formats Shapefile for AOI

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks The data passed between networks is not sensitive. However we do implement the Secure Sockets Layer (SSL) protocol

SSL is supported by all currently available Web servers and Web browsers. The SSL protocol provides authentication, data encryption, and data integrity, in a public key infrastructure (PKI).

By providing strong, standards-based encryption and integrity algorithms, SSL provides users with confidence that data will not be compromised in the Internet.
Data protection within supplier network Other
Other protection within supplier network Access to our network is controlled, and ensures data is not vulnerable to attack during transmission across the network. We rely on anti-malware, firewalls and network segmentation to encrypt data and thus help to ensure its privacy and integrity. This ensures that:

Data remains confidential.
Data cannot be modified.

Availability and resilience

Availability and resilience
Guaranteed availability Through the deployment of multiple servers, we can guarantee a system availability of 99%.

Users will be notified well in advance of any planned maintenance that will result in service "downtime".

Unfortunately, as this service is internet access dependent, we cannot make any guarantees over third-party (i.e. users own access point) network availability.
Approach to resilience Available on request
Outage reporting Any planned maintenance or system outages will immediately be communicated to all users via email; and at portal login.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels None required; although this requirement can be facilitated via a "super user" administrative login; whereby admin approval is required prior to data being delivered to the end recipient within the organisation.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Effective leadership is the key to good security governance.

With this in mind, TCarta has implemented a security governance structure that has clearly defined roles and reporting lines.

Clear links have been established by those responsible for both personnel and cyber security, ensuring that there is an effective, joined up approach in our management of company security policies.

Policies are reviewed and updated on a regular basis to ensure compliance and to take into account any newly identified risks or threats.
Information security policies and processes TCarta has implemented an in-depth information security policy that is aligned with the principles of ISO 27001 and the requirements of Data Protection Act 1998. The policy has been implemented to ensure that all users or networks of the IT structure within TCarta's domain abide by the prescriptions regarding the security of data stored digitally within the boundaries of the TCarta system.

The policy covers (but is not limited to):

Acceptable use of email, internet and equipment;
Remote Access;
Data storage;
Change Management;
Classification of Data;
Minimum system security operating requirements;
Movement of Data;
Authority and Access Control.

Breaches of the information security policy are taken extremely seriously and are escalated directly to Board level. This ensures that any breach or threat is eliminated immediately.

The information security policy is communicated upon induction and is easily accessible within the staff intranet. Staff members are given access to regular training and are encouraged to feed in any improvements to the policy.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We conduct periodic reviews of our software development plan.

Each part of the development plan falls under our change management and planning workflow.

This includes configuration identification, control, status accounting and reporting, configuration and verification of audit and our incident management plan.

This allows us to carry out rigorous testing and analysis of each portion of our newly developed software to ensure that there are no internal or external security threats to end users.
Vulnerability management type Undisclosed
Vulnerability management approach As per the details contained within the Client agreed contract and SLA
Protective monitoring type Undisclosed
Protective monitoring approach As per the details contained within the Client agreed contract and SLA
Incident management type Undisclosed
Incident management approach We have a robust incident management process in place which is detailed in the flow chart below:

Incident identification
Incident logging
Incident categorization
Incident prioritization
Incident response
Initial diagnosis
Incident escalation
Investigation and diagnosis
Resolution and recovery
Incident closure.

Users are able to report incidents via email to our dedicated information service.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £6600 per unit per year
Discount for educational organisations No
Free trial available Yes
Description of free trial We are happy to offer a free trial to potential customers. Full access to the portal will be granted however downloads and delivery will be limited only to predefined sample data sets.

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑