JTOL Limited

GeoTime Enterprise

An On-Premise or Cloud Hosted Web Browser capability for importing CDR, ANPR, Phone download(XRY, UFED)...data, into a single Data Analysis solution that provides Quick Standard Reports, and an intuitive GUI that enables the user to Map, Visualise, Filter, Attribute, Annotate, collaborate and compile bespoke court ready reports.

Features

  • Auto Import of NCDS Normalised JSON CDR Data
  • Auto Import of Phone Download (UFED, XRY) Data
  • User Templated Import of GPS, ANPR, Finance, Loyalty....
  • Import & Analysis of any; Time, Date, Positional Data
  • GeoSpatial Mapping Overview and Replay
  • 'Amazon Style' Filtering, 'Google Auto Populate Style' searching
  • Map, Tabular, Pivot, Network and Activity views...
  • Cross case, Cross Enterprise data searching
  • Pattern Tools (Proximity to...)
  • Export Standard Reports, Bespoke Reports, Screen Capture's

Benefits

  • Rapid import of data utilising Auto Import Templates
  • Enhanced productivity & data analysis through visualisation
  • Cost effective use of and integration with NCDS Service Portal
  • Single tool for Import, analysis, reporting and exporting.
  • Full workflow for GeoSpatial Analysis (Data entry to court presentation)
  • Auto Import of CSP Normalised JSON Files
  • No OS or Database Licensing costs
  • Integration with other on-premise service/databases for data attribution
  • Accessibility from any Browser

Pricing

£47500 per server

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

7 3 2 4 9 2 1 0 3 1 3 6 0 6 2

Contact

JTOL Limited

Duanne Watkins

07785500325

duanne@jtol.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
Minimum Server/RAM requirement for initial installation

User support

Email or online ticketing support
Email or online ticketing
Support response times
Mon-Fri, Email Support question response time <4hrs :
Weekend, Email Support best effort.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Baseline Support (Included in License Costs)
Telephone Support: 09:00 to 17:00 (UTC) Monday - Friday
○ Calls received outside of support hours are first forwarded to available support team members, followed by a backup answer phone service.
● Email Support: 09:00 to 17:00 (UTC) Monday - Friday
○ Emails received outside of support hours will be collected, however no action can be guaranteed until the next working day.

Advanced Tier
Telephone Support: 09:00 to 21:00 (UTC) Monday - Friday
○ Calls received outside of support hours are first forwarded to available support team members, followed by a backup answer phone service.
● Email Support: 09:00 to 21:00 (UTC) Monday - Friday
○ Emails received outside of support hours will be collected, however no action can be guaranteed until the next working day.
● Onsite assistance: Within 48 hours, Monday - Friday
○ Best effort will be applied to attend the same working day based on the severity of the issue.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite Training, Webinar Training and Documentation
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Cloud Hosted: Download from Service for fixed term after contract
On Premise: data is continually accessible.
End-of-contract process
Cloud Hosted: User access to the Service and limited file storage for a period of 6 months. For longer file storage costs may be incurred or negotiated.
For On Premise installations, no further updates or support are provided.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
Yes
What users can and can't do using the API
Information and guidance can be provided on request.
API documentation
No
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Localisation, data format support, data connectors...
Support and guidance will be provided on request.

Scaling

Independence of resources
Backend IT Services monitor resource usage and manage compute resources via virtual systems. Service provider is notified and can action and communicate to the user.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Uncharted Software Inc. (Canada)

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Export to local client, system or shared drive as CSV, Excel or PDF.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • XLSX
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel (XLS, XLSX)
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA availability on request
Approach to resilience
Available on Request
Outage reporting
Email from IT Support

Identity and authentication

User authentication needed
Yes
User authentication
  • Limited access network (for example PSN)
  • Username or password
  • Other
Other user authentication
Integration with local AD services.
Access restrictions in management interfaces and support channels
A single administrative user is assigned during installation of the service on client intranets, this user may then authorise specific users for access to management interfaces.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Limited access network (for example PSN)
  • Username or password
  • Other
Description of management access authentication
Integration with Local AD Services.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Internal Security Officer
Information security policies and processes
As an SME VAR, all data is validated by either the MD or a Director for its sensitivity and secured appropriatley, either online in a cloud storage or if deemed sensitive as per UK GPM is stored offline and held in locked storage.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Application issues (feature requests, bugs) are managed in a database, issues are assessed for priority and risk. In priority order they are addressed and validated by our QA department. There are no specific flags for the vulnerability nor are there monitoring processes involved.
Vulnerability management type
Undisclosed
Vulnerability management approach
Threats and vulnerabilities are collated through customer engagement and monitoring of threat awareness sites.
Protective monitoring type
Undisclosed
Protective monitoring approach
Password and Security Protocol logging and key usage logging are monitored and retrievable by an authorised officer/user.
The admin or SPOC is notified.
Incidents are immediately reported to the admin or SPOC.
Incident management type
Undisclosed
Incident management approach
Incidents are logged and managed internally and communicated to the system admin or SPOC.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Pricing

Price
£47500 per server
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
For a designated period the Full Software Suite plus training and support will be made available to enable the user to assess the effectiveness of the software.

Service documents

Return to top ↑