XMAP Feeds - A-Z Digital Mapping
This service provides WMS and WMTS feeds of A-Z Digital Mapping datasets.
A-Z Digital Mapping data gives you iconic professional cartographic mapping for cities all over the UK.
XMAP Feeds can stream into QGIS, ESRI ArcGIS or XMAP, for example.
- Web mapping service
- Web map tile service
- Compatible with ESRI ArcGIS, QGIS, XMAP and other GIS
- Cross-department working improved
- Ensure everyone is working from single source of truth
- Reduce local ICT load
£0.002 per transaction per month
- Education pricing available
- Free trial available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
XMAP Cloud GIS
However, it can be used as a standalone service by connecting to any OGC-compliant GIS package that supports WMS/WMTS
|Cloud deployment model||Private cloud|
|Service constraints||Service limited to OGC-compliant software.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Typically within 1 hour within business hours.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Unlimited off-site support during 1st month of on-boarding then 6 support tickets per year.
Tickets are not counted if the issues was the fault of the supplier.
Tickets may not be counted at the discretion of the supplier.
Batches of 6 additional support tickets can be purchased for £300.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Remote training and knowledge base articles to help with on-boarding.|
|End-of-contract data extraction||Not applicable.|
|End-of-contract process||At the end of the contract, the service will expire. Any customer data will be provided back in industry standard formats.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Independence of resources||Nodes are load balanced to deal with high demands.|
|Service usage metrics||Yes|
Number of users.
Number of hits per user per month.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||Less than once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Other|
|Other data at rest protection approach||Data is held behind access-controlled storage.|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Data available in industry standard formats at end of contract.|
|Data export formats||Other|
|Other data export formats||
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
GeoXphere's SLA offer's 99.9% availability for its online services (with 99.999% up-time on data centre).
Full SLA documentation is available separately on request. If GeoXphere do not meet the guaranteed levels of availability then a percentage of the annual fee may be refunded, which will be agreed with the customer on a case by case basis. To date this has never been required.
|Approach to resilience||
Our cloud software and services run on high availability virtualised servers.
Each hardware node gives a 99.999% up-time.
In turn, each component of our services operate in a load-balanced environment, giving resilience should one node fail.
We have active monitoring services in place that constantly assess web services and node performance. They automatically restart services should an issue be identified.
Should services fail an no automatic recovery is possible, the load balancer takes the affected node out of the loop and redirects to the functional nodes. Our technical team are immediately notified to prompt an action.
Off-site snapshots are taken regularly.
|Outage reporting||Email alerts are immediately issued to customer administrators to inform them of any interruption of service, along with a regular update regarding the repair & fix, letting them know that service is available again.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Admin Panel access is restricted by username and password given to a customer administrator.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 6 months and 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||We are building up our Information Security policies and processes and these will be provided to customers on request. Incident management forms part of the Security Incident Reporting Policy as part of the ISO27001 Information Security Management System.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Our service is developed and maintained using a source control system and code repository.
Our service goes through beta testing before being made available to all.
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Our datacentre firewall detects and allows action to potential threats. These threats are assessed by our IT team and action is put into place.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Regular internal reports are carried out to assess for inappropriate use of the service. Action may involve closing of user or organisation accounts.|
|Incident management type||Undisclosed|
|Incident management approach||We have a number of internal processes in place but are working towards recognised standards.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£0.002 per transaction per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Transaction-limited account.|