CommandCentral Aware

CommandCentral Aware provides a common operational picture through the real-time aggregation, correlation and analysis of systems and disparate data sources including CAD, records systems, video feeds, local and/or national public safety related data sources, social media, asset and resource information, radio console connectivity.


  • Real-time common operating picture to increase situational awareness
  • Geospatial mapping
  • Synopsis of fixed/mobile streaming video sources
  • Streamlined, intuitive management of data and multimedia from disparate systems
  • Unified voice and data collaboration. User-centric workflow and automation.
  • Mapping showing location of all resources and events
  • Video panel showing live&recorded video from all connected cameras
  • Monitoring tables showing all alarms and events coming into system


  • Enables real-time data management for faster analysis
  • Improves threat detection and alerting
  • Intuitive management of data and multimedia from disparate systems
  • Ensures unified voice and data collaboration
  • Improves visibility of current events and resources
  • Enables live video without sacrificing other on-screen information
  • Easy visibility of all incoming alarms and events


£16000 per licence per year

Service documents

G-Cloud 10



Andy Glover


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No.
System requirements
  • Accessed by web browser on suitable desktop computer
  • Flash enabled – Video content is viewed using Adobe Flash

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard support is included with the service. Users may raise a case 24/7 via helpdesk. Customers may also contact their Business Relationship Manager. Resolver groups for faults 24/7. Resolver groups for changes and requests Mon - Fri 9-5. Response target within 2 working days.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard support is included with the service. Users may raise a case 24/7 via helpdesk. Customers may also contact their Business Relationship Manager. Resolver groups for faults 24/7. Resolver groups for changes and requests Mon - Fri 9-5. Response target within 2 working days.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Welcome pack and technical onboarding support. Training as required.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data can be extracted and/or deleted at the end of the contract as defined in the Offboarding process.
End-of-contract process At the end of the contract, should the Customer decide to discontinue use of the Service, the Supplier will support the Customer in extracting their data for an agreed period. If the data is not extracted within the agreed Off boarding period, it will be deleted.

Using the service

Using the service
Web browser interface Yes
Supported browsers Chrome
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Not applicable
Accessibility testing Not applicable
What users can and can't do using the API Integrate 3rd party systems to allow ingress of video, audio, alerts and other data.
API documentation No
API sandbox or test environment No
Customisation available Yes
Description of customisation By choosing the systems they wish to connect with CommandCentral Aware. I.e. which surveillance system, which facial ID software etc.


Independence of resources Our architecture is dynamically scalabe and continuously monitored to assure that the service is unaffected by variances in demand.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach A specific user interface feature is provided to extract data from CommandCentral Aware. Bulk data export can be provided and supported by Airwave at additional cost.
Data export formats Other
Other data export formats
  • AVI
  • Metadata
  • CAD Data
  • Data sourced from other systems
Data import formats Other
Other data import formats Dependent on connectors and data format requirements.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Commercially reasonable efforts will be made to ensure monthly availability of 99.9%. This is not guaranteed due to other components of the solution impacting availability.
Approach to resilience Our architecture consists of multiple instances of backend services with load balancing dynamically managing demand and resilience.
Outage reporting Email

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels Internal User Database or Active Directory Integration
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information No audit information available
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 LRQA
ISO/IEC 27001 accreditation date 01/12/2015
What the ISO/IEC 27001 doesn’t cover No exclusions
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We have our own internal business and process security policies supporting our ISO/IEC 27001 certification

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configure, Audit, Validate, Report exceptions, investigate exceptions, resolve.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Identify vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls, monitor effectiveness of controls
Protective monitoring type Supplier-defined controls
Protective monitoring approach Collect events, look for pattern anomalies, report, manage through incident management
Incident management type Supplier-defined controls
Incident management approach Categorise, Prioritise, Triage, Diagnose, resolve, resolution and recovery, close incident

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Other


Price £16000 per licence per year
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑