UrbanTide Limited

USMART

USMART is a next generation data sharing platform suitable for open data publication, private data sharing and data monetisation. It features standards based metadata, flexible access permissions, automatically generated data APIs and supports reference, batch and real-time data.

Features

  • Open data publication
  • Private data sharing
  • Data monetisation
  • Real-time data sharing
  • Automatically generated data APIs
  • Collaborative data work
  • Data visualistion (graphs and maps)
  • Data consumer community (developers and data scientists)
  • Secure data repository
  • Scalable data platform

Benefits

  • Generate value from data
  • Innovate by solving problems with data
  • Reuse data stored in siloes
  • Create organisational transparency
  • Collaborate with the data community
  • Share data and knowledge with partners
  • Transform your organisation with data sharing
  • Generate revenue from data
  • Share real-time insight into service performance
  • Democratise information sharing

Pricing

£0 to £3000 per unit per month

  • Free trial available

Service documents

G-Cloud 9

795562765921580

UrbanTide Limited

Steven Revill

07921912422

steven.revill@urbantide.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints N/a
System requirements
  • Web browser
  • Internet capable device

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 hours during business hours
Next business day at weekends
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible We are using a solution provided by a third party (Slack).
Slack is committed to improving accessibility of their product.
Web chat accessibility testing We are using a solution provided by a third party (Slack). No web chat testing with assistive technology users was carried out by UrbanTide.
Onsite support Yes, at extra cost
Support levels Day-to-day USMART product support is already included in SaaS subscription pricing.

Additional help with data sharing, opening up datasets, training and monetisation is available as part of our standard consultancy offering.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Online training
Onsite training (chargeable)
User documentation
User community on Slack
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Email or phone to request cancellation of subscription.
Data will be provided in open formats and made available for download.
End-of-contract process No additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No differences.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing None so far, but interested in collaboration on this.
API Yes
What users can and can't do using the API All functionality is available though our API.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available No

Scaling

Scaling
Independence of resources Our product is based on independently scalable microservices. We monitor load on each service and scale it accordingly.
Our storage endpoints are based on a data lake architecture, providing unlimited storage capabilities.
Our processing services are also fully scaleable.
User interface files are delivered via a CDN.

Analytics

Analytics
Service usage metrics Yes
Metrics types System management activity
Data entry activity
Data consumption activity
Reporting types
  • API access
  • Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach System administrators can request data extracts via email or phone.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • XML
  • REST API
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • XML
  • Shapefile
  • MapInfo table
  • GML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We can provide SLAs for 99.9% availability (excluding agreed maintenance). Users can request a refund for periods of no service if we do not meet this level of availability.
Approach to resilience Available on request.
Outage reporting Public dashboard.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels User permissions control which areas of the application can be accessed by specific users. Support channels are also controlled via user accounts.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach We are using an information security risk management methodology and our security strategy is explicitly linked with business and IT
objectives.
Our security policies address each aspect of strategy, control and regulation and we monitor our processes to ensure compliance.
We continuously evaluate and update our security policies,
standards, procedures and risks assessments.
Information security policies and processes Security issues have to be reported to the Chief Technology Officer who is in charge of organisational information security.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change is managed through our integrated software release management process which includes testing of all changes before deployment to the production system. This process also manages the tracking of software versions which allows us to control what versions are released at any point in time.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We monitor whether any of the components used in our solution have vulnerabilities and are able to patch vulnerabilities as soon as they occur. We can do this as part of our automated continous deployment process without incurring downtime for the users.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We are monitoring and tracking access to our services and their performance. Once suspicious activity is identified we can suspend affected services to investigate the cause of the issue. We will inform affected clients if services are compromised and keep them up-to-date with our efforts to remedy the situation.
Incident management type Supplier-defined controls
Incident management approach Incidents should be reported via our online support pages. Updates to incident reports are provided via email as soon as an incident status changes. Users can track the status of their reports via their online support account.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £0 to £3000 per unit per month
Discount for educational organisations No
Free trial available Yes
Description of free trial We offer a FREE subscription plan which provides basic open data publication functionality for up to three users.
You can also request a trial our PLUS subscription plan for 1 month which additionally includes unlimited data publishers, data APIs, map visualisation, data conversion and data stories.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑