Unify Mobile Detection System (UMDS) mobile phone removal for prison
The Unify Mobile Detection System (UMDS) is an effective and affordable solution enabling covert mobile phone detection in a secure environment. Using surveillance instead of blocking, UMDS is 100% legal and provides an accurate solution to eliminate unwanted mobiles in prisons. The UMDS is undetectable and operates with autonomy 24/7.
- 100% covert with no visible evidence the UMDS is present.
- Multiple detection and monitoring sites coordinated by a central server.
- Detects signal strength -60 to 0db.
- Tri-band operation on 900, 1800 and 2100Mhz within the UK.
- Eliminates false positives by filtering out other sources.
- Tamper-proof – self tests and monitors to guard against disablement.
- Phone detection fully monitored and archived
- Live alerts delivered via text message, email, Windows software.
- Fully legal option to control mobile phones within secure facilities.
- Site-tailored reporting system.
- Reduces security risks to prisons by eliminating mobile phones.
- Reduces criminal activity organised from within a prison environment.
- Live alerts assist prison staff with confiscating unauthorised mobiles.
- Can be self-funded through efficiencies made in each organisation.
- Can be fully customized to meet individual requirements.
- Detects all mobile usage i.e. emails, texts and calls.
- Simple way to intercept and seize mobiles in secure environments.
- Works as detector not blocker so therefore no legal considerations.
- Can be incorporated into pre-existing structured cabling.
- Integrates fully with the Unify Call Control System (UCCS).
£0.82 per person per day
- Free trial available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
Unify Business Solutions Limited
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||Designed to be used within a secure facility - the use would be limited outside of this environment.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||4 Hours responce|
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Onsite support|
|Support levels||Fully inclusive maintenance charged on a monthly/quarterly or annual basis. Online and telephone support is offered 24/7, 365 days a year with a 4 hour response time.|
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||Unify allow three days for onsite training, included in the overall cost. A users guide/manual can also be provided.|
|End-of-contract data extraction||Data can be retrieved at any point in time by either database level extraction or export to Excel in the client software.|
|End-of-contract process||Included within the contract is all relevant software for UMDS along with UMDS detectors. Additional costs could be server hardware and LAN switches dependent on quantities.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|What users can and can't do using the API||API allows data retrieval (all detections). Cannot commit any wrights i.e. detections, this is to say the API is entirely read only.|
|API sandbox or test environment||Yes|
|Description of customisation||
Customisation would be on request and administered by Unify.
Customisation to mapping, location data, other user interface cosmetics such as logo.
|Independence of resources||By providing dedicated hardware we can affirm in advance the maximum concurrent capacity of the system. This would mean that users engaging the system at or beyond it's concurrent limit would be denied access to the system thus preserving function for the current users.|
|Service usage metrics||Yes|
|Metrics types||Concurrent and cumulative call and user statistics.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||All detections can be exported via client software as CSV files.|
|Data export formats||CSV|
|Data import formats||Other|
|Other data import formats||Not applicable|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||
Availability and resilience
SLA's are agreed in consultation with the customer and service availability is similarly a product of discussion around security risk tolerance with regard to patching and associated downtime.
We typically achieve in excess of a 99.9% up time.
|Approach to resilience||In broadly generic terms all pieces of equipment are deployed alongside one or more failover counterparts. All pieces of equipment are automatically monitored for health and their redundant counterparts take control unbidden.|
|Outage reporting||Private health monitoring of low-level system health is available to Unify, high-level system health data is available to the user through our maintenance utility.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||2-factor authentication|
|Access restrictions in management interfaces and support channels||LDAP authentication is used to control access to our management interface by integration with the customers own active directory infrastructure.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||2-factor authentication|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||British Assessment Bureau|
|ISO/IEC 27001 accreditation date||11/10/2013|
|What the ISO/IEC 27001 doesn’t cover||Our ISO 27001 certification is complete as per the 2015 standards.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||We are ISO 9001 and 27001 accredited.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Change is requested, requester, change details, impact, testing and rollback procedures are logged. Approval required by both the customer and Unify before change is carried out. All changes tracked in a change log.
Changes are assessed for security implications at the time of request and dealt with accordingly.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
All inbound network traffic is restricted based on endpoint and port and deviations from these are reviewed for their threat level.
We periodically assess the contents of the firewall logs to check for new vulnerabilities and/or threats.
We have a scripted rolling rebuild on a cycle agreed with the customer to suit their downtime tolerance. This rebuild process always delivers an up to date system and thus negates entirely the risk of patching and associated testing overheads.
Information regarding potential threats comes from a trusted security partner.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
We periodically check firewall logs to identify potential compromises, along with file integrity of each component of our system.
Our response would be tailored to the customer's specific wishes, but taking into account the nature of the potential compromise and the degree of risk associated with it.
Customers would be notified immediately of a system compromise.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
We ascertain the number of individuals affected, the type of data involved and the impact on the particular system(s).
Incidents are reported to the Directors of the business. The report includes full details of the incident including the person reporting, type of data involved and if the data relates to individuals (and if so how many).
An investigation is conducted by a designated individual who creates a formal incident report which depending on the type of incident is either filed internally or sent to the appropriate customer.
We have pre-defined processes for common events.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£0.82 per person per day|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||A small-scale trail either based in a live or non-live environment - Unify will cover all costs associated with the trail with the exception of cabling.|