Motorola Solutions UK Limited

Wave OnCloud

WaveOnCloud provides secure, encrypted, Push-To-Talk (PTT) group and team communication using smartphones and tablet devices over WiFi and mobile networks. Supporting desktop and mobile communications with individual and group text messaging, WaveOnCloud enables collaboration between mobile and office teams using VOIP (Voice Over IP) on existing devices (BYOD).


  • Secure Push-To-Talk (PTT) service for desktop and smartphones
  • Voice and text group communication across tablets and smartphones
  • Supported on iPhone, iPad, Android phones and tablets
  • Scalable up to thousands of users and hundreds of channels
  • Efficient group and individual text messaging
  • High availability supported through resilient deployment architecture
  • Location, presence and status sharing across users
  • Web application supported in Firefox and Chrome
  • AES256 bit encrypted individual and group communications


  • Instant and efficient Push-To-Talk team communication for voice and text
  • Users can communicate across diverse desktop and mobile platforms
  • Define user profiles based on roles and operational requirements
  • Connect to users regardless of geographical location
  • Use across any IP network; WiFi, 4G, 3G, private, Internet
  • Fast deployment to existing mobile devices (BYOD)
  • Low monthly subscriptions
  • Resilient architecture ensures continued operation in challenging environments
  • Users can share location information for efficiency and security


£120.00 to £200.00 per unit per month

Service documents

G-Cloud 10


Motorola Solutions UK Limited

Andy Glover


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Maximum number of Talkgroups is 20
System requirements IOS or Android or HTML5 Chrome & Firefox Desktop Browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard support is included with the service. Users may raise a case 24/7 via helpdesk. Customers may also contact their Business Relationship Manager. Resolver groups for faults 24/7. Resolver groups for changes and requests Mon - Fri 9-5. Response target within 2 working days.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels Standard support is included with the service. Users may raise a case 24/7 via helpdesk. Customers may also contact their Business Relationship Manager. Resolver groups for faults 24/7. Resolver groups for changes and requests Mon - Fri 9-5. Response target within 2 working days.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started They receive an an introductory email with an explanation of steps to follow.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Data is not exportable.
End-of-contract process Users continue through contract renewal or are deactivated.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Admin & reporting functions are accessable via web app only
Accessibility standards None or don’t know
Description of accessibility Not tested
Accessibility testing Not tested
Customisation available Yes
Description of customisation Administrator can create PTT talkgroups and change/add/remove users to talkgroups


Independence of resources System applications are designed to operate in redundant mode. Solution is based on Amazon's AWS cloud to ensure further up-time and redundancy based on Amazon implementation.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations Other locations
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach Android:
·Username,password,server data the user inputs stored&encrypted in private internal storage.
·User-configuration data stored unencrypted,in private internal storage.
·Log statements parsed to remove private information.
·Log files saved unencrypted,in private internal storage
·Username,Password,ServerAddress,selected Profile ID stored encrypted in iOS Keychain.
·User preferences stored unencrypted in application sandbox directory.
·Up to 7 days logs stored in plain text in application sandbox directory.Password data redacted from logs.
·WebCommunicator persists user settings to allow continuity of the user experience between fresh page load sessions.
·The data is persisted using local storage capabilities built into browser.
·Transient,in-memory data doesn't persist between sessions.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data is not exportable.
Data export formats Other
Other data export formats Data is not exportable.
Data import formats Other

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Response times are dependant upon Severity Level (SL).
SL1 - catastrophic failure of critical features -1 day response;
SL2 - failure that limits normal use of major features - 2 working days response;
SL3 - failure that does not prevent use of the application - 5 working days response;
SL4 - does not cause any real operational impact - 10 working days response
Approach to resilience The system design consists of fully redundant servers that are deployed with load balancing applied.
At least two instances are hosted in different availability zones in a region in Amazon's AWS cloud. Availability zones in the region are geographically separated in different data centres.
Outage reporting The system is deployed in Amazon's AWS cloud, and servers are monitored with alarms that trigger the WaveOnCloud DevOps Administration team if a service affecting issue arises.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Access is granted based on user role
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We have our own internal governance that supports the ISO/IEC 27001 standard
Information security policies and processes We have our own internal business and process security policies supporting the ISO/IEC 27001 standard

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configure, Audit, Validate, Report exceptions, investigate exceptions, resolve.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Identify vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls, monitor effectiveness of controls
Protective monitoring type Supplier-defined controls
Protective monitoring approach Collect events, look for pattern anomalies, report, manage through incident management
Incident management type Supplier-defined controls
Incident management approach Categorise, Prioritise, Triage, Diagnose, resolve, resolution and recovery, close incident

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £120.00 to £200.00 per unit per month
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑