Getmapping WFS Collections: OS Premium
Getmapping WFS Collections: OS Premium is a managed data streaming service. It allows access to OS data-sets in vector format via the web. It removes the need to locally store, update and manage data. Users save network capacity, storage space man hours and costs
- OS PSMA vector base mapping
- High-speed Data Centre with full redundancy built in
- All data automatically updated inline with OS update schedule
- Fully OGC compliant
- Easy to deploy
- Free, no obligation trial available
- Access to Getmapping support service
- Cloud storage removes the need to locally store data
- Removes need to download, maintain and update base mapping
- Free up system capacity/server space and save costs
- Users working on latest dataset ensures continuity and reduces risk
- Large number of credits to use over a year
- Ensures best possible value from your GIS Budget
- Overlays seamlessly with other base mapping layers
£1500 per instance per year
- Free trial available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
The Web Feature Service can be utilised within any GIS or similar software e.g. CadCorp.
Getmapping's Technical team will advise clients of any upcoming service maintenance, normally with at least 30 days notice.
All planned maintenance is facilitated out of hours.
|Email or online ticketing support||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
As well as the telephone and email support system we can also provide onsite support from a member of our technical team.
Rates will depend on the nature of the support requirement. Please refer to the SFIA rate card for indicative costs.
|Support available to third parties||Yes|
Onboarding and offboarding
Getmapping supply the customer with the appropriate url for their service, which is provided by email and an explanation outlining how the url can be integrated into their software/application.
We also provide telephone and email support to help with any queries.
|End-of-contract data extraction||Mapping Data can be saved in JPEG or PNG format.|
The client will receive access to the agreed data-set, via a URL, which will be live while under subscription.
There are no other additional costs. Telephone and email support will be provided at no extra cost.
Once a subscription to a service expires access to the service will cease immediately.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The WFS feeds can be integrated into many applications and the requested images can be small enough for mobile devices. The implementation and testing is controlled by the application integrator independently of our imagery supply.|
|Description of customisation||Customers can customise the service by changing the URL call to the data. Customers are able to select whether they want the image returned as JPEG or PNG. Customers are able to define the area required using coordinates as well as the image size.|
|Independence of resources||Getmapping cloud services are fully scalable using VMWare technology, as well as bandwidth capacity from the Data Centre. Our current usage shows that we are nowhere near our present theoretical capacity under our full utilisation.|
|Service usage metrics||Yes|
|Metrics types||Getmapping can provide a monthly log, or other agreeed frequencies, outlining the number of map requests per product and/or service.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Never|
|Protecting data at rest||Other|
|Other data at rest protection approach||
Getmapping only handle mapping data that is publicly available. Getmapping have a fully segregated data centre and corporate network infrastructure. Only authorised staff members are authenticated through the data centre network.
Data stored for the services are kept historically and never removed.
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Data can be exported in JPEG or PNG format dependant on how the buyer accesses the service.|
|Data export formats||Other|
|Other data export formats||
|Data import formats||Other|
|Other data import formats||Users do not have the facility to upload data themselves|
|Data protection between buyer and supplier networks||Other|
|Other protection between networks||Getmapping Web Mapping Services are accessed using HTTPS requests using an encrypted layer.|
|Data protection within supplier network||Other|
|Other protection within supplier network||Getmapping operates a fully segregated data centre and corporate network infrastructure. Only authorised staff members are authenticated through the data centre network.|
Availability and resilience
Getmapping's SLA offer's 99.9% availability for its online services. Full SLA documentation is available separately from Getmapping.
If Getmapping do not meet the guaranteed levels of availability then a % of the annual fee may be refunded, which will be agreed with the customer on a case by case basis.
To date this has never been required.
|Approach to resilience||
Full details available from Getmapping.
• Two copies of all live Getmapping imagery stored on SANs with no single point of failure for redundancy purposes.
• Each SAN has redundant power supplies and hard drives in RAID
• Third copy of the data stored atHead Office,Hartley Wintney
• Getmapping runs a virtualized infrastructure in VMware environment using N+1 physical host servers, supported by 24x7 VMware support contract.
• Virtual machines are spread across two separate SANs for redundancy and performance.
• Multiple instances of all servers, where possible are load balanced for performance.
• Backups of the virtual server images taken daily
• Veeam allows file level restores in case of any data corruption in a virtual machine.
• Virtual server image backups regularly copied to external hard drive
• 2 separate physical networks within the data centre
• Check Point firewalls are utilized in a High Availability configuration to ensure that any firewall failure will not impact the service.
• All critical hardware is covered by a 24x7 “mission critical” 4 hour response contract with the hardware vendor.
• Patches and updates regularly applied when available
• All servers run Kaspersky Endpoint Security for virus and malware protection.
|Outage reporting||Email alerts are immediately issued to customers via Getmapping's Technical team to inform then of any interruption of service, along with a regular update regarding the repair & fix, letting them know that service is available again.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Getmapping provide data feeds to the customer as per their defined requirements. To maintain security of data feeds, Getmapping only provide access to change management and support requests through pre-authorised and predefined channels. It is important to maintain the data integrity of the feeds as these could be used in public facing websites and applications and control is required to maintain data continuity. Account setup, management requests and actions are authorised through the relevant account manager only. Support requests are channelled through a dedicated email address and internally allocated for resolution and response. Bespoke requests are confirmed telephonically with customer.|
|Access restriction testing frequency||Less than once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||QMS UK|
|ISO/IEC 27001 accreditation date||10/04/2015|
|What the ISO/IEC 27001 doesn’t cover||Getmappings ISO27001 covers all Data Centre IT and Infrastructure.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||Getmapping do not comply with any formal Incident Management process. Incident management forms part of the Security Incident Reporting Policy as part of the ISO27001 Information Security Management System.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Getmapping do not comply with any formal Incident Management process. Incident management forms part of the Security Incident Reporting Policy as part of the ISO27001 Information Security Management System.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Getmapping do not comply with any formal Incident Management process. Incident management forms part of the Security Incident Reporting Policy as part of the ISO27001 Information Security Management System.|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach|
|Incident management type||Undisclosed|
|Incident management approach||
Security breaches and weaknesses are reported immediately (telephone, email or ticketing system) to the IT Team
Action is taken to address the security breach or weakness in a manner appropriate to its urgency and impact
The corrective action is documented on the Incident Management Log and the situation monitored until the breach has been closed
For security weaknesses, the preventive action taken is documented on the Security Audit meeting documents
Incident Management Log (s) are reviewed periodically
Where data confidentiality, integrity or availability has been compromised, senior management is consulted to ensure that affected parties are appropriately informed.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£1500 per instance per year|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Getmapping offer a 30 day free trial to all WMS & WFS services|