TeamLogic Systems Ltd

GeDaP DTACT Raven Situational Awareness - Defence

DTACT Raven is a flexible, open standard, data streaming, distribution and smart transformation engine which runs agnostically on any infrastructure and connects from/to any data source, system or analytical tool or platform.
The scalable Brick-based platform supports ongoing conventional military operations, protecting national security and providing conflict threat intelligence.


  • Connector Bricks – In/export of data from any data source/system
  • Data Science Bricks – Transform, enrich and configure data flows
  • Raven Brick(s) – Proprietary horizontal scaling engine,
  • History – Repository on how data points changed over time
  • Graph – Build in graph analysis option
  • Analyzer – Build in variety to query/analyse data sets
  • Retention/Access Control – Advanced granular data-retention/access options
  • Secure by design – DTACT cyber security background and experience
  • Privacy by design – easy configuration features meeting compliance
  • Enterprise Bricks – Visualisation, Access Control, Deployment features.


  • Privacy by design – easy to configure features meeting compliance
  • Open standards – allow users mixing and matching as needed
  • Effectiveness – Better, faster insights from your data across silos
  • Empower analysts –Use insights instead of false positives
  • Flexible – integrates your data. Add, remove or replace redundancies
  • Scalable – horizontal scalable to any data size or source
  • Simple/fixed pricing –independent from amount of bricks, users or data.
  • Multi-tenant – deploy single, parallel or peered instances within/across organisations
  • Speed – immediate data ingestion/ integration/ correlation saves time
  • Fixed subscription independent from amount of bricks, users or data


£35,000.00 a unit a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 7 8 1 8 2 8 0 0 9 2 3 3 5 9


TeamLogic Systems Ltd Ian Young
Telephone: 0151 342 4490

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Out of the box supported use cases can be deployed instantly and up and running and configured within days. Unknown data sources or so far unsupported data sources require additional work (in average 1-2 days per data source) to be done by the customers choice GeDaP, DTACT, in-house . For super advanced customers DTACT RAVEN is mostly used as an advanced ETL and data pre-processing/analyser engine in front or on top of existing analysis tools or platforms, although the system itself does come with advanced analysis features.
System requirements
  • Infrastructure – cloud (AWS, Azure, Oracle, GCE) or on premise.
  • O/S– Linux, FreeBSD or Windows preferably Linux Debian/ Ubuntu based)
  • Browser – Firefox, Chrome, IE, Edge, Safari
  • Storage - depending on workload
  • Compute - depending on workload

User support

Email or online ticketing support
Email or online ticketing
Support response times
As part of the support process GeDaP provides a specific email address to be used. The customer should supply all relevant detail together with a mobile number if possible.
During normal business hours (weekend by prior agreement) GeDaP will respond within 2 hours,
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat under development to meet required standards
Web chat accessibility testing
Web chat under development
Onsite support
Yes, at extra cost
Support levels
Standard support is covered in the basic SaaS cost and is based on a maximum 2 hour response and we will endeavour to provide a solution or work-around within a further 2 hours maximum. If the problem is not resolved within that period it will be escalated to the developers. During the incident support will use the appropriate medium and customers are advised of progress. On-site support is available by arrangement and is charged on a time and materials basis (see Rate Card)
Support available to third parties

Onboarding and offboarding

Getting started
DTACT Raven provides so-called Connector Bricks for the import / export of any data source from and to any data source, tool or platform.
A Connector Brick can be called from the Brick repository (or be built if unavailable) and imported to the workspace. All necessary configuration towards e.g. retention, access, scheduling and protocols be done instantly and saved. The next steps is the actual transformation and extrapolation into any common data scheme (elastic common data scheme is default). From there data can be exported to any system/platform or stored in any desired type of data base technology or both.
Service documentation
Documentation formats
End-of-contract data extraction
Any format (Elastic, Kafka, Splunk, RabbitMQ, S3, Postgres, MySQL, Neo4J, etc)
End-of-contract process
The content required together with its format will be determined by your plans at the time. GeDaP will provide the appropriate quotation based on volumes and content required if you decide to migrate the data.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • Windows
Designed for use on mobile devices
Service interface
Description of service interface
Description of interface – Portal with Bricks and connecting arrow workspace, analyser interface
Accessibility standards
None or don’t know
Description of accessibility
Accessibility standards – Login function, 2FA, Access Control, LDAP integration options
Accessibility testing
DTACT Raven sits under the device's Operating System and is transparent to the end-user. It will therefore have no adverse impact on the user of assistive technology
What users can and can't do using the API
API – DTACT has an extensive GraphQL api available to add customisation from within other systems

What users can and can’t do – only backend horizontal scaling is automated and proprietary (scaling up or down of computation power)
API documentation
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Customisation available
Description of customisation
Out of the box supported use case does not need customisation, just configuration. Any unsupported or non-existing connector, data science or enterprise brick can be custom build by GeDaP, DTACT, in-house or by 3rd parties. Included is a scripting engine for Typescript, Python and LUA to allow customisation.


Independence of resources
DTACT Raven provides a propriety horizontal scaling and descaling framework to increase or reduce required computation power.
Depending on the workload, the infrastructure will adjust to be able to fully support. Offloading data storage to S3 compatible is also supported.


Service usage metrics
Metrics types
A complementary and tool-agnostic platform collects all data to a single dashboard so that you finally have the coverage you need.
* Service user metrics (enhanced dashboard support for monitoring
*Metrics types: amount of messages process,throughput.
*Reporting types: daily, monthly
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
GeDaP is the DTACT distributor for the UK & Ireland

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
DTACT Raven is built for connectivity A complementary and tool-agnostic platform can be configured to export the data required by the customer
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Elastic
  • Kafka
  • Splunk
  • RabbitMQ
  • S3
  • Postgres
  • MySQL
  • Neo4
  • Etc
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Https
  • Json
  • S3
  • Elastic
  • Splunk
  • Etc

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
The data in transit would be secured with PKI based on public or private certificates.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
All data between devices is secured by device authentication (hashed and salted component serial numbers) and encryption (public or private certificate) via PKI

Availability and resilience

Guaranteed availability
GeDaP recommends the computing power of UKCloud which provides a guaranteed 99.90% availability for its users
Approach to resilience
GeDaP recommends UKCloud Service which is designed for deployment across a number of sites, regions and zones. Each zone is designed to eliminate single points of failure (like power, network & hardware). GeDaP encourages customers to ensure that their solution spans multiple sites, regions or zones to ensure continuity of service even if a failure occurs.
Outage reporting
All outages will be reported via the Software Service Status page and the notifications service within the UKCloud portal. Outages are identified as Planned Maintenance, Emergency Maintenance and platform issues. In addition the GeDaP Technical Support Manager will contact the designated customer contact,

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Other
Other user authentication
OAuth2 is supported for users, besides username /password authentication. Users are able to enable 2FA authentication, user sessions are tied to their logged on IP address.
Access restrictions in management interfaces and support channels
Management interfaces support teams, which allow granular access restrictions per role.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other
Description of management access authentication
Management interfaces support teams, which allow granular access restrictions per role.

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Though an SME, GeDaP has its own security policies in place and regularly reviews its capability against both the current Data Protection requirements and EUGDPR. Customer data is processed on UKCloud which is dedicated to customer processing and which is regularly assessed against ISO20000, ISO27002, and ISO27018 by LRQA a UKAS certified audit body.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
GeDaP works closely with the developers of Raven, who operate a system which tracks changes and provides the input to GeDaP's own change management. If sites require, a test bed can be provided allowing a short period of testing and approval prior to the update's incorporation in the production system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
GeDaP provides their service based on UKCloud servers which offer a high degree of security. DTACT are Cyber Security Specialists and have turned black-hat hacking methods and national security expertise into pro-active intelligent security product suites for global enterprises and (trusted) national security agencies. This expertise is built into Raven . GeDaP is established in Cyber Security and are members of Cyber Exchange
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
GeDaP has a documented approach based on ISO20000 and ISO27001. Any potential incidents identified by staff or customers are monitored, controlled and resolved as high priority.
Incident management type
Supplier-defined controls
Incident management approach
GeDaP has an incident management and reporting system based on the requirements of ISO20000 and ISO 27001. Any incident raised is resourced, tracked, and resolved

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
  • Public Services Network (PSN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Health and Social Care Network (HSCN)
  • Other
Other public sector networks
  • PSN Assured
  • PSN Protected
  • RLI
  • Hybrid Connect
  • UKCloud would be happy to meet your requirement


£35,000.00 a unit a year
Discount for educational organisations
Free trial available
Description of free trial
GeDaP provide a "Proof of Concept" to allow customers to evaluate the software against established and agreed criteria. On completion of the POC there would be a review with GeDaP

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.