Astun Technology Ltd

Enterprise Metadata

Get INSPIREd Enterprise is a cloud based metadata service that provides both internal metadata maintenance and discovery services with a workflow for quality approval and subsequent publication of a subset of records to or another standards compliant portal.


  • INSPIRE compliant service
  • Automatic validation of metadata against schema
  • Support for custom schemas
  • QA and Approval for Publication workflows
  • Serve metadata via an OGC CSW to the portal
  • Organisational and departmental hierarchy
  • Separate internal and public metadata
  • Internal and Public discovery services
  • No need to implement any additional technology locally
  • Enterprise Grade Support


  • Custom cloud based metadata service
  • Uses GeoNetwork like most of the world's spatial data infrastructures
  • Full support for UK GEMINI metadata standards
  • Metadata Publishing provides full UK Location Programme compatibility
  • Ensures that data is managed and discoverable across your organisation
  • Provides real business value and business efficiency
  • Multiple catalogs for both internal-facing and public-facing metadata
  • Serves metadata to and other standards compliant portals
  • Automated Metadata Creation and Update saving time and resources


£25,000 to £50,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 8 6 7 5 5 0 2 2 5 1 2 8 6 2


Astun Technology Ltd Astun Technology Sales Team
Telephone: 01372 744009

Service scope

Software add-on or extension
Cloud deployment model
Community cloud
Service constraints
Most planned maintenance will be undertaken without interrupting service availability however in the event that this is not possible downtime will be scheduled and agreed with the customer in advance.
System requirements
  • Internet access
  • Connectivity via VPN or IP Restriction for secure internal users
  • Appropriate sub-domain and site certificates

User support

Email or online ticketing support
Email or online ticketing
Support response times
Astun provide the support service during normal working hours, which are between 0900 and 1700 GMT, Monday to Friday, excluding Bank Holidays.

The response times for calls logged by the customer are set out in the accompanying Astun Digital Services Terms & Conditions document.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Get INSPIREd Enterprise Support is included

Astun provide the following Get INSPIREd Enterprise support as standard:
1. Advice on maintaining Get INSPIREd Enterprise.
2. Advice on the implementation of the Gemini 2 metadata schema.
3. Instructions on how to remedy common faults.
5. Resolution of issues related directly to a serious flaw in Get INSPIREd Enterprise
6. The Customer may obtain Get INSPIREd Enterprise support by logging a request on Astun’s Support Portal.

First line support is provided via a permanently staffed Service Desk with second and third line support by consultancy and development teams for fault diagnosis and resolution. Customer access to web based Service Desk provides real time ticket management and correspondence on all customer tickets.

For support conditions, support processes, the service level agreement and escalation procedures are detailed in the accompanying document - iShare in the Cloud Support Conditions
Support available to third parties

Onboarding and offboarding

Getting started
On receipt of a purchase order Astun Technology will provide access to a customer specific Get INSPIREd Enterprise hosted environment.

Astun provide onsite training for administrators and user documentation.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
In the event that the customer terminates the service they can download their metadata records from Get INSPIREd Enterprise in a standard XML file format.
End-of-contract process
On receipt of a written request to terminate the Get INSPIREd Enterprise service and subject to there being no unpaid charges outstanding, Astun will delete the hosted environment including all servers, datasets, user details and customer specific configuration

Any further "Off-boarding" assistance is chargeable in accordance with Astun's SFIA rate card.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All public facing elements of the service have been implemented using responsive design to optimise the user experience on mobile devices.
Service interface
What users can and can't do using the API
Get INSPIREd Enterprise is based on GeoNetwork which provides a full API to interact with

Catalog Service for the Web (CSW)
Open Archive Initiative (OAI)
RDF DCAT end point
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
The interface can be customised to incorporate customer graphics/logos


Independence of resources
Customers have their own dedicated virtual private cloud.


Service usage metrics
Metrics types
'Get INSPIREd Enterprise' includes reporting functionality on content and search statistics. This includes the ability to filter records on a number of different parameters such as ownership, INSPIRE theme or status.

A range of statistics on searches carried out using the 'Get INSPIREd Enterprise' User Interface are available. These include searches by:
User Access
Record ownership
Metadata Updates
Metadata File Uploads
The reports can be filtered by time period and can be viewed online or provided in csv format.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Metadata can be exported as MEF (Metadata Exchange Format) Version 2.0 or CSV
Data export formats
  • CSV
  • Other
Other data export formats
  • MEF (Metadata Exchange Format) Version 2.0
  • CSV
Data import formats
Other data import formats
MEF (Metadata Exchange Format) Version 2.0

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Get INSPIREd Enterprise is hosted on a high availability cloud infrastructure with a failover backup hosted in a different geographic region for maximum resilience.

Internal availability testing indicates availability in excess of 99.6%

The services are continually monitored with automated messages sent to several staff in the event of a deterioration or failure.
Approach to resilience
Get INSPIREd Enterprise is hosted within the Amazon Web Services environment (AWS).

The entire cloud environment is backed up to a second geographic availability zone to provide additional resilience in the unlikely event that the primary availability zone becomes unavailable.
Outage reporting
Astun set up a series of alarms to monitor the customer's cloud service. These alarms are triggered if any pre-set limits to system resources are reached (e.g. disk space). This enables Astun to address the majority of issues before any potential outage.

We also use our GeoHealth check system to monitor servers and ensure they are up and working.

The customer is informed of any potential problems by email or phone.

Identity and authentication

User authentication needed
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces are restricted to login from an IP restricted network or over a dedicated VPN between customer network estate and the virtual private cloud environment dedicated to the customer. Access by Astun is also over VPN.
Access restriction testing frequency
At least every 6 months
Management access authentication
Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We are currently working towards ISO 27001.
Information security policies and processes
We are currently working towards ISO 27001. Operational customer data is stored or processed within MEF (Metadata Exchange Format) Version 2.0. Information assurance accreditation has not yet been sought for iGet INSPIREd Enterprise, however we consider that Get INSPIREd Enterprise would be classified as BIL0 or BIL1, users should make appropriate decisions regarding what data to deploy within Get INSPIREd Enterprise.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes to all Astun components are managed and tracked through their lifetime via a centralised bug-tracking, issue-tracking and project-management software application (JIRA) and associated private code repository (BitBucket) managed under source control. The software is built through a repeatable build process and after passing formally defined test cases is tagged to a specific version number at the point of release. Only released software is deployed to the customer virtual private cloud environments. Potential security impacts are assessed via a process of peer review.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Information on potential threats is continuously assessed through review of key online resources (release notes, security articles etc) for all third party components (operating systems, databases, frameworks etc). Penetration testing of the full system (including Astun components) is undertaken by independent third parties on all significant software releases. Whilst patch releases are routinely issued on a monthly basis, key security vulnerabilities are patched and released as soon as Astun become aware of them, irrespective of the stage in the release cycle.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All cloud servers are set up with alarms that monitor key system resources on the server itself allowing the detection of compromises such as denial of service attacks. In addition external monitoring services are set up to make routine periodic requests to the servers (typically every 15 mins), to check that they remain responsive, and send out alerts if any servers are unavailable. Incidents are responded to as soon as we become aware of them. Logging is enabled on the servers to provide an audit trail of potential compromises for subsequent investigation.
Incident management type
Supplier-defined controls
Incident management approach
Security related incidents are categorised as a Priority 1 within our Service Desk system, and allocated to third line support personnel (developer) for immediate investigation and resolution. Users are able to report such incidents via the Service Desk (phone, email and web form), which is routinely monitored throughout the working day by first line support staff. Contemporaneous notes are taken during the incident and recorded against the service desk ticket, which provides a detailed report of the incident itself. Key performance indicators are also published from the Service Desk System and routinely reviewed by management on a weekly basis.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£25,000 to £50,000 a unit a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.