The IMPACT IoT Analytics solution augments your Operation Centre’s capabilities by applying intelligence to data from IoT sensors. Information is derived from each feed e.g. environmental factors, chemical composition, behaviour, sound, etc. for realtime anomaly detection. Patented machine learning from Nokia Bell Labs leverages pattern recognition and behavioural knowledge.
- Establishes baseline values, then generates alarms when anomalies are observed.
- Scales from a single gateway to a centralised server cluster.
- Easy-to-use dashboard permitting drilling down for detailed information.
- Extensible analytics enabling plug-in integration with third-party analytics.
- Allows integration with large, third-party video walls.
- IoT Community that works to explore new business models.
- Modular architecture leveraging existing network investments enabling a cost-effective solution.
- Edge video analytics reducing network bandwidth prioritising control room streaming.
- Multi-tenant architecture for serving multiple user groups on single instances.
- IoT Analytics drives efficiency in operational service
- IoT Analytics delivers live dashboard information
- Manage organisation based on real time and reported IoT facts
- IoT Analytics drive automated knowledge based decision making
- Provides lower deployment costs and greater flexibility.
- Reduce network and storage costs up to 99%.
- Monitor an enormous number of sensors from a single point
£50 to £750 per device per month
Nokia UK Ltd
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||No known constraints, we work with a vast variety of IoT standards.|
|System requirements||Deployed as a cloud service thus reducing customer constraints|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Various options exists so as best to fit each clients' requirement.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 A|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Onsite support|
|Support available to third parties||Yes|
Onboarding and offboarding
The IoT Analytics solution has a set of pre-defined onboarding services required for the initial setup.
In addition, Nokia will work with each customer to define and document any customized onboarding services,
Onsite training, online training, and user documentation are all provided.
|End-of-contract data extraction||Nokia will work with each customer to define any specific end-of-contract process requirements.|
|End-of-contract process||Nokia will work with each customer to define any specific end-of-contract process requirements and any chargeable end of term items.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||
Users access Analytics via a web browser interface.
Supports common browsers including Chrome, Internet Explorer, Firefox, etc.
|What users can and can't do using the API||
Scene Analytics provides an extensive North Bound API for integration into third party operational systems and Management Systems.
Details available on request.
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||
The analytics algorithms are currently configurable.
New sets of algorithms covering new use cases will be introduced as customer demand grows.
We strive to continually enhance the services provided and there are future plans for a Bring-Your-Own algorithm, however this is not formally in the roadmap as yet.
|Independence of resources||
The Scene Analytics solutions scales in two ways.
- Cloud compute resources can be expanded to cover increased number of end users, as well as supporting the collection and display needs of additional cameras.
- As additional cameras are added to the system, analytics processing power also needs to be added to the solution. These can either be added as edge compute gateways, or can be added as central cloud compute resources, depending on the specific customer requirements.
|Service usage metrics||Yes|
|Metrics types||Service usage is measured by the number of devices connected to the network.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||
IoT Analytics gateways perform the analytics processing. All data within these gateways is stored temporarily during processing in secure Linux Containers.
Where video is used, video anomaly clips are stored for 24 hours on the main Scene Analytics servers before being deleted. Integrated security mechanisms within the cloud service provide ensure protection of this data.
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||
IoT Analytics supports the integration North Bound into the customer operational support systems or existing Management system.
The integration is near-real-time, with IoT Analytics forwarding anomaly details for the external system to access.
|Data export formats||
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||IPsec or TLS VPN gateway|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
|Guaranteed availability||To be discussed with customers to determine their availability requirements.|
|Approach to resilience||This information is available on request.|
|Outage reporting||As per the customers' specified BC/DR planning and policies|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
IoT Analytics supports single or multi-tenanted deployments.
IoT Analytics uses hierarchical group/user structure, and configurable role definitions and assignments.
|Access restriction testing frequency||Less than once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||Less than 1 month|
|Access to supplier activity audit information||You control when users can access audit information|
|How long supplier audit data is stored for||Less than 1 month|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Bureau Veritas|
|ISO/IEC 27001 accreditation date||05/08/2016|
|What the ISO/IEC 27001 doesn’t cover||Available on request|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||Nokia policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Nokia has a comprehensive software configuration and change management process. Changes are assessed for potential security impact.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Nokia conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. Nokia has Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to Nokia Networks products and issues corresponding security recommendations for further actions within Nokia Networks. The process is continuous and concurrent to the Product Life Cycle.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Nokia embed security into all our products and services. Following are the key measures in place to ensure securing the information ecosystem • Nokia Design for Security ensures that security is built into products from the start of the development and maintained throughout the lifecycle • We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities • We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures • We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary|
|Incident management type||Undisclosed|
|Incident management approach||Nokia’s Information Security is responsible for developing, implementing, maintaining and communicating Nokia's Threat and Incident Response process for information security incidents This process includes the following but is not limited to: 1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified 2. How and what to communicate inside and outside the Company 3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£50 to £750 per device per month|
|Discount for educational organisations||No|
|Free trial available||No|