Media Monitoring Services
Global media monitoring to detect emerging risk, trends, and threats, using AI and machine-learning models that are customized to each unique mission using programs for entity resolution and identification, processes millions of documents to draw insight from our vast volumes of content, making analysis faster, more accurate, and efficient.
Features
- Media monitoring analytics platform
- 12,000+ Global News Sources
- Bulk processing and monitoring of customer entity lists
- Global Sanctions Lists
- Custom taxonomy, specific to each mission
- Advanced Threat Alerting
- Risk Monitoring Management Systems
Benefits
- Natural language processing identifies and contextualizes entities, relationships, and events
- Filters and eliminates duplicate information to prevent data over-reporting
- Alerts to potential match and allows for audit-able event escalation
Pricing
£5,000.00 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
9 3 7 3 8 0 7 7 4 3 0 3 5 2 2
Contact
TRSS INTERNATIONAL LIMITED
Chad Longo
Telephone: +15702067418
Email: Chad.Longo@trssintl.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Defined in the contract
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- General and Specific Training
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite Training
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Defined in the contract
- End-of-contract process
- Defined in the contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Defined in the contract
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Defined in the contract
Scaling
- Independence of resources
- Documentation
Analytics
- Service usage metrics
- Yes
- Metrics types
- Defined in the contract
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Defined in the contract
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Defined in contract
- Approach to resilience
- Defined in contract
- Outage reporting
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Defined in contract
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Defined in contract
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Defined in contract
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Defined in contract
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Defined in contract
- Incident management type
- Supplier-defined controls
- Incident management approach
- Defined in contract
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £5,000.00 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Proof of Concept