Xenium Solutions Limited


WebDB is a forms based solution that mobilises existing or new corporate database applications by enabling users to view, synchronise, edit and update SQL database information from mobile devices, laptop/desktops. Customised mobile solutions can be created in a point and click environment in a few short hours.


  • On line and off line functionality
  • Add a mobile layer without re-inventing processes or systems:
  • IT management and control with graphical management tools
  • Out of the office, but still connected
  • End-users control which records they synchronize to their device
  • Non-mobile users can same applications/data as the mobile users
  • Read access can be defined differently for each database table
  • User and Groups are defined once in SecSQL Directory database
  • View available in graphical, GPS mapping, photo and text
  • Operates on phone or tablet for iOS, Android and Windows


  • Provides security for row level to any SQL database/application
  • Application of SecSQL to an existing database
  • Limiting Create or Delete records or tables by user
  • Read or Update control applies across all database tables
  • Update can be defined differently for each database table
  • Can be applied at design stage or for existing databases/applications
  • Records can be synchronized across all mobile or desktop applications


£1250 to £1500 per user per year

Service documents


G-Cloud 11

Service ID

9 6 9 4 4 4 8 2 1 7 8 3 1 6 7


Xenium Solutions Limited

Bruce Murchie



Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
We are unaware of any constraints.
System requirements
  • For iOS devices either tablet or phone
  • For Android devices either tablet or phone
  • For UWP tablet or desktop
  • Operates with MS SQL Server any versions
  • Integrates with third party systems with api's
  • Support for web services

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response are based upon the urgency of the matter. These are usually within 4 to 6 hours Monday to Friday
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Set a standard that meets the customers requirements
Web chat accessibility testing
None to date
Onsite support
Onsite support
Support levels
Annual support and maintenance is charged in advanced for the year based on the number of users and covers system updates and product maintenance that covers upgrades to new operating system updates. We also work with our customer base to provide with two update product releases that add new features. this service is provided on a discounted cost basis above annual support and maintenance. All support is remote.
Support available to third parties

Onboarding and offboarding

Getting started
A series of customer designed online training tools have been developed to assist new customers. As each customer operates under a difference set of business rules and models these can be used as a guide to establish a new customers training criteria.

In general there is little training that is required to use the application given that the existing user will have prior knowledge of how to use the desktop versions of the mobile applications.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Their data is not stored in our SaaS as all data that is entered in the mobile client is uploaded as soon as the user presses the send key given that they a have a mobile on-line connection. Data is only stored in the police forces databases and not as stated in the SaaS.
End-of-contract process
There are no additional costs for end of service.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Differences between the mobile and desktop service
The same functionality is provided on both desktop and mobile device be that a smartphone or a tablet. A thick on device client is installed for use on a mobile device or Windows tablet. On a desktop the application uses a browser to access the application.
Service interface
Description of service interface
As required by the customer to meet their demands.
Accessibility standards
None or don’t know
Description of accessibility
There are no constraints in this area
Accessibility testing
These have not been required to date
What users can and can't do using the API
As the application is based on custom code base we provided dedicated api's based on the customers requirements and needs.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
The service can be customised by the users. The user has TOTAL control if required to customise the forms. What we provide is a framework for either ourselve to generate the form or you the customer to generate the forms.


Independence of resources
This has been tested with over several hundred concurrent users across the EU with no desegregation of data or capability for use of the service.


Service usage metrics
Metrics types
These are available and are specified by the customer
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
They do not as it connect to the users back end systems that reside behind their own firewall.
Data export formats
  • CSV
  • Other
Other data export formats
Non possible
Data import formats
  • CSV
  • Other
Other data import formats
Not required

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
SLAs are provided on a customer by customer basis. As one example, one customer required that if SLAs were not achieved, then a deduction from the annual maintenance payment would be withheld.
Approach to resilience
It's available on request
Outage reporting
Can be interfaced to third party tool sets via APIs

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access is defined according to user defined roles and controlled usually in conjunction with Microsoft Active Directory (AD) defined roles. This is done in conjunction with the customers requirements where necessary
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
These are available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All change management is defined and discussed with the customer as required by the level of their standard set usually with a UK police force.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
In conjunction with our customers we seek to operate three systems covering demonstration, UAT and live and through these three systems we coordinate with the customer when and how and what patches need to be released when approved by the customer from UAT to live. The potential threats if any are informative by the customer and monitoring tools.
Protective monitoring type
Protective monitoring approach
We respond is accordance with the degree of urgency that is required by the customer to address any issues that arise.
Incident management type
Incident management approach
We have a customer portal that allows for direct reporting of any and all issues that generate incident reports to the support team for immediate response.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£1250 to £1500 per user per year
Discount for educational organisations
Free trial available
Description of free trial
Full system for 25 users for 3 months from day of the connection being operational.
Link to free trial
Email a request

Service documents

Return to top ↑