1Spatial Group Ltd

Spatial Data Quality Assurance Rules Engine

Automated data validation, cleansing, transformation and enhancement for your data with 1Spatial's business rules engine.

Features

  • Capture data management requirements as automated, easily managed business rules
  • Apply business rules automatically to spatial and non-spatial data
  • Pinpoint the exact location of errors in failing features
  • Perform rules-based data re-engineering
  • Automate the creation and update of datasets
  • Automate the integration or transformation of datasets
  • Create and manage multiple rule sets for different data holdings
  • Cross-reference multiple sources of data for accurate validation and integration
  • Invoke processes from external systems via web services
  • Scale the system to increase throughput when needed

Benefits

  • Check and prove compliance of data across your enterprise
  • Control, consistency and confidence in your data
  • Allow accurate decision making, ensure compliance and improve customer experience
  • Share data confidently
  • Inference rules help find missing assets
  • Save time and money by automating costly manual processing
  • Better data ensures better customer service and asset investment plans
  • Trust your data and the decisions that depend on it
  • Know what data is non-conformant with rules and why
  • Implement continuous improvement methodology

Pricing

£5200 to £6800 per virtual machine per month

  • Free trial available

Service documents

G-Cloud 9

975989107934806

1Spatial Group Ltd

John Hartshorn

01223 420 414

john.hartshorn@1spatial.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints Standard support is provided for normal UK business days.
Virus protection is not provided as standard. Clients may provide their preferred virus protection software or this can be sourced on request by 1Spatial.
System requirements
  • Virus protection is not provided as standard.
  • Data is uploaded as zipped GIS files (e.g. Esri Shapefile)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 1Spatial Support is provided during normal UK business days, 09.00-17.30. Extended hours and specific requirements can also be offered if required.

Support cases are categorised in 1 of 5 levels of severity. An initial response time is based on the severity and ranges from 15 minutes to 60 minutes. The target resolution times are also based on severity, ranging from 4 hours to 80 Hours.

Users raise and initial categorise their support cases via 1Spatial Support's online Support Portal, where they also monitor cases.

Telephone and email can also be used for support cases.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels The 1Spatial Support service offers a comprehensive incident management service that is designed to ensure that all queries and incidents are logged accurately, and problems assigned to relevant specialists to give the fastest possible resolution. An account manager is always assigned to a client and can assist the Support team where necessary.

A standard Support service is typically offered and the per annum cost is calculated as a standard proportion of the value of software licences and/or application services sold. Where extended or alternative support services are requested, these are priced based on the scope of the service a specific client requires.

For online incident ticket management, we use Salesforce. This cloud based service supports users working with assistive technology, such as speech recognition software and screen readers, and it follows the internationally recognised best practices in Section 508 of the Rehabilitation Act and the Web Content Accessibility Guidelines (WCAG) 2.0 Level AA to the extent possible.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Users require training in rule authoring, for which there is a 2 day standard training course.

1Spatial can provide training at its own training facility in Cambridge or on client sites.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction The service is typically not used to store data, but process data and deliver outputs that the user will take into data stores elsewhere. It is therefore unlikely that there will be a need to extract any data when the contract ends, although the service itself contains the tools needed to extract/export and deliver data in a range of interchange formats.

It is also possible to purchase the system to run on-premise and to save the rules from the cloud environment to the on-premise environment. These are exported and delivered as XML documents.
End-of-contract process At the end of the contract, the service simply terminates on the date on which the client has paid up to. Any business rules that the client has authored can be exported as XML documents so that, upon termination, they can be kept by the client (and used in the clients on-premise 1Spatial software) as they will otherwise be removed from the service.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Firefox
  • Chrome
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Because the service is accessed via standard browsers, compliance with accessibility standards is typically as aspect of the browser, not 1Spatial's service. Most standard browsers attest to be compliant with WCAG 2.0 and there are also a number of browser add-ons specifically for users who require support with accessibility.
Accessibility testing None
API Yes
What users can and can't do using the API The web services API allows integration into third party workflows, software or scripts. Anything that can be done via the user interface can also be achieved using the web services API. Typically, users will author rules, data stores, actions and sessions via the user interface and then run the sessions by invoking the web services API.

The API is available both as a REST or SOAP APIs.

- The SOAP API is a SOAP 1.0 service using document/literal bindings. It uses HTTP basic authentication and is Web Services Interoperability Foundation (WS-I) compliant.
The API is defined by a WSDL (Web Services Description Language) document accessible as a URL from a 1Integrate server. Many software languages (e.g. Java, .Net) provide tools which you can use to process the WSDL and automatically generate classes in the respective language. These classes (often called client code or ‘stubs’) can then be embedded within your software and called to invoke the service, without needing to know the details of the SOAP web services protocol. In addition the web services API can be called from other workflow technologies such as Business Process Execution Language (BPEL) scripts.

- The REST API is provided with token-based security.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • Other
API sandbox or test environment No
Customisation available Yes
Description of customisation The user can author rules and actions. The service is built around the concept of rules and actions being authored via a user interface in order to meet an organisations' specific quality management and processing needs. The API allows the service to be integrated into 3rd party applications.

Scaling

Scaling
Independence of resources Each client is best served by having a dedicated virtual server environment within the Cloud. This ensures that the right resources are provided based on the individual client's needs with respect to data volumes, users and usage, availability, and that a client is not affected by other clients' usage.

Analytics

Analytics
Service usage metrics Yes
Metrics types Using the Rapid UI portal provided with the service, each time validation is performed, statistics are gathered on the rules that were run relating to the quality of the data and its conformance to the rules. These results are stored and accessible via a user-configurable dashboard showing trends of data quality over time for different rules and different groups of users.
Reporting types
  • API access
  • Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The service publishes data that represents either validation non-conformance reports or the results of improved or transformed data.
The configuration allows data to be downloaded as zip file of GIS data using a number of common spatial vector file formats.
Data export formats
  • CSV
  • Other
Other data export formats
  • Esri Shape files
  • Esri File Geodatabases
  • MapInfo Tab
  • PostgreSQL/PostGIS
  • MapInfo TAB
  • Bentley MicroStation V8 DGN
  • Microsoft SQL Server Spatial (at additional cost)
  • Oracle Spatial backup
Data import formats
  • CSV
  • Other
Other data import formats
  • Esri Shape files
  • Esri File Geodatabases
  • Oracle Spatial
  • PostgreSQL/PostGIS
  • MapInfo TAB
  • Bentley MicroStation V8 DGN
  • Microsoft SQL Server Spatial (at additional cost)

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network Other
Other protection within supplier network Private network.

Availability and resilience

Availability and resilience
Guaranteed availability Whilst some clients will undoubtedly require specific SLA terms, the basic availability offered is based on the "Minutes in the Month" availability principle, with "Monthly Uptime" being the total number of minutes in a given month for which the service is available, and "Monthly Downtime" being the total accumulated minutes that are part of "Minutes in the Month" that have no service access. Downtime excludes announced Maintenance periods.

Monthly Uptime % = 100% - (Minutes in the Month - Monthly Downtime) / Minutes in the Month

The following Service Levels and Service Credits are applicable to 1Spatial's Cloud-based offerings:

If monthly uptime is less than < 99.9%, a service credit of 10% applies
If monthly uptime is less than < 99.0%, a service credit of 25% applies
If monthly uptime is less than < 95.0%, a service credit of 100% applies

As a standard service, 1Spatial Support is available on normal English working days, 09.00-17.30.
Approach to resilience 1Spatial's Cloud offerings are all hosted on Microsoft's Azure cloud platform. More information on resilience is available on request.
Outage reporting Outages are reported via an automated alert service.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Standard authentication credentials allow or deny access to all aspects of our service, and this depends upon group membership.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance accreditation No
Security governance approach Security governance is currently managed in accordance with our ISO 9001:2008 certified Quality Management System, which includes elements of ISO 27001.
Information security policies and processes 1Spatial has developed and implemented a Quality Management System (QMS) in order to document the company’s best business practices, better satisfy the requirements and expectations of its customers and to improve the overall performance of the company. The QMS is certified to satisfy the ISO 9001:2008 standard by our external auditor, LRQA​. As part of this, there are a number of procedures that govern security of 3rd party data and access to services. Every employee has a responsibility to follow the QMS procedures, and governance is provided by an Auditing Team of 7 people, all Department Heads, and ultimately the Board.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our project management model includes formal Change Management/Change Request/Decision Request procedures.

When a project is undertaken, the Project Inception and Project Elaboration stages capture and document the agreed scope and approach to change management.

In addition, a source code control repository is used to track changes to components and their configuration throughout their lifetime.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Potential threats and their impact and mitigation are dependent upon each individual client's specific requirements.

Security patches are always deployed as soon as they are tested and released.

Having previously built a cloud-based GIS for a petroleum sector client which is highly vulnerable to denial of service attacks, a specific risk register was collated with mitigation plans. This included using a specialist 3rd party to undertake penetration testing.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach The protective monitoring processes implemented are dependent upon each individual client's specific requirements, although by the very nature of the service being Azure based, it already benefits from CSA CCM v3.0 compliance.

When a project is undertaken, the Project Inception and Project Elaboration stages capture and document the agreed protective monitoring that the individual client specifically requires.

Response times will also normally be dependent upon the protective monitoring that the individual client specifically requires. These would normally be based on the standard response times offered by 1Spatial Support.
Incident management type Supplier-defined controls
Incident management approach 1Spatial Support provides a standard support service. This can be extended to include custom requirements in a bespoke SLA.

In terms of the standard service, clients report incidents by phone, email, or by logging the incident via the Support Portal. A case number is assigned and a Support Analyst takes ownership. Response and resolution times are based on the category and severity of the incident, as initially assess by the user reporting the incident.

All incidents can be reviewed and reported on directly by the user.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £5200 to £6800 per virtual machine per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Secure access to the full product for a small number of named users for 30 days.

Assistance with uploading data, product familiarisation/training, and rule development can be provided on request, subject to a negotiated agreement.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑