Automated data validation, cleansing, transformation and enhancement for your data with 1Spatial's business rules engine.
- Capture data management requirements as automated, easily managed business rules
- Apply business rules automatically to spatial and non-spatial data
- Pinpoint the exact location of errors in failing features
- Perform rules-based data re-engineering
- Automate the creation and update of datasets
- Automate the integration or transformation of datasets
- Create and manage multiple rule sets for different data holdings
- Cross-reference multiple sources of data for accurate validation and integration
- Invoke processes from external systems via web services
- Scale the system to increase throughput when needed
- Check and prove compliance of data across your enterprise
- Control, consistency and confidence in your data
- Allow accurate decision making, ensure compliance and improve customer experience
- Share data confidently
- Inference rules help find missing assets
- Save time and money by automating costly manual processing
- Better data ensures better customer service and asset investment plans
- Trust your data and the decisions that depend on it
- Know what data is non-conformant with rules and why
- Implement continuous improvement methodology
£5200 to £6800 per virtual machine per month
- Free trial available
1Spatial Group Ltd
01223 420 414
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
Standard support is provided for normal UK business days.
Virus protection is not provided as standard. Clients may provide their preferred virus protection software or this can be sourced on request by 1Spatial.
|Email or online ticketing support||Email or online ticketing|
|Support response times||
1Spatial Support is provided during normal UK business days, 09.00-17.30. Extended hours and specific requirements can also be offered if required.
Support cases are categorised in 1 of 5 levels of severity. An initial response time is based on the severity and ranges from 15 minutes to 60 minutes. The target resolution times are also based on severity, ranging from 4 hours to 80 Hours.
Users raise and initial categorise their support cases via 1Spatial Support's online Support Portal, where they also monitor cases.
Telephone and email can also be used for support cases.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
The 1Spatial Support service offers a comprehensive incident management service that is designed to ensure that all queries and incidents are logged accurately, and problems assigned to relevant specialists to give the fastest possible resolution. An account manager is always assigned to a client and can assist the Support team where necessary.
A standard Support service is typically offered and the per annum cost is calculated as a standard proportion of the value of software licences and/or application services sold. Where extended or alternative support services are requested, these are priced based on the scope of the service a specific client requires.
For online incident ticket management, we use Salesforce. This cloud based service supports users working with assistive technology, such as speech recognition software and screen readers, and it follows the internationally recognised best practices in Section 508 of the Rehabilitation Act and the Web Content Accessibility Guidelines (WCAG) 2.0 Level AA to the extent possible.
|Support available to third parties||Yes|
Onboarding and offboarding
Users require training in rule authoring, for which there is a 2 day standard training course.
1Spatial can provide training at its own training facility in Cambridge or on client sites.
|End-of-contract data extraction||
The service is typically not used to store data, but process data and deliver outputs that the user will take into data stores elsewhere. It is therefore unlikely that there will be a need to extract any data when the contract ends, although the service itself contains the tools needed to extract/export and deliver data in a range of interchange formats.
It is also possible to purchase the system to run on-premise and to save the rules from the cloud environment to the on-premise environment. These are exported and delivered as XML documents.
|End-of-contract process||At the end of the contract, the service simply terminates on the date on which the client has paid up to. Any business rules that the client has authored can be exported as XML documents so that, upon termination, they can be kept by the client (and used in the clients on-premise 1Spatial software) as they will otherwise be removed from the service.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||Because the service is accessed via standard browsers, compliance with accessibility standards is typically as aspect of the browser, not 1Spatial's service. Most standard browsers attest to be compliant with WCAG 2.0 and there are also a number of browser add-ons specifically for users who require support with accessibility.|
|What users can and can't do using the API||
The web services API allows integration into third party workflows, software or scripts. Anything that can be done via the user interface can also be achieved using the web services API. Typically, users will author rules, data stores, actions and sessions via the user interface and then run the sessions by invoking the web services API.
The API is available both as a REST or SOAP APIs.
- The SOAP API is a SOAP 1.0 service using document/literal bindings. It uses HTTP basic authentication and is Web Services Interoperability Foundation (WS-I) compliant.
The API is defined by a WSDL (Web Services Description Language) document accessible as a URL from a 1Integrate server. Many software languages (e.g. Java, .Net) provide tools which you can use to process the WSDL and automatically generate classes in the respective language. These classes (often called client code or ‘stubs’) can then be embedded within your software and called to invoke the service, without needing to know the details of the SOAP web services protocol. In addition the web services API can be called from other workflow technologies such as Business Process Execution Language (BPEL) scripts.
- The REST API is provided with token-based security.
|API documentation formats||
|API sandbox or test environment||No|
|Description of customisation||The user can author rules and actions. The service is built around the concept of rules and actions being authored via a user interface in order to meet an organisations' specific quality management and processing needs. The API allows the service to be integrated into 3rd party applications.|
|Independence of resources||Each client is best served by having a dedicated virtual server environment within the Cloud. This ensures that the right resources are provided based on the individual client's needs with respect to data volumes, users and usage, availability, and that a client is not affected by other clients' usage.|
|Service usage metrics||Yes|
|Metrics types||Using the Rapid UI portal provided with the service, each time validation is performed, statistics are gathered on the rules that were run relating to the quality of the data and its conformance to the rules. These results are stored and accessible via a user-configurable dashboard showing trends of data quality over time for different rules and different groups of users.|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with CSA CCM v3.0|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
The service publishes data that represents either validation non-conformance reports or the results of improved or transformed data.
The configuration allows data to be downloaded as zip file of GIS data using a number of common spatial vector file formats.
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||Other|
|Other protection within supplier network||Private network.|
Availability and resilience
Whilst some clients will undoubtedly require specific SLA terms, the basic availability offered is based on the "Minutes in the Month" availability principle, with "Monthly Uptime" being the total number of minutes in a given month for which the service is available, and "Monthly Downtime" being the total accumulated minutes that are part of "Minutes in the Month" that have no service access. Downtime excludes announced Maintenance periods.
Monthly Uptime % = 100% - (Minutes in the Month - Monthly Downtime) / Minutes in the Month
The following Service Levels and Service Credits are applicable to 1Spatial's Cloud-based offerings:
If monthly uptime is less than < 99.9%, a service credit of 10% applies
If monthly uptime is less than < 99.0%, a service credit of 25% applies
If monthly uptime is less than < 95.0%, a service credit of 100% applies
As a standard service, 1Spatial Support is available on normal English working days, 09.00-17.30.
|Approach to resilience||1Spatial's Cloud offerings are all hosted on Microsoft's Azure cloud platform. More information on resilience is available on request.|
|Outage reporting||Outages are reported via an automated alert service.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Standard authentication credentials allow or deny access to all aspects of our service, and this depends upon group membership.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||No|
|Security governance accreditation||No|
|Security governance approach||Security governance is currently managed in accordance with our ISO 9001:2008 certified Quality Management System, which includes elements of ISO 27001.|
|Information security policies and processes||1Spatial has developed and implemented a Quality Management System (QMS) in order to document the company’s best business practices, better satisfy the requirements and expectations of its customers and to improve the overall performance of the company. The QMS is certified to satisfy the ISO 9001:2008 standard by our external auditor, LRQA. As part of this, there are a number of procedures that govern security of 3rd party data and access to services. Every employee has a responsibility to follow the QMS procedures, and governance is provided by an Auditing Team of 7 people, all Department Heads, and ultimately the Board.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Our project management model includes formal Change Management/Change Request/Decision Request procedures.
When a project is undertaken, the Project Inception and Project Elaboration stages capture and document the agreed scope and approach to change management.
In addition, a source code control repository is used to track changes to components and their configuration throughout their lifetime.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Potential threats and their impact and mitigation are dependent upon each individual client's specific requirements.
Security patches are always deployed as soon as they are tested and released.
Having previously built a cloud-based GIS for a petroleum sector client which is highly vulnerable to denial of service attacks, a specific risk register was collated with mitigation plans. This included using a specialist 3rd party to undertake penetration testing.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
The protective monitoring processes implemented are dependent upon each individual client's specific requirements, although by the very nature of the service being Azure based, it already benefits from CSA CCM v3.0 compliance.
When a project is undertaken, the Project Inception and Project Elaboration stages capture and document the agreed protective monitoring that the individual client specifically requires.
Response times will also normally be dependent upon the protective monitoring that the individual client specifically requires. These would normally be based on the standard response times offered by 1Spatial Support.
|Incident management type||Supplier-defined controls|
|Incident management approach||
1Spatial Support provides a standard support service. This can be extended to include custom requirements in a bespoke SLA.
In terms of the standard service, clients report incidents by phone, email, or by logging the incident via the Support Portal. A case number is assigned and a Support Analyst takes ownership. Response and resolution times are based on the category and severity of the incident, as initially assess by the user reporting the incident.
All incidents can be reviewed and reported on directly by the user.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£5200 to £6800 per virtual machine per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
Secure access to the full product for a small number of named users for 30 days.
Assistance with uploading data, product familiarisation/training, and rule development can be provided on request, subject to a negotiated agreement.
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|