Environment Systems Limited

Earth Observation Data Service

Provision of on-demand analysis-ready satellite data, environment and agricultural metrics.


  • On demand access to processed satellite imagery
  • Analysis ready data products from SAR (including Sentinel 1) satellites
  • Analysis ready data products from optical (including Sentinel 2) satellites
  • Environmental and agricultural metrics from satellite indices
  • Time series analysis of environmental and agricultural metrics
  • On demand analytics for your key areas of interest
  • API level access to data services
  • Highly scalable cloud-based data service
  • Data published under open data licence (CC-BY-SA-4.0)


  • On demand access to near real time information
  • Evidence base from field to farm, to national coverage
  • Analysis ready data analytics on current agricultural performance
  • Analysis ready data analytics on state of our current environment
  • Key input for modelling, monitoring, land management, and policy formulation
  • Standards based to help seamless integration into existing workflows
  • Metrics collection in all-weather from SAR satellites
  • Analyse historic agricultural and environmental metrics
  • Open data licence to give you freedom to operate


£200 to £700 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve.keyworth@envsys.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 8 5 6 3 1 3 6 1 9 9 8 1 6 0


Environment Systems Limited Steve Keyworth
Telephone: 01970626688
Email: steve.keyworth@envsys.co.uk

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements
  • Modern internet browser (Chrome, Firefox, IE11+)
  • 2MB+ internet connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
Usually within 24 hours.
Monday to Friday - 9am to 5pm weekdays
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
All users receive the same levels of support
Support available to third parties

Onboarding and offboarding

Getting started
Online Tooltips are provided
Online video tutorials demonstrating service
Service documentation
End-of-contract data extraction
Data products are available to download and offline use for duration of access period.
End-of-contract process
Paid for features of account are disabled. The account remains in place for easy re-enabling/purchase.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All features are the same across mobile and desktop. There will be some changes in layout flow in the mobile due to screen sizes.
Service interface
What users can and can't do using the API
- Users can request all data from the catalogue and transfer/download to their own data storage (server or cloud).

- Users can search catalogue by date, and select data from returned results for transfer/download to their own data storage (server or cloud).

- Users can search catalogue by location, and select data from returned results for transfer/download to their own data storage (server or cloud)
API documentation
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Customisation available


Independence of resources
We mitigate by:
1) Using virtual machines on which we can change the resource allocation in response to demand
2) Performing user processing jobs on scalable node clusters, automatically responding to higher loads with more processing nodes.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other data at rest protection approach
All data are held on Amazon Web Services and are subject to their data at rest
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Using personalised download link from the data services portal.
Data export formats
  • CSV
  • Other
Other data export formats
  • Zipped data package containing GeoTiff and metadata
  • ESRI shapefile
Data import formats
Other data import formats
Zipped ESRI Shapefile

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other protection within supplier network
Amazon Web Services security, including secure API keys

Availability and resilience

Guaranteed availability
Environment Systems Earth Observation Data Services availability is described in the Terms of Service and Service Level Agreement available here https://data.envsys.co.uk/terms
Approach to resilience
Available on Request
Outage reporting
In-house Nagios monitoring resulting in a notice on dashboard and email alert to Environment Systems DevOps administrators. For custom services and AWS cloud watch for AWS services with automated alerts going to Environment Systems DevOps administrators. User notifications will be provided.

Identity and authentication

User authentication needed
User authentication
  • Username or password
  • Other
Other user authentication
Password supplied is verified against password hash for supplied email.

Other: For API access, request information is hashed using a secret private key, public key is passed to server with request and hash. Server hashes request information with private key corresponding to public key and checks the hashes match.
Access restrictions in management interfaces and support channels
Username and passwords. Only specific tagged accounts have access to the management interface. Management access only from Environment Systems IPs.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Cyber Essentials accredited
Information security policies and processes
Environment Systems has a Data Security Policy that is owned and maintained by the Operations Director (company Director). The purpose of the Data Security Policy is to ensure the effective protection and proper usage of data within Environment Systems. The creation and management of data in the organisation is considerable, and the dependency on data in the delivery of Environment Systems services is high. The aim of the Data Security Policy is to ensure that all data is managed in a secure and efficient manner by assisting in the maintenance of data at an operational level. Contraventions of the Data Security Policy could seriously disrupt the operation of Environment Systems, clients and partners and any breaches will be treated seriously.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have three environments (Dev, Staging, and Live). The Dev environment is used to apply vendor supplied software updates to the components, and new feature developments. The Staging environment is used for testing hot-fixes (including security), and to highlight issues with merges from Dev, prior to going Live.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Environment Systems monitors multiple sources daily for the latest security threats.
Sonicwall Application and Threat Protection Highlights both email, together with Nagios alerts notify Environment Systems Dev. Ops. when critical security updates (operating system) are needed for the cloud infrastructure, including Elastic Compute Cloud servers. These are then actioned within 24 hours. Postgis and Elastic File System‎ updates are handled by Amazon directly.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We generate security alerts by processing control data using detection and compliance rulesets; deploy new or modified ruleset(s) that has been confirmed by Environment Systems to accurately identify cyber threats, to continually improve the generation of security alerts; process and analyse the security alerts generated by the system; we raise a security incident once a threat has been identified by a Environment Systems Dev. Ops.
Incident management type
Supplier-defined controls
Incident management approach
Environment Systems takes breaches of security very seriously. All breaches will be investigated by the board of directors and following the gathering of evidence and establishment of facts, appropriate policy and operational changes will take place, with disciplinary action (if required) as appropriate.

Environment Systems backup procedures (both systems and data) enable the company and company services to be restored to a normal service operation as quickly as possible and to minimise the impact on business operation.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£200 to £700 a user a month
Discount for educational organisations
Free trial available
Description of free trial
The free, open data option provides access to rolling, seasonal, composite imagery of Great Britain.
The map interface enables registered users to choose from a time period, pan/zoom and select an AOI for download, complete with relevant metadata. Downloaded data are suitable for use in a GIS for further analysis.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve.keyworth@envsys.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.