Dfuze Intelligence Handling System
Dfuze Net provides a versatile software framework for managing information, supporting activities like collection, storage, and dissemination. It integrates with Dfuze and Dfuze Mobile Operator, enhancing functionality and compatibility with existing systems, both online and offline across various devices.
Features
- Case Management
- Collaboration and Intelligence Sharing
- Geospatial Analysis
- Image Management
- Incident Management
- Investigation Management
- Case Reports
- Document Management
- OSINT augmentation
- AI on premise
Benefits
- Improved collaboration: Mobile applications at scene.
- Enhanced geospatial analysis: Map-based environment for data visualisation
- Streamlined case management: Tracking progress and assigning tasks.
- Intelligence sharing: Sharing information with other agencies
- Investigation management: Managing investigations from start to finish
- Knowledge management: Storing and retrieving case-related knowledge
- Reporting: Customisable templates for generating reports
- Data visualisation: Customisable dashboards for data analysis
- Full audit trail for workflow integrity
- Exploit structured and unstructured data on premise
Pricing
£3,500 to £5,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 1 6 7 4 6 0 3 1 2 4 0 4 1 1
Contact
ISS Global
Laine Napier
Telephone: 0207 060 9730
Email: sales@issglobal.eu
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Windows Server 2019+ Standard or Enterprise.
- Microsoft SQL Server 2019+ Enterprise for database management.
- Internet Information Services (IIS) configured for web hosting.
- Antivirus or Windows Defender for system security.
- SSL Certificate applied to the server for secure connections.
- Virtual Private Network (VPN) setup for secure remote access.
- Data backup solutions with differential backup and live synchronization.
- Microsoft Office for indexing and accessibility of Office-based files.
- Virtualisation and failover capabilities.
- SQL Server Reporting Services
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Standard or Premium Maintenance Contracts are available offering office hour support and also 24/7 support for customers
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Dfuze provides various levels of support to its customers, including email, phone, online training, documentation, community forum, video tutorials, personalised support, and regular software updates. The company’s support team is available 24/7 to assist customers with any issues or questions they may have. Additionally, Dfuze offers personalised support, including one-on-one training and customized solutions, to help customers get the most out of the software.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- To aid users in commencing utilization of our service, we provide various resources and support options. These include user documentation, online training sessions, on-site training, tutorial videos, user support, a knowledge base, a community forum, and consulting services. Our comprehensive range of resources ensures users can access information and guidance whenever needed, making it easier to navigate the platform and derive maximum benefit from it.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data Export Feature: Our platform offers a built-in data export feature that enables users to extract their data with ease. Users can select the data they want to export, choose the format, and download it directly from within the platform.
- End-of-contract process
-
At the end of the contract, users can choose to either renew their agreement or opt out. If they decide to renew, we provide a straightforward process for extending the contract term. This includes negotiating new pricing terms and agreeing on any additional services required. Any changes to the original contract are reflected in the updated agreement.
The price of the contract typically includes access to our platform, user support, and training. Additional costs may apply for customisation, data extraction, or integration with other systems. These costs vary depending on the specific requirements of each user.
We work closely with users to ensure a smooth transition at the end of their contract term. Our team provides clear guidance and support throughout the process, ensuring that users can make informed decisions about their continued use of our platform.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The mobile version:
Responsive Design: The mobile app is designed to be responsive, adapting to different screen sizes and orientations for a better user experience on smaller screens.
Offline Access: The mobile app allows users to access Dfuze data even without an internet connection, making it ideal for remote or offline work.
Touch-Friendly Interface: The mobile app is designed for touch input, making it easier to use with a finger on a small screen. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The Dfuze service interface features a clean and modern design with intuitive navigation, search bar, record views, data grids, customisable dashboards, alerts/notifications, integration icons, and personalisation options.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- We conducted interface testing with users of assistive technology to ensure the application’s accessibility and usability for all. Testing involved observing and analysing user behavior with different types of disabilities, using assistive technologies such as screen readers and voice-controlled interfaces. Based on these tests, we made improvements to enhance readability, navigation, and voice-controlled interfaces, and provided additional feedback and error handling mechanisms. By conducting interface testing, we ensured the application is accessible to users with disabilities, providing a more inclusive user experience.
- API
- Yes
- What users can and can't do using the API
- The Dfuze API allows users to perform various actions related to data management, customisation, and integration within the platform. These actions include creating, reading, updating, and deleting templates, user accounts, and data grid settings; configuring dashboards; integrating with other systems; automating tasks; building custom applications; extracting data; managing user roles and permissions; and performing analytics and reporting. By leveraging these capabilities through the API, users can tailor the platform to their specific needs and streamline their workflows.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
In Dfuze, users can customise various aspects of the platform to suit their needs. These include:
Creating custom user roles and permissions to control access to data and functionality within the platform.
Configuring dashboards to display relevant information and metrics for specific teams or departments.
Building custom applications using the API to automate tasks, integrate with other systems, and perform analytics and reporting.
Extracting data through the API to manipulate and analyse it outside of Dfuze.
Managing user accounts and settings to improve the overall user experience.
Create user specified Databases and Picklists.
By providing these customisation options, Dfuze enables users to tailor the platform to their specific needs and streamline their workflows.
Scaling
- Independence of resources
- To ensure each user’s independence, we allocate private clouds for each customer. This means their resources are isolated from others, minimising any potential impact from other users’ demands. By providing dedicated infrastructure, we guarantee that users won’t be affected by the actions of others, giving them full control over their data and resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Via Audit trail available to Admins in Dashboard format
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
Regular Backups: We perform regular backups of all data to secure offsite locations, such as external hard drives or cloud storage services. These backups are stored in tamper-evident containers to prevent unauthorised alteration or deletion.
Compliance: We adhere to industry standards and regulations for data protection, such as GDPR and HIPAA, to ensure our users’ data is safeguarded in compliance with legal requirements. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data Export Feature: Use the built-in data export feature within the platform to select the data you want to export and choose the desired format.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Word
- PPTX
- Excel
- TXT
- Data import formats
-
- CSV
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- At Dfuze, we ensure the high availability of our platform and services through various measures. We aim to maintain a 99.9% uptime rate, with any scheduled maintenance taking place during non-peak hours to minimize disruptions. In case of unforeseen issues, our support team works around the clock to resolve them quickly. We provide an SLA outlining the expected availability and service quality, which is regularly reviewed and updated. By guaranteeing a high level of availability, we give users peace of mind when working with sensitive information.
- Approach to resilience
- Available on request
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Administrators versus Users
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have a rigorous configuration and change management approach in place to ensure systems are configured and changed securely and efficiently. Our process includes a CMS for managing configurations, a change management process with impact analysis and mitigation strategies, and a CAB for reviewing proposed changes. We also conduct post-implementation monitoring and validation, document lessons learned, and prioritize continuous improvement. By following these processes, we minimize the risk of security breaches or disruptions to our operations.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We have a proactive vulnerability management approach that includes regular scanning and assessment of our systems for potential weaknesses. We use automated tools to identify and prioritise vulnerabilities, and then develop and implement mitigation plans to address them. Our process also involves ongoing monitoring and reassessment to ensure the effectiveness of these measures and maintain the security of our systems.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We have a comprehensive protective monitoring approach to ensure the security and integrity of our systems. We use various tools and techniques, such as intrusion detection systems, log analysis, and network monitoring, to detect potential threats in real-time. Our process also involves ongoing assessment and evaluation of these monitoring activities to identify areas for improvement and maintain the effectiveness of our protective measures.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We adhere to a well-defined incident management process that includes timely identification and reporting of incidents, thorough analysis and assessment, effective mitigation and remediation, and continuous monitoring and improvement. We also ensure compliance with industry standards and regulations, such as ITIL and HIPAA, to maintain the security and integrity of our systems. Our incident management process is designed to minimize disruptions and losses, while ensuring that lessons learned are documented and used for future improvements.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Managed cloud hardware and multiple service devices like NAS hardware
Pricing
- Price
- £3,500 to £5,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Limited hosted period of 30 days