CrimeRate Risk Platform
Crime risk identification, analysis, and mitigation platform, with online crime maps, interactive dashboards, site risk score reports, and area overview reports covering areas from postcodes up to LSOAs and MSOAs, through to major towns, cities, counties. regions and national levels.
Features
- Crime risk scores using severity weights per crime type
- Getis-Ord Gi * Hotspot Identification
- Populated-based analysis areas in addition to distance-based
- Statistics at any coordinate location
- Trend analysis for previous 10 years, with forecasting
- Web interface supports smartphones
- Online access, no software or apps to install
Benefits
- Crime risk scores reflect distance from national average
- Light-to-dark colour shading quickly identifies high-risk areas
- Downloadable graphics including maps and charts
- Raw data tables downloadable as CSV, Excel, and TSV
- Pre-written analysis can be adapted for reports
Pricing
£10,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 6 1 7 9 5 7 6 0 7 6 2 1 8
Contact
BRIGHTON ANALYTICS LIMITED
Thomas Buck
Telephone: 07983741802
Email: tom@brightonanalytics.org
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Report generations and dashboard access may be interrupted once a month for 30 minutes while new data is imported and processed.
- System requirements
-
- Up-to-date browser
- Internet access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 2 business days
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Email support included with every contract.
Up to 8 hours/year telephone support with senior-level engineer included with contracts over £15,000/year.
Up to 3 business days/year on-site support with senior-level engineer included with contracts over £75,000/year. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Clients are on-boarded through the creation of a CrimeRate account and the activation of their CrimeRate Risk Platform.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Upon request, we can provide customer-submitted data in CSV, TSV, or Excel format. No costs or fees are charged for this.
- End-of-contract process
- Offboarding takes place after end of service emails are sent to the client, followed by the closure of their CrimeRate Risk Platform.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Limited statistical reporting displayed on maps. Limited statistical interactivity on maps.
Multi-column layouts become single-column, e.g. side-by-side charts will be display one-by-one as the user scrolls down the page. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- A web-based service interface for users to manage all of their service requests. There is an additional web interface for users to manage the features of their service.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
Market research and following government guidance:
https://www.gov.uk/government/publications/doing-a-basic-accessibility-check-if-you-cant-do-a-detailed-one/doing-a-basic-accessibility-check-if-you-cant-do-a-detailed-one
https://www.gov.uk/service-manual/helping-people-to-use-your-service/testing-for-accessibility - API
- No
- Customisation available
- No
Scaling
- Independence of resources
-
We use dedicated servers to maximise performance with managed contention performance that limits the potential for user activity to cause service degradation.
Should there be any drop in performance, our service management systems would automatically initiate an incident alert, notifying us immediately so we can take swift corrective action
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Manual request to our support team. No fees charged.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- TSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- TSV
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The service will be available 99% of the time. This includes Scheduled and Unscheduled maintenance windows, and excludes Unscheduled maintenance due to third parties e.g. DDOS, hacking attempts, events outside our control.
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- MFA with username + password, IP controls in place, and network separation and trust via CloudFlare Zero Trust.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Although not certified we apply the same security governance approach as in ISO/IEC 27001
- Information security policies and processes
- Follow ISO27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Service components are tracked and reviewed monthly, and risk assessments performed on security impacts.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Continuous internal monitoring of potential threats, with appropriate mitigation plans deployed based on risk severity ratings.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Audit and assessment via third parties. Incident response depends on the severity of the incident. Technical director works in immediate triage capacity.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Technical director monitors processes and is defined as gold command role for initial stages of any incident.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
Fighting climate change
Staff and suppliers are made aware of our environmental policy, and team members are actively encouraged to take a proactive approach to protecting the planet and environment.Tackling economic inequality
We firmly believe in the power of education, and that children's minds are more than capable of using advanced tooling, no matter what their background is. For this reason, we provide the CrimeRate Risk Platform free to all secondary-and-below educational facilities, and actively invite questions, contributions, and homework challenges from everyone using the platform.
Pricing
- Price
- £10,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free unrestricted use for 14 days, which can be extended upon request.
- Link to free trial
- https://crimerate.co.uk