Skip to main content

Help us improve the Digital Marketplace - send your feedback

BRIGHTON ANALYTICS LIMITED

CrimeRate Risk Platform

Crime risk identification, analysis, and mitigation platform, with online crime maps, interactive dashboards, site risk score reports, and area overview reports covering areas from postcodes up to LSOAs and MSOAs, through to major towns, cities, counties. regions and national levels.

Features

  • Crime risk scores using severity weights per crime type
  • Getis-Ord Gi * Hotspot Identification
  • Populated-based analysis areas in addition to distance-based
  • Statistics at any coordinate location
  • Trend analysis for previous 10 years, with forecasting
  • Web interface supports smartphones
  • Online access, no software or apps to install

Benefits

  • Crime risk scores reflect distance from national average
  • Light-to-dark colour shading quickly identifies high-risk areas
  • Downloadable graphics including maps and charts
  • Raw data tables downloadable as CSV, Excel, and TSV
  • Pre-written analysis can be adapted for reports

Pricing

£10,000 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tom@brightonanalytics.org. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 7 6 1 7 9 5 7 6 0 7 6 2 1 8

Contact

BRIGHTON ANALYTICS LIMITED Thomas Buck
Telephone: 07983741802
Email: tom@brightonanalytics.org

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Report generations and dashboard access may be interrupted once a month for 30 minutes while new data is imported and processed.
System requirements
  • Up-to-date browser
  • Internet access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 business days
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
No
Support levels
Email support included with every contract.

Up to 8 hours/year telephone support with senior-level engineer included with contracts over £15,000/year.

Up to 3 business days/year on-site support with senior-level engineer included with contracts over £75,000/year.
Support available to third parties
No

Onboarding and offboarding

Getting started
Clients are on-boarded through the creation of a CrimeRate account and the activation of their CrimeRate Risk Platform.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Upon request, we can provide customer-submitted data in CSV, TSV, or Excel format. No costs or fees are charged for this.
End-of-contract process
Offboarding takes place after end of service emails are sent to the client, followed by the closure of their CrimeRate Risk Platform.

Using the service

Web browser interface
Yes
Supported browsers
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Limited statistical reporting displayed on maps. Limited statistical interactivity on maps.

Multi-column layouts become single-column, e.g. side-by-side charts will be display one-by-one as the user scrolls down the page.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
A web-based service interface for users to manage all of their service requests. There is an additional web interface for users to manage the features of their service.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Market research and following government guidance:

https://www.gov.uk/government/publications/doing-a-basic-accessibility-check-if-you-cant-do-a-detailed-one/doing-a-basic-accessibility-check-if-you-cant-do-a-detailed-one

https://www.gov.uk/service-manual/helping-people-to-use-your-service/testing-for-accessibility
API
No
Customisation available
No

Scaling

Independence of resources
We use dedicated servers to maximise performance with managed contention performance that limits the potential for user activity to cause service degradation.

Should there be any drop in performance, our service management systems would automatically initiate an incident alert, notifying us immediately so we can take swift corrective action

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Manual request to our support team. No fees charged.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • TSV
Data import formats
  • CSV
  • Other
Other data import formats
  • TSV
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The service will be available 99% of the time. This includes Scheduled and Unscheduled maintenance windows, and excludes Unscheduled maintenance due to third parties e.g. DDOS, hacking attempts, events outside our control.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
MFA with username + password, IP controls in place, and network separation and trust via CloudFlare Zero Trust.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Although not certified we apply the same security governance approach as in ISO/IEC 27001
Information security policies and processes
Follow ISO27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Service components are tracked and reviewed monthly, and risk assessments performed on security impacts.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Continuous internal monitoring of potential threats, with appropriate mitigation plans deployed based on risk severity ratings.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Audit and assessment via third parties. Incident response depends on the severity of the incident. Technical director works in immediate triage capacity.
Incident management type
Supplier-defined controls
Incident management approach
Technical director monitors processes and is defined as gold command role for initial stages of any incident.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality

Fighting climate change

Staff and suppliers are made aware of our environmental policy, and team members are actively encouraged to take a proactive approach to protecting the planet and environment.

Tackling economic inequality

We firmly believe in the power of education, and that children's minds are more than capable of using advanced tooling, no matter what their background is. For this reason, we provide the CrimeRate Risk Platform free to all secondary-and-below educational facilities, and actively invite questions, contributions, and homework challenges from everyone using the platform.

Pricing

Price
£10,000 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free unrestricted use for 14 days, which can be extended upon request.
Link to free trial
https://crimerate.co.uk

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tom@brightonanalytics.org. Tell them what format you need. It will help if you say what assistive technology you use.