Skip to main content

Help us improve the Digital Marketplace - send your feedback

Motorola Solutions UK Limited

VideoManager

VideoManager is a digital evidence and asset management system (DEAMS).
Digital assets can be automatically gathered, tagged with metadata and searched for investigation purposes and securely shared. Assets can be correlated with information from Police Mobile Applications, Computer Aided Dispatch(CAD) or Records Management Solution(RMS).

Features

  • Asset Management. Store, view, search, redact all common data types
  • Asset Correlation Capability via user defined media fields
  • Search Functionality
  • Video Replay and Bookmarking
  • Geospatial Mapping Functionality
  • Incident Management
  • Sharing Capability
  • Retention Policies
  • Audit Trail of Chain of Custody
  • Redaction Tools

Benefits

  • Asset Management. Store, view, search, redact all common data types
  • Asset Correlation Capability via user defined media fields
  • Search Functionality
  • Video Replay and Bookmarking
  • Geospatial Mapping Functionality
  • Incident Management
  • Sharing Capability
  • Retention Policies
  • Audit Trail of Chain of Custody
  • Redaction Tools

Pricing

£15.00 to £80.00 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andy.glover@motorolasolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 0 2 8 5 7 6 7 9 6 0 3 1 6 4

Contact

Motorola Solutions UK Limited Andy Glover
Telephone: 07736636880
Email: andy.glover@motorolasolutions.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Motorola services such as CRS and Pronto
Cloud deployment model
Private cloud
Service constraints
The solution is provided as a hosted service on Supplier's private cloud.
System requirements
Suitable VPN access to hosted service.

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA by agreement and according to agreed incident severity levels
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard project-level support is included with the service on a Mon-Fri 9am-5pm (UK working days) basis. This project team handles standard project-level matters, software change requests, etc.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training and extensive online help
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
.Support to download and safely copy all digital media data and assets pertaining to the customer. All digital assets and customer data is then deleted.
End-of-contract process
.Support to download and safely copy all digital media data and assets pertaining to the customer. All digital assets and customer data is then deleted. Included in the price of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
All features of the service can be driven via the API
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Colour scheme, logos, login screen

Scaling

Independence of resources
Each customer has a dedicated instance of our service.

Analytics

Service usage metrics
Yes
Metrics types
Current digital storage use
Reporting types
Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data export is a standard feature of the service. The service supports user export of data through the GUI
Data export formats
Other
Other data export formats
Exports digital assets in whatever format they were imported in.
Data import formats
Other
Other data import formats
Any common digital asset format. e.g. mp4, mp3, pdf, jpg

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% service uptime
Approach to resilience
VideoManager hosting solution is built using a resilient architecture at Network, Platform and Application layer with local resilience and geographical data centre resilience; with no single points of failure. Further information on resilience can be provided upon request.
Outage reporting
Customers will be notified proactively by email of a service outage. Where access to the Service Management Terminal is available, customers will be able to check the status of any outage notifications within the application.

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
Dedicated VPN and then integration with customer's Active Directory for SSO
Access restrictions in management interfaces and support channels
Role Based Access Controls. The customer defines what access rights support staff have. Typically there is no access to customer's data.
Access restriction testing frequency
At least once a year
Management access authentication
Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LRQA (Lloyds)
ISO/IEC 27001 accreditation date
01/12/2023
What the ISO/IEC 27001 doesn’t cover
No exclusions
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have our own internal business and process security policies supporting the ISO/IEC 27001 standard

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configure, Audit, Validate, Report exceptions, investigate exceptions, resolve.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Identify vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls, monitor effectiveness of controls
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Collect events, look for pattern anomalies, report, manage through incident management
Incident management type
Supplier-defined controls
Incident management approach
Categorise, Prioritise, Triage, Diagnose, resolve, resolution and recovery, close incident

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Providing assistance to law enforcement agencies with criminal prosecutions to enable communities to enjoy a safer environment.

Pricing

Price
£15.00 to £80.00 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andy.glover@motorolasolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.