Pixelate
SaaS for video and CCTV redaction. The service ensures compliance with GDPR by allowing the user to protect the identities of individuals shown in CCTV footage by automatically blurring those not relevant to a SAR.
Features
- Video redaction
- Video pixelation
- GDPR compliance
- CCTV redaction
- CCTV pixelation
- Subject access requests
Benefits
- GDPR compliance
- Secure
- Web based
- Quick and easy to use
Pricing
£25.00 to £75 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 1 8 4 3 3 2 2 0 0 8 1 9 9 4
Contact
Ocucon Ltd
Simon Gardner
Telephone: 0191 2242444
Email: simon.gardner@ocucon.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Nil
- System requirements
-
- Optimised for Google Chrome
- No specific hardware requirements
- High speed internet connection (upload and download)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 2 hours 0900-1700 Monday to Friday. Other SLA times and weekend coverage available by separate negotiation.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- As a self-service SaaS platform, minimal support is required. However, first and second line user support is available 0900-1700 Monday to Friday by email ticket and telephone within the UK.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full user documentation, online demos and educational resources are provided to get users started with the software. User accounts can be created by the designated administrator for your organisation.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- When the subscription ends, users can access their data by contacting our customer support team. Deleted CCTV data from the system by the users is unrecoverable.
- End-of-contract process
- This is a true SaaS solution with no additional costs and as such there are no end of contract costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- For large volume clients, we have the ability to brand and customise to the buyer's corporate style guidance and image. Bespoke subscription packages can also be created to discount for large or unlimited use. There is also an option to host the service in the customer's infrastructure if required.
Scaling
- Independence of resources
- The system is able to adapt to workload changes by provisioning and de-provisioning resources automatically. Meaning that peak demand from one user cannot impact the performance of the software across all users.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Number of active users
Number of transactions
Number of available minutes
Type of subscription
Purchase information and invoices - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- On completion of the redaction, users are able to download their video directly to their local computer.
- Data export formats
- Other
- Other data export formats
- MP4
- Data import formats
- Other
- Other data import formats
-
- AVI
- MP4
- MKV
- MOV
- FLV
- SSF
- VOB
- OGV
- 3g2
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- A financially backed SLA credits the user in the scenario where the service fails to correctly process the video file(s).
- Approach to resilience
- In order not to breach the NDA signed with our Tier3 data centre; this information is available on request.
- Outage reporting
- A private dashboard is available to all users. Email alerts will be sent to all users ahead of any planned maintenance.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Full granular User level Access Control (UAC) is implemented throughout the software. This ensures that there are user-based access control rules and logic to separate user, admin and reporting functions.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 05/01/2020
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- Nil
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Ocucon has adopted ISO27001 for Information Security and conducts regular training to ensure that staff members remain current and aware of best practice and company security policy. All Software Engineers have line responsibility for security within their development teams, reporting to the CTO who is the responsible Officer for security.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Product development is conducted in a non-production (staging and testing) environment with a comprehensive version control system providing full rollback and reversion capacity, along with pre-deployment version release notes. The system allows complete control of pre-staging and pre-deployment testing and detailed notation and archive storage of all versions and iterations of the software as it progresses through development lifecycle for Digital by Default software development
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Threats are assessed by: robust internal whitehat vulnerability testing (periodically conducted), user reported threats and independent external penetration testing. Patches are deployed within 1 business day for critical patches.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Internal whitehat testing is coupled with external vulnerability and compromise monitoring and explicit proactive testing to form a multi-layered compromise monitoring system. Our response to a compromise is always [1] immediate disclosure [2] rapid patch and hotfix development followed by [3] slower deep analysis of the root cause of the compromise and an engineering review meeting to ensure the compromise is not a broader issue within the software.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Pre-defined processes exist for common events including, but not limited to, DOS and DDOS attacks, network saturation and MITM attacks.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Our cloud based service reduces the need for users to purchase additional more powerful hardware, which is often a requirement for application based software packages needed to redact CCTV. While enabling multiple users to access the system, from multiple locations, also reduces the carbon footprint of the solution, Ocucon are also in the process of offsetting this total carbon footprint, including the data centre that will be completed by August 2022.
Pricing
- Price
- £25.00 to £75 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can provide access to the service with reduced functionality to enable users to experience the software.
- Link to free trial
- https://pixelate.ocucon.com/register