Skip to main content

Help us improve the Digital Marketplace - send your feedback

Motorola Solutions UK Limited

WAVE PTX

WAVE PTX is a subscription-based group communication service that instantly connects teams at a push to talk of a button across different devices, networks, and locations. Easily share voice, text, photos, video and more with a group or individual at the push of a button. All from one PTT application.

Features

  • Secure Push to Talk service for purpose-built, smartphones and desktops
  • Connect teams instantly with Android and iOS PTT communications
  • Sharing of text, picture, video, audio and file attachments
  • Location, presence and status sharing across users with mapping capabilities
  • Easy to read communication thread with time stamps
  • Web Dispatch control room application for PTT, mapping and messaging
  • Communicate across any IP network including WIFI, 4G, 3G, Internet
  • High availability supported through resilient deployment architecture
  • AES256 bit encrypted individual and group communications

Benefits

  • Secure and Instant Push to Talk team communication
  • Simplicity of radio communications Instant Communication on your teams´ phones
  • Users can communicate accross different networks and devices
  • Connect to users regardless of geographical location
  • Fast deployment to existing mobile devices (BYOD)
  • Add/remove users as your business needs change
  • Predictable subscription fees makes it easy to budget
  • Geographical and local redundancy provides enterprise
  • No servers to maintain means you can focus on business

Pricing

£97.00 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andy.glover@motorolasolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 4 6 5 8 6 2 4 9 4 8 1 7 0 7

Contact

Motorola Solutions UK Limited Andy Glover
Telephone: 07736636880
Email: andy.glover@motorolasolutions.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Not Applicable
System requirements
  • IOS or Android for WAVE PTX app.
  • Chrome or IE11 Windows Browser for WAVE Dispatch.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times will depend on issue priority. For tickets categorized as P1 and P2, there is a 24x7 support response. For others, it is 8 x 5 on standard business days, which is normally Monday through Friday 8AM to 5PM UK time, excluding public holidays.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
No
Support levels
As part of the subscription service, Motorola Solutions provides Tier 1 triage, Tier 2 technical support and Tier 3 Engineering Support.
Support available to third parties
No

Onboarding and offboarding

Getting started
App stores contain usage explanations for App and in-App tutorial. WAVE PTX Dispatch contains introductory tutorial and online help.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data is not exportable
End-of-contract process
Users continue through contract renewal or are deactivated.

Using the service

Web browser interface
Yes
Supported browsers
Chrome
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
WAVE PTX app on mobile devices is for individual PTT communications operations. WAVE PTX Dispatch on desktops is for centralised group communications monitoring and control.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
WAVE PTX is based on carrier grade PTT solution. System applications are designed to operate in redundant mode. Solution is based on Microsoft Azure cloud to ensure further uptime and redundancy based on Azure implementation.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
Broadband PTT application uses the Advanced Encryption Standard (AES)-256 to encrypt locally stored data, including authentication credentials, configuration and settings. Locally stored data can be decrypted by the Broadband PTT application only on the specific device on which it was encrypted. The PTT application will not log sensitive data (username/password, configuration values received from the server), or PTT application configuration values. Data at rest in the infrastructure is protected by access control including 2FA. - DB encryption: sensitive information (multimedia messaging, location) is stored encrypted. - Storage encryption: in Azure, MSI uses Azure Managed Disk Service with AES 256 encryption.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is not exportable
Data export formats
Other
Other data export formats
Data is not exportable
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Data in transit is protected using secure protocols TLS (Version 1.2), DTLS, HTTPS and encryption of application payload (AES 256). All control plane and web traffic is TLS protected with FIPS compliant crypto.
Data protection within supplier network
Other
Other protection within supplier network
Microsoft Azure provides a secure foundation across physical, infrastructure and operational security for the WAVE PTX system. Azure is responsible for the security of the cloud; Application is responsible for security in the cloud. Azure enables application to control the content. AES-256 and TLS are used to encrypt all voice traffic and signalling information travelling between the Broadband PTT application and the Gateway server at the Broadband PTT Data Centre.

Availability and resilience

Guaranteed availability
Response times are dependent upon Priority Level (P). P1 catastrophic failure or critical failures; P2- failure that limits normal use or major features; P3- failure that does not prevent use of the application; P4- does not cause any real operational impact.
Approach to resilience
The system design consists of fully redundant servers that are deployed with load balancing applied. At least two instances are hosted in different availability zones in a region in Azure cloud. Availability zones in the region are geographically separated in different data centres.
Outage reporting
The system is deployed in Azure cloud and servers are monitored within a Network Operations Centre for alarms that trigger the WAVE PTX Dev Ops team if a service affecting issue arises

Identity and authentication

User authentication needed
Yes
User authentication
Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels
The system uses strict role based access controls both physical and logical to protect information and resources from unauthorized access. MSI uses MSI IT Credentials with Two Factor Authentication (2FA) for MSI OAM access to the hosting infrastructure. OAM Access is over a VPN connection from MSI provided devices. Based on MSI’s Access Control policy (internal ticketing system) access is granted after manager and platform owner approval
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Two factor authentication will be implemented in 2024.

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Lloyd´s Register
ISO/IEC 27001 accreditation date
30/07/2021
What the ISO/IEC 27001 doesn’t cover
No exclusions
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
ISO/IEC 27001. MSI has a well established Cybersecurity organization that provides Governance, Strategy, Guidance and Services to development teams throughout Motorola Solutions pertaining to Cybersecurity Process, Risk Management, SDLC and Compliance Assessment.
Information security policies and processes
MSI security practices are based on NIST cybersecurity framework functions: Identify, Protect, Detect, Respond and Recover.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configure, Audit, Validate, Report Exceptions, investigate exceptions, resolve.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We identified vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls and monitor the effectiveness of controls.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Collect events, look for pattern anomalies, report and manage through incident management.
Incident management type
Supplier-defined controls
Incident management approach
Categorise, Prioritise, Triage, Diagnose, resolve, resolution and recovery, close.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Wellbeing

Fighting climate change

Reduces the need for users to travel, reducing carbon emissions

Wellbeing

All users can be included in the conversations or user groups as required

Pricing

Price
£97.00 a unit
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Motorola offers demos at no cost for a limited period of time. Please contact you account representative for all details regarding demo capabilities and the process for obtaining it.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at andy.glover@motorolasolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.