WAVE PTX
WAVE PTX is a subscription-based group communication service that instantly connects teams at a push to talk of a button across different devices, networks, and locations. Easily share voice, text, photos, video and more with a group or individual at the push of a button. All from one PTT application.
Features
- Secure Push to Talk service for purpose-built, smartphones and desktops
- Connect teams instantly with Android and iOS PTT communications
- Sharing of text, picture, video, audio and file attachments
- Location, presence and status sharing across users with mapping capabilities
- Easy to read communication thread with time stamps
- Web Dispatch control room application for PTT, mapping and messaging
- Communicate across any IP network including WIFI, 4G, 3G, Internet
- High availability supported through resilient deployment architecture
- AES256 bit encrypted individual and group communications
Benefits
- Secure and Instant Push to Talk team communication
- Simplicity of radio communications Instant Communication on your teams´ phones
- Users can communicate accross different networks and devices
- Connect to users regardless of geographical location
- Fast deployment to existing mobile devices (BYOD)
- Add/remove users as your business needs change
- Predictable subscription fees makes it easy to budget
- Geographical and local redundancy provides enterprise
- No servers to maintain means you can focus on business
Pricing
£97.00 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 4 6 5 8 6 2 4 9 4 8 1 7 0 7
Contact
Motorola Solutions UK Limited
Andy Glover
Telephone: 07736636880
Email: andy.glover@motorolasolutions.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Not Applicable
- System requirements
-
- IOS or Android for WAVE PTX app.
- Chrome or IE11 Windows Browser for WAVE Dispatch.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times will depend on issue priority. For tickets categorized as P1 and P2, there is a 24x7 support response. For others, it is 8 x 5 on standard business days, which is normally Monday through Friday 8AM to 5PM UK time, excluding public holidays.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
- As part of the subscription service, Motorola Solutions provides Tier 1 triage, Tier 2 technical support and Tier 3 Engineering Support.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- App stores contain usage explanations for App and in-App tutorial. WAVE PTX Dispatch contains introductory tutorial and online help.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data is not exportable
- End-of-contract process
- Users continue through contract renewal or are deactivated.
Using the service
- Web browser interface
- Yes
- Supported browsers
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- WAVE PTX app on mobile devices is for individual PTT communications operations. WAVE PTX Dispatch on desktops is for centralised group communications monitoring and control.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- WAVE PTX is based on carrier grade PTT solution. System applications are designed to operate in redundant mode. Solution is based on Microsoft Azure cloud to ensure further uptime and redundancy based on Azure implementation.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Broadband PTT application uses the Advanced Encryption Standard (AES)-256 to encrypt locally stored data, including authentication credentials, configuration and settings. Locally stored data can be decrypted by the Broadband PTT application only on the specific device on which it was encrypted. The PTT application will not log sensitive data (username/password, configuration values received from the server), or PTT application configuration values. Data at rest in the infrastructure is protected by access control including 2FA. - DB encryption: sensitive information (multimedia messaging, location) is stored encrypted. - Storage encryption: in Azure, MSI uses Azure Managed Disk Service with AES 256 encryption.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data is not exportable
- Data export formats
- Other
- Other data export formats
- Data is not exportable
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Data in transit is protected using secure protocols TLS (Version 1.2), DTLS, HTTPS and encryption of application payload (AES 256). All control plane and web traffic is TLS protected with FIPS compliant crypto.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Microsoft Azure provides a secure foundation across physical, infrastructure and operational security for the WAVE PTX system. Azure is responsible for the security of the cloud; Application is responsible for security in the cloud. Azure enables application to control the content. AES-256 and TLS are used to encrypt all voice traffic and signalling information travelling between the Broadband PTT application and the Gateway server at the Broadband PTT Data Centre.
Availability and resilience
- Guaranteed availability
- Response times are dependent upon Priority Level (P). P1 catastrophic failure or critical failures; P2- failure that limits normal use or major features; P3- failure that does not prevent use of the application; P4- does not cause any real operational impact.
- Approach to resilience
- The system design consists of fully redundant servers that are deployed with load balancing applied. At least two instances are hosted in different availability zones in a region in Azure cloud. Availability zones in the region are geographically separated in different data centres.
- Outage reporting
- The system is deployed in Azure cloud and servers are monitored within a Network Operations Centre for alarms that trigger the WAVE PTX Dev Ops team if a service affecting issue arises
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- The system uses strict role based access controls both physical and logical to protect information and resources from unauthorized access. MSI uses MSI IT Credentials with Two Factor Authentication (2FA) for MSI OAM access to the hosting infrastructure. OAM Access is over a VPN connection from MSI provided devices. Based on MSI’s Access Control policy (internal ticketing system) access is granted after manager and platform owner approval
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Two factor authentication will be implemented in 2024.
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd´s Register
- ISO/IEC 27001 accreditation date
- 30/07/2021
- What the ISO/IEC 27001 doesn’t cover
- No exclusions
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- ISO/IEC 27001. MSI has a well established Cybersecurity organization that provides Governance, Strategy, Guidance and Services to development teams throughout Motorola Solutions pertaining to Cybersecurity Process, Risk Management, SDLC and Compliance Assessment.
- Information security policies and processes
- MSI security practices are based on NIST cybersecurity framework functions: Identify, Protect, Detect, Respond and Recover.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configure, Audit, Validate, Report Exceptions, investigate exceptions, resolve.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We identified vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls and monitor the effectiveness of controls.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Collect events, look for pattern anomalies, report and manage through incident management.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Categorise, Prioritise, Triage, Diagnose, resolve, resolution and recovery, close.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
Reduces the need for users to travel, reducing carbon emissionsWellbeing
All users can be included in the conversations or user groups as required
Pricing
- Price
- £97.00 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Motorola offers demos at no cost for a limited period of time. Please contact you account representative for all details regarding demo capabilities and the process for obtaining it.