Case Management for Digital Forensics
Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.
Features
- Easily create cases to start tracking evidence & acquisition data
- Evidence tracking. Keep control of thousands of digital evidence items.
- Keep track of the digital evidence data you have acquired
- Workflows to automate governance and enrichment processes
- Chain-of-custody and system-of-record
- Single or multiple reports to assist in your case
- Export data to third party applications
- Micro-services and containerised system architecture
- Rich search tools including custom methodologies
- Enterprise API for OFFICIAL & SECRET
Benefits
- Streamlined analysis saving manual configuration & processing
- Big data scalability - automating workflow
- Add new data sources via API for quicker results
- Identity Access Management is built in for increased security posture
- Get the metrics you need to effectively manage lab resources.
- Connect via PNN via VPN for increased security posture
- Single enterprise subscription reducing cost
- On premise install available on request
- Manage all your lab and scene evidence in one portal.
- Multi cloud SaaS and interoperable between labs
Pricing
£3,000 to £250,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 0 9 3 6 7 0 4 0 1 6 6 3 2 2
Contact
Blue Lights Digital
Claire Stanley
Telephone: 07847258384
Email: claire.stanley@bluelightsdigital.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
APIs are available or can be built for link analysis & analytics ingest, data cleansing import & export.
Artifical intelligence services, Financial Data Observations, ANPR, Deepfake analysis,
Audio analysis, Facial Recognition, CSAM and multiple services and databases can be plugged in as the system is designed for interoperability. - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The system requires configuration of containers with allocation of identity access controls via policy, The user interface (UI) is customisable.
- System requirements
-
- Authorised access to data sets
- Authorised access to cloud tenancies
- Authorised access to Digital handset downloads
- Authorised access to access points & networks
- Access to HTTPS services if on cloud
- Presentation to PNN/ESN/VPN end termination unit
- Presentation to secure gateways
- Localised SyOps required
- Full DPIA assessment
- MOPI Compliance
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Toolset is Fresh Service
SLA's available are 1 hr - 8hr - next business day response.
We have dedicated e-mail and chat channels available 24/7
- Service options include 24/7 human support available Service Desk or remote.
- Mon - Fri 9-5 Service Desk or remote support
- Automated bot support available on chat channels only. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Online presence of Intercom chat that is manned 24/7 though various web services. In app and in web service enabled on request. The Service Desks are manned and automated by bot if required for FAQ's.
- Web chat accessibility testing
- None.
- Onsite support
- Yes, at extra cost
- Support levels
-
Support is on a reasonable endeavour basis and is included in our pricing.
Dedicated 'operational' support can be provided under our standard day rates for an investigating officer.
Technical developers can be provided to assist with data modelling, Data integration, Data Parsing, Data migration, API build, software integration, Network integration and automation under our standard day rates.
Data architects can be provided to assist with ingest mapping.
InfoSec & infoCom consultants can be provided for information assurance documents and risk mitigation. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onsite training, online training and user documentation are available. The system however uses drag and drop principles with three touches of orientation to task. Drag, Drop and process.
Identity access management is set up by subscription with access being granted by the Blue Lights Digital product owner. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data is not held at rest. Any transaction is purged and deleted per use. If the client requires a copy another transaction must take place.
- End-of-contract process
-
A contract can be done per transaction or limited to a number of transactions.
1 transaction = £25
100 transactions = £1000
1000 Transactions = £10,000
10,000 Transactions = £50,000
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
API is offered to clients with a requirement to call or parse data to the BLD DEMS platform. The API is available under license and subject to authorisation through legislative structures. Security posture must also be demonstrated. The API gateway is managed by Blue Lights Digital and is subject to security posture assurances. The user cannot make changes to the API without a feature request to the company.
Alternatively API documentation will be provided to the customer for their own development and implementation. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- New data sets can be ingested to our DEMS engine. Data can be parsed for ingestion, analysis, indexation and validation (Hash set validation) . It can be extracted as a copy and analysed externally by multiple parties as required. A golden hash value data set will always remain within the BLD DEMS solution.
Scaling
- Independence of resources
- Load balancing, Clients can be allocated reserved instances for on demand scaling.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Transaction by user, client to domain.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Monolith Forensics LLC
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is exported by PDF only. Download in session or mailed to e-mail used on registration.
- Data export formats
- Other
- Other data export formats
- PDF only
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- XML
- Visual images such as 3GP, TIFF, JPEG, HEIC &.Mov
- Audio such as AAC, FLAK, MPEG and Wav
- HTML
- PDF. XLS. PPT, DOC
- XRY, BIN, DMG, EO1, AFF, AD1, MDF, DD
- ZIP
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Availability of less than 99.95% but equal to or greater than 99.0% is guaranteed by a 5% service credit for failure to meet SLA.
Availability less than 99.0% is guaranteed by a 10% service credit for failure to meet SLA. - Approach to resilience
- We utilise elastic load balancing, computing clusters, autoscaling and cloud flaring (DNS obfuscation) to add resilience to our cloud environments.
- Outage reporting
- Email alerts to users.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to all BDL systems are controlled by identity Access Management to known and vetted users only. Three factor authentication is required via a key, a password and a verified username.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Local Policies will be accepted and adhered to including, whitelisted IP, 2FA with known MDM & MAM tooling, VPN & DPN connection only.
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 18 September 2015
- What the ISO/IEC 27001 doesn’t cover
-
Detailed technical specifications or solutions from BLD
Specific software or hardware configurations from BLD
Compliance with other standards not directly related to information security within BLD Group
Non-information security-related processes or procedures within BLD or its wider group. Our Software development company within BLD group hold our 9001 and 27001 certifications. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials
- Software Developer subsidiary is ISO 27001 accredited
- Software Developer subsidiary is ISO 9001 accredited
- JOSCAR
- RICOH
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Through Cyber Essentials and NCSC cloud principles.
- Information security policies and processes
-
We use a shared responsibility model between customers and Blue Lights Digital. We operate, manage, and control the components at the operating system layer down to the physical security of the servers in which the services are provided (including updates and security patches), other associated application software, as well as the configuration of firewalls. ,
It is possible to enhance security and/or meet more stringent compliance requirements by leveraging technology such as host-based firewalls, host-based intrusion detection/ prevention, and encryption which can be requested by our clients at additional charges.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Any changes to our systems are first managed by impact and risk assessment. Any changes to architecture, software or network access is tested within a development environment before release to production. A production snapshot is available for roll back.
Security assessment is managed through in house pentesting an testing procedures. External pen testing is subject to additional charges. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
As part of our Cyber Essentials programme we practice identifying, classifying, remediating, and mitigating vulnerabilities.
We use vulnerability scanners to identify known vulnerabilities, such as open ports, insecure software configuration, and susceptibility to malware. For unknown vulnerabilities, such as a zero-day attacks we relay on updates to our vulnerability scanners such as OWASP ZAP. Vulnerability testing is also part of our test automation processes.
Correcting vulnerabilities involves the installation of a patch, a change in network security policy, reconfiguration of software, or educating users about social engineering.
We are active members of OWASP, CISP and Black Hat communities. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We license SiteLock TrueCode Static Application Security Testing (SAST) for source code analysis. Also known as "white-box" testing, TrueCode finds common vulnerabilities by analysing 100% of the source code in our applications without actually executing them, and adds critical layer of security by protecting our web applications.
Our SAST is automated to send alerts if a breach or malware is detected.
Azure and AWS protective monitoring available subject to client requirements. - Incident management type
- Supplier-defined controls
- Incident management approach
-
The activities within our incident management process include:
Incident detection and recording
Classification and initial support based upon known errors and new events
Investigation and analysis
Resolution and record
Incident ownership, monitoring, tracking and communication
We report on incidents with a full disclosure policy to ensure any impact can be contained and a resolution is satisfactory to the end user.
Incident reports are provided by e-mail to the end user.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
The delivery of solutions and software from BLD can significantly contribute to fighting climate change through various means. Implementing BLD DEMS can optimise energy usage in government buildings or law enforcement facilities which can lead to reduced carbon emissions. Additionally, integrating smart technologies to replace the transportation of physical media reduces fuel consumption and greenhouse gas emissions. Furthermore, software solutions that facilitate remote work and virtual meetings can help reduce the need for unnecessary travel for meetings, thus lowering carbon footprints.
The social value of these contributions can be measured by quantifying the reduction in carbon emissions resulting from the implementation of BLD DEMS. This can involve calculating the energy savings achieved by optimising processes and systems, as well as estimating the reduction in vehicle miles travelled due to the adoption of DEMS technologies.Covid-19 recovery
The delivery of solutions and software as a systems integrator plays a crucial role in supporting post-Covid-19 recovery efforts, particularly in addressing the multifaceted challenges individuals encounter upon returning to work. Beyond health concerns, there is a pressing need to mitigate the negative outcomes exacerbated by the pandemic, such as increased vulnerability to fraud. During the lockdown periods, many individuals were targeted by fraudulent schemes exploiting the uncertainties and disruptions caused by the pandemic.
The social value of these contributions can be measured by assessing the effectiveness of fraud detection and prevention measures implemented through software solutions. This involves quantifying the reduction in fraudulent activities targeting individuals returning to work, as well as evaluating the efficiency of response mechanisms in addressing reported cases. Additionally, feedback from affected individuals and stakeholders can provide insights into the perceived impact of these initiatives on restoring trust and confidence in economic activities post-pandemic.Tackling economic inequality
The delivery of DEMS from BLD can contribute to tackling economic inequality by enhancing access to essential services and opportunities for marginalised communities. For example, implementing digital platforms for government services can streamline processes and reduce barriers to access for individuals with limited mobility or internet connectivity. Additionally, providing training and support for digital literacy can empower underserved populations to participate more fully in the digital economy.
BLD provide access through level 4 Apprenticeships in Digital Forensics Examiners that include skills and competences in BLD DEMS systems.
The social value of these contributions can be measured by assessing the extent to which they contribute to reducing disparities in access to government services employment, educational opportunities for new workforce entrants, and economic resources among different police forces.Equal opportunity
The delivery of DEMS from BLD can promote equal opportunity by removing barriers to access and participation for individuals from diverse backgrounds. For example, implementing inclusive design principles in DEMS development can ensure that digital products and services are accessible to people with disabilities. Additionally, providing training and support for digital skills development can empower individuals from underserved communities to pursue career opportunities in technology fields.
BLD provide access through level 4 Apprenticeships in Digital Forensics Examiners that include skills and competences in BLD DEMS systems.
The social value of these contributions can be measured by assessing the degree to which they promote inclusion and diversity within the workforce and society at large. This can involve tracking metrics such as the representation of marginalised groups in technology-related fields, the level of accessibility and usability of digital products and services, and the impact on social attitudes and perceptions toward diversity and inclusion.Wellbeing
The delivery of DEMs from BLD contributes promotes wellbeing by enhancing access to resources and support systems that address various aspects of individual wellness. Implementing the automation of communication and collaboration platforms that prioritise work-life balance and flexibility can support emotional wellbeing by reducing stress and burnout associated with overwork and excessive job demands being within a lab and having to manage imagery and data around criminal acts. The BLD DEMs system allows for workflow design around work life balances of any examiner.
The social value of these contributions can be measured by assessing their impact on key indicators of individual wellbeing, such as physical health, mental health, work-life balance, and overall satisfaction with life. This can involve tracking metrics such as employee engagement and productivity levels, absenteeism and turnover rates, and self-reported measures of happiness and fulfilment.
Pricing
- Price
- £3,000 to £250,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day trial of SaaS solution for government and LEA only.