Hubstream Inc
Hubstream ONE
The Hubstream platform combines investigative case management, analysis and visualization, and customizable workflows into one easy-to-use product.
Features
- Investigative case management
- Flexible data model that is easily customized
- Task and team management
- Data visualizations including link analysis, timelines, geospatial
- Workflow automation
- Interactive dashboards
- Data import from email, spreadsheet upload, API
- Role-based and attribute-based security
- AI capabilities for computer vision, natural language processing
- Entity extraction, linking, matching
Benefits
- Manage the deluge of data coming into investigative teams
- Improve investigator productivity with workflows and automation
- Bring automated data visualizations directly into the investigative process
- Extract information from documents, text, and media for linking
- Reduce the impact of content with investigator harm reduction features
- Customize the data hub to matching your evolving requirements
Pricing
£1,300 a user a year
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at john.hancock@hubstream.net.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
3 4 2 3 1 2 9 8 6 5 3 3 9 6 3
Contact
Hubstream Inc
John Hancock
Telephone: +1 425 608 0712
Email: john.hancock@hubstream.net
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Modern browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Priority 1 (Errors that cause a critical functionality of the software to not operate, affects all users, has a significant business impact)
2 hours followed by updates every 4 hours
Priority 2 (Error that causes service degradation, affects a significant percentage of Client’s users and has a moderate business impact): 8 hours followed by updates every 4 hours
Priority 3 (Error that is limited in scope, only affects a small percentage of Client’s users, and has a minimal business impact, or an error or other issue not constituting a Severity 1 Error or a Severity 2 Error): Next business day - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We use ZenDesk for support, see https://www.zendesk.com/company/agreements-and-terms/accessibility/
- Onsite support
- Yes, at extra cost
- Support levels
- Premium and Enterprise subscriptions include a Customer Success Manager to assist with ongoing configuration and assistance.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A Customer Success Manager will onboard new customers with an online session to help select and configure a template for the new investigative hub. For users, the application includes an "Explore Your Hub" experience to help them get started with videos, documentation and shortcuts to common features.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data can be downloaded using the application user interface, as a series of zip files that includes structured data as XML files, and unstructured data as attached documents and media.
- End-of-contract process
- If a customer elects not to continue with a subscription, at no additional cost they are able to download their data and notify Hubstream when complete so that the service can be decommissioned.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- User experience on devices is optimized for mobile
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Web-based application
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Testing via accessiBe
- API
- Yes
- What users can and can't do using the API
- Users (with appropriate permission) can query data, update data, import and export data. They cannot configure the service through an API.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Hubstream ONE can be easily customized to match investigative teams' requirements, starting from a growing catalog of templates based on best practices from a range of domains. All aspects of the system can be customized using the application UI, including data model and workflows.
Scaling
- Independence of resources
- Each customer is deployed in separate resource groups
Analytics
- Service usage metrics
- Yes
- Metrics types
- All user activity is logged in the audit trail and available for reports/dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their data by sorting/filtering the relevant entities and then choosing "Download as CSV". They can also download specific entities (such as a complete investigation) as a zip file including structured data as XML/JSON and unstructured attachments.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLSX
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The service includes a service level agreement with a Monthly Uptime Percentage target. In the event that the uptime percentage levels are not met, the customer can receive a credit against their next annual subscription that is related to the monthly uptime (25% credit for <95%, 50% credit for <85%, 100% credit for <80%)
- Approach to resilience
- Hubstream is built on native Microsoft Azure services, and leverages Azure features to maintain high levels of availability.
- Outage reporting
- Customer Success Manager will alert customer via a pre-agreed secure channel
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- Access is restricted to authorized users via role membership
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- SOC2
- Information security policies and processes
- Hubstream is independantly SOC2 certified
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Changes to the organization, business processes, information processing facilities, and systems that affect information security in the production environments shall be controlled. All significant changes to in-scope systems are documented, including:
• Processes for planning and testing of changes, including remediation measures
• Documented approval and authorization before proceeding with changes that may have a significant impact on information security, operations, or the production platform
• Advance communication of changes, including schedules and a description anticipated effects, provided to all internal and external stakeholders
• Documentation of all emergency changes and subsequent review
• A process for remediating unsuccessful changes - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
External vulnerability scans shall be run on the production environment at least quarterly. Interior vulnerability scans shall be run against test environments which mirror production configurations.
Penetration tests of the applications and production network shall be performed at least annually. Additional scanning and testing shall be performed following major changes to production systems.
The IT and Engineering departments shall evaluate the severity of vulnerabilities, and if it is determined to be a critical or high-risk vulnerability, a service ticket will be created. Tickets are assigned to the system, application, or platform owners for further investigation and/or remediation. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Production infrastructure is configured to produce detailed logs appropriate to the function served by the system or device. Event logs recording user activities, exceptions, faults and information security events are produced, kept and reviewed through manual or automated processes as needed. Appropriate alerts are configured for events that represent a significant threat to the confidentiality, availability or integrity of production systems or Confidential data. Incident response times are based on severity.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Hubstream has an Incident Response Plan for managing information security incidents and events, and offers guidance for employees or incident responders who believe they have discovered, or are responding to, a security incident. Users report incidents via support portal, email or via pre-arranged secure channel with Customer Success Manager. Incident reports are delivered by CSM via secure channel.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Leverages Microsoft Azure which reduces environmental footprint due to efficient data centers.
Pricing
- Price
- £1,300 a user a year
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at john.hancock@hubstream.net.
Tell them what format you need. It will help if you say what assistive technology you use.