TransXChange Studio
TransXChange Studio is designed for quick and easy viewing and validation of public transport timetable data in TransXChange format. Developed in response to the introduction of the Public Service Vehicles (Open Data) (England) Regulations 2020, it is designed to help improve data quality when publishing to BODS.
Features
- View TransXChange timetable data
- View TransXChange geographic data
- Validate TransXChange data
- View calendar date-specific timetables
- Generate trips-per-day reports
- Download timetables in Excel format
- Edit TransXChange timetables [OPTION]
- Publish TransXChange timetables as PDF [OPTION]
Benefits
- Improves data quality
- Supports bureau services and work for third parties
- Ensures data consistency
Pricing
£6,000 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 4 9 4 1 2 3 8 3 5 2 4 5 6 1
Contact
Elydium Limited
Rob West
Telephone: 07932 436657
Email: rob.west@elydium.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Web applications require modern browsers with support for WebAssembly 1.0
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Initial response guaranteed within 4 hours - during standard UK office hours.
Weekend and public holiday support can be arranged at additional cost. - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our SaaS subscription includes standard user support provided by the customer success team.
Workflow/automation technical support is provided by the engineering team (e.g. for integrating third-party products and services) and is available at extra cost, priced per project. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- TransXChange Studio is designed to require minimal or no training for users with prior experience of UK bus timetable data. Where support for new users is required, we offer online training sessions at no additional cost.
- Service documentation
- No
- End-of-contract data extraction
- The service does not persist user data.
- End-of-contract process
-
The standard service does not require any "off-boarding" process as no user data is stored within the system.
Where custom workflows, data pipelines, etc have been created we will offer support to a customer if they wish to extract final reports before the contract expires.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
All Excel outputs can be customised (e.g. addition of authority/operator logo, modifications to layout, modifications to content) by Elydium at extra cost.
We can also create custom workflows, integrations and data pipelines (at additional cost).
Scaling
- Independence of resources
-
The system is based on a scalable containerised architecture which allows us to spin-up additional instances of individual service components (e.g. API, UI, etc) independently of each other.
System resources (e.g. CPU usage, memory usage, disk usage) are monitored by our own systems and our hosting provider's platform and alerts are sent if critical thresholds are reached.
All servers are virtualised and we are able to increase the resources available to each virtual server using a dashboard provided by our hosting provider.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
The service is primarily designed for viewing TransXChange data, although we do offer an optional edit feature that includes the ability to re-download data in TransXChange format.
Validation reports are downloaded in CSV format.
We offer an optional PDF publishing feature. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- TransXChange (XML) [OPTION]
- PDF [OPTION]
- Data import formats
- Other
- Other data import formats
- TransXChange (XML)
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
We guarantee 99.5% service uptime. System updates are carried out outside of UK business hours and typically only cause seconds of downtime as the production environment is switched between running instances.
We do not have an automatic refund mechanism. - Approach to resilience
-
Service deployments are scripted and built using standard Docker containers, which are configured to automatically restart in the event of a failure.
Additional (or replacement) instances are quick and easy to deploy. - Outage reporting
- Service outages are reported to our customers by email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- All of our web applications and APIs are protected with OAuth 2.0 authentication. We host our own identity service which uses the OpenID Connect standard to manage local username/password accounts and federated identities.
- Access restrictions in management interfaces and support channels
- All user interfaces are protected by OAuth 2.0. Access tokens must be obtained from our identity service before access can be granted to any resources.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
- All of our web applications and APIs are protected with OAuth 2.0 authentication. We host our own identity service which uses the OpenID Connect standard to manage local username/password accounts and federated identities.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
The managing director is responsible for maintaining a register
of information assets, together with risk assessments and policies that relate to the protection of confidential information. - Information security policies and processes
-
Ultimate responsibility for information security rests with the Managing Director. This includes ensuring that all permanent staff, temporary staff and contractors are aware of - and take responsibility for - information security policies that apply to their work areas and all equipment that is used for business purposes.
Key policies include:
• Confidentiality of any personal information must be maintained within development, test and production environments at all times
• All databases must be protected against unauthorised access
• All regulatory and legislative requirements must be met
• Any breaches (or suspected breaches) of information security must be reported and investigated immediately.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All infrastructure (container hosts, container definitions and inter-container networking) is scripted and under GIT source control.
All changes are first perfomed in our internal development environment, then progress into the customer-visible staging environment, before being rolled out to the production environment. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We continually review trade press and online sources for any threats to Operating Systems (Linux), our container platform (Docker) and the individual elements in our solution stack (Microsoft .NET, MongoDB, etc).
Patches are applied immediately into development environments to ensure compatibility, then rolled out to staging and production environments when we are satisfied that they will not cause any adverse effects.
The attack surface is minimised by only opening essential TCP/UDP ports on public internet-facing hosts; all databases and containerised microservices are isolated from the public internet and communicate using their own internal network. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We perform regular vulnerability tests using standard tools - e.g. OWASP ZAP. In addition, audit logs within the service are checked for unusual or unexpected activity.
Any potential or actual compromise is declared as a critical incident.
Director involvement and support is available 24/7 for the duration of a critical incident. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Processes are in place for incidents such as DDoS, personal or confidential data exposure.
Users can report incidents or faults by telephone or email.
Reports are provided to impacted users via email within one week of an incident.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Increased use of public transport is key in the fight against climate change. By empowering users to improve, maintain and publish bus service data, Elydium's tools are fully aligned with the DfT's Bus Open Data ambitions to promote public transport to a wider user base.
Pricing
- Price
- £6,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We are able to offer a free time-limited trial of this service. All standard features are available for a period of up to eight weeks without restriction.
- Link to free trial
- https://transxchangestudio.uk/