Skip to main content

Help us improve the Digital Marketplace - send your feedback

Elydium Limited

TransXChange Studio

TransXChange Studio is designed for quick and easy viewing and validation of public transport timetable data in TransXChange format. Developed in response to the introduction of the Public Service Vehicles (Open Data) (England) Regulations 2020, it is designed to help improve data quality when publishing to BODS.

Features

  • View TransXChange timetable data
  • View TransXChange geographic data
  • Validate TransXChange data
  • View calendar date-specific timetables
  • Generate trips-per-day reports
  • Download timetables in Excel format
  • Edit TransXChange timetables [OPTION]
  • Publish TransXChange timetables as PDF [OPTION]

Benefits

  • Improves data quality
  • Supports bureau services and work for third parties
  • Ensures data consistency

Pricing

£6,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob.west@elydium.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

3 4 9 4 1 2 3 8 3 5 2 4 5 6 1

Contact

Elydium Limited Rob West
Telephone: 07932 436657
Email: rob.west@elydium.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No
System requirements
Web applications require modern browsers with support for WebAssembly 1.0

User support

Email or online ticketing support
Email or online ticketing
Support response times
Initial response guaranteed within 4 hours - during standard UK office hours.

Weekend and public holiday support can be arranged at additional cost.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our SaaS subscription includes standard user support provided by the customer success team.

Workflow/automation technical support is provided by the engineering team (e.g. for integrating third-party products and services) and is available at extra cost, priced per project.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
TransXChange Studio is designed to require minimal or no training for users with prior experience of UK bus timetable data. Where support for new users is required, we offer online training sessions at no additional cost.
Service documentation
No
End-of-contract data extraction
The service does not persist user data.
End-of-contract process
The standard service does not require any "off-boarding" process as no user data is stored within the system.

Where custom workflows, data pipelines, etc have been created we will offer support to a customer if they wish to extract final reports before the contract expires.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
All Excel outputs can be customised (e.g. addition of authority/operator logo, modifications to layout, modifications to content) by Elydium at extra cost.

We can also create custom workflows, integrations and data pipelines (at additional cost).

Scaling

Independence of resources
The system is based on a scalable containerised architecture which allows us to spin-up additional instances of individual service components (e.g. API, UI, etc) independently of each other.

System resources (e.g. CPU usage, memory usage, disk usage) are monitored by our own systems and our hosting provider's platform and alerts are sent if critical thresholds are reached.

All servers are virtualised and we are able to increase the resources available to each virtual server using a dashboard provided by our hosting provider.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The service is primarily designed for viewing TransXChange data, although we do offer an optional edit feature that includes the ability to re-download data in TransXChange format.

Validation reports are downloaded in CSV format.

We offer an optional PDF publishing feature.
Data export formats
  • CSV
  • Other
Other data export formats
  • TransXChange (XML) [OPTION]
  • PDF [OPTION]
Data import formats
Other
Other data import formats
TransXChange (XML)

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee 99.5% service uptime. System updates are carried out outside of UK business hours and typically only cause seconds of downtime as the production environment is switched between running instances.

We do not have an automatic refund mechanism.
Approach to resilience
Service deployments are scripted and built using standard Docker containers, which are configured to automatically restart in the event of a failure.

Additional (or replacement) instances are quick and easy to deploy.
Outage reporting
Service outages are reported to our customers by email.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
All of our web applications and APIs are protected with OAuth 2.0 authentication. We host our own identity service which uses the OpenID Connect standard to manage local username/password accounts and federated identities.
Access restrictions in management interfaces and support channels
All user interfaces are protected by OAuth 2.0. Access tokens must be obtained from our identity service before access can be granted to any resources.
Access restriction testing frequency
At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
All of our web applications and APIs are protected with OAuth 2.0 authentication. We host our own identity service which uses the OpenID Connect standard to manage local username/password accounts and federated identities.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
The managing director is responsible for maintaining a register
of information assets, together with risk assessments and policies that relate to the protection of confidential information.
Information security policies and processes
Ultimate responsibility for information security rests with the Managing Director. This includes ensuring that all permanent staff, temporary staff and contractors are aware of - and take responsibility for - information security policies that apply to their work areas and all equipment that is used for business purposes.

Key policies include:
• Confidentiality of any personal information must be maintained within development, test and production environments at all times
• All databases must be protected against unauthorised access
• All regulatory and legislative requirements must be met
• Any breaches (or suspected breaches) of information security must be reported and investigated immediately.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All infrastructure (container hosts, container definitions and inter-container networking) is scripted and under GIT source control.

All changes are first perfomed in our internal development environment, then progress into the customer-visible staging environment, before being rolled out to the production environment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We continually review trade press and online sources for any threats to Operating Systems (Linux), our container platform (Docker) and the individual elements in our solution stack (Microsoft .NET, MongoDB, etc).

Patches are applied immediately into development environments to ensure compatibility, then rolled out to staging and production environments when we are satisfied that they will not cause any adverse effects.

The attack surface is minimised by only opening essential TCP/UDP ports on public internet-facing hosts; all databases and containerised microservices are isolated from the public internet and communicate using their own internal network.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We perform regular vulnerability tests using standard tools - e.g. OWASP ZAP. In addition, audit logs within the service are checked for unusual or unexpected activity.

Any potential or actual compromise is declared as a critical incident.

Director involvement and support is available 24/7 for the duration of a critical incident.
Incident management type
Supplier-defined controls
Incident management approach
Processes are in place for incidents such as DDoS, personal or confidential data exposure.

Users can report incidents or faults by telephone or email.

Reports are provided to impacted users via email within one week of an incident.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Increased use of public transport is key in the fight against climate change. By empowering users to improve, maintain and publish bus service data, Elydium's tools are fully aligned with the DfT's Bus Open Data ambitions to promote public transport to a wider user base.

Pricing

Price
£6,000 a unit a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We are able to offer a free time-limited trial of this service. All standard features are available for a period of up to eight weeks without restriction.
Link to free trial
https://transxchangestudio.uk/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob.west@elydium.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.