Skip to main content

Help us improve the Digital Marketplace - send your feedback

MRI Software Limited

MRI On Location Footfall Analytics

MRI OnLocation uses AI and machine learning to track physical behaviors inside and outside of locations and provide actionable insights on footfall to help businesses maximise the value of their space. It enables faster decision-making for retailers, hospitality operators, shopping centers, high streets, and commercial office space.

Features

  • External footfall monitoring of High Streets, Town and City Centres
  • Vehicle counting and classification in external locations
  • Benchmarking footfall data sets both regionally and nationally
  • AI video based machine learning analytics
  • Live data and verfied procesed data sets
  • Footfall/occupancy monitoring of indoor environments - libraries, offices, cafes
  • Demographics functionality providing age and gender
  • Dwell time and queue time analysis
  • Trusted by major global brands, Government and academia
  • Range of reporting options including PDF reports and API feed

Benefits

  • Understand how your location is performing through footfall traffic analysis
  • Put footfall into context by comparing regional and national benchmarks
  • Demonstrate ROI on events, funding and investments made
  • No requirement for data connection, hardware stands alone with 4G
  • Understand the impact of change through indepth data analysis
  • Clear and concise automated PDF reporting and online dashboard
  • Use with other data sets like energy to reduce costs
  • Evidence based decsion making and support BID funding applications
  • Fully validated data by AI and human validation team
  • Expert team to devise a system to meet client needs

Pricing

£3,600 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@mrisoftware.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 1 5 9 2 5 7 3 0 2 4 8 6 1 0

Contact

MRI Software Limited Claire Brown
Telephone: 020 3861 7100
Email: tenders@mrisoftware.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
The elements we require and are not included (unless otherwise stated):
• Dedicated 24/7 power supply to each device
• Uninhibited access to each location i.e., roof, retailer or IDF room
• Installation permissions required from the building or asset owner/tenant. Client to arrange permissions for install and hosting at each location where required. MRI Software can support with the permissions process (Fee applies)
• Replacement of hardware due to third party take down, damage or vandalism
• Additional permissions such as highway permits, legal fees or costs associated with installation or future maintenance
System requirements
  • Applicable hardware devices - cameras
  • Dedicated 24/7 power supply to each device
  • Replacement of hardware is client managed
  • Additional permissions such as highway permits

User support

Email or online ticketing support
Email or online ticketing
Support response times
MRI’s Global Client Support group will make every reasonable effort to ensure that submitted cases are assigned the proper level of Severity. Submitted cases will be responded to in the order in which they are received, with consideration given for higher Severity levels. Response
Time is the time it takes before a Global Client Support agent makes initial contact with the individual who submitted case.
Standard Service:
Normal Priority - 6 Hours,
Serious Priority - 3 hours,
Critical Priority - Live Call Only
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We include support within our annual fee. Support includes a named Account Manager and a Client Support Helpdesk. The Client Support Helpdesk also serves as the contact for all cloud support requests for trained users
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The solution is fully hosted and managed by MRI. We provide access to the MRI OnLocation Analyser, along with standard PDF reports delivered to your inbox via email.

The elements we require and are not included (unless otherwise stated):
• Dedicated 24/7 power supply to each device
• Uninhibited access to each location i.e., roof, retailer or IDF room
• Installation permissions required from the building or asset owner/tenant. Client to arrange permissions for install and hosting at each location where required. MRI Software can support with the permissions process (Fee applies)
• Replacement of hardware due to third party take down, damage or vandalism
• Additional permissions such as highway permits, legal fees or costs associated with installation or future maintenance
Service documentation
No
End-of-contract data extraction
It is unlikely that there will be data to return at the end of the contract due to the nature of the solution. However, if there is, at the end of the service, we can extract any required data and issue it to the client using an agreed-upon secure method.
End-of-contract process
The solution will be decomissioned.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Our solutions are designed to minimise the load on the system for any process or interaction and incorporate load balancing to evenly distribute traffic. Our platform is monitored 24x7x365 enabling us to manage capacity seamlessly in the background and our proactive monitoring ensures that we can respond to peaks in demand.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Minimal end user data is stored in the system and all may be removed using copy and paste from their user device from within the portal with minimal effort.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We use commercially reasonable efforts to ensure availability twenty -four (24) hours a day, seven (7) days a week, except for: (a) planned downtime (of which we provide adequate notice and will schedule to the extent practicable during the weekend hours), or (b) any unavailability caused by circumstances beyond our reasonable control, including without limitation, Force Majeure events or internet service provider failures or delays. We host our solution in a AWS data centre that is designed to deliver high availability.
Approach to resilience
Available on request
Outage reporting
All users are advised of upcoming service outages and new feature releases vis their designated support contact or the online portal.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access to our systems and data is controlled through a formal process beginning with a formal notification from management. Each user is provided with a unique user ID for systems so that users can be linked to and made responsible for their actions. Access to is given through the provision of a unique account and complex password. The job function of the user decides the level of access the employee has to data. Vendor default accounts and passwords for our the systems are changed at the time of provisioning and unnecessary services and user/system accounts are disabled.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
All staff are issued with our security policy when they join and confirm that they understand and will adhere to this. Our security policy is supported by processes and procedures such as our data breach reporting, new starters and leavers procedures. Our software development process incorporate privacy by design with security at the heart of everything that we do. All staff are trained on our security processes when they join and have regular refresher training. Our policies and processes are regularly reviewed by our operations managers and the outputs of these reviews are, in turn, reviewed with senior management. The focus of these reviews are the performance and ongoing applicability of our security management system.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our planning processes ensure that all configuration changes are properly scoped and planned before implementation. Our design and development processes incorporate Privacy by Design and all changes are reviewed and approved prior to implementation. Our implementations are tracked and managed through our core line of business systems, including development tickets, code changes and deployments enabling us to control and manage work day to day and to support root cause analysis should issues arise.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our systems are monitored and managed 24x7x365 enabling us to quickly respond to threats. Part of this management includes a review of potential threats, as advised by trusted security partners and resources. The built in patch management function of our monitoring platform deploys patches and updates in a controlled manner than standard tools such as Windows Update or WSUS. Typically, we review and release all critical and security updates on a monthly basis as they are released but in some instances release an update or patch outside of this cycle if there is a need to mitigate an immediate risk.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Potential compromises are identified through the monitoring of alerts automatically triggered with our NOC via systems monitoring tools or from tickets raised by individuals. All such threats are handled as potentially high impact so receive a prompt response. Our first response is to contain the threat, followed by more detailed root cause analyse and implementation of a permanent fix.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our incident management processes are designed to align with ITIL recommended best practices. Due to the design of our product, no particular events are common but we do have pre-defined processes for incidents such as a site outage or compatibility issues with specific browsers. Users may report incidents via email, telephone or an online form may be delivered, if requested, within the portal. Incident reports are available on request for any incident and are provided by email.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

MRI is committed to managing environmental risks that are material to our business and to reducing our carbon footprint by enhancing the energy efficiency of our operations and reducing the amount of waste that our company produces. We do this by utilising some of our own solutions with sensors in our own offices to assess our space utilization, energy usage and setting a reduction plan. As well as improving our own position, we also look at ways to help our clients work towards using services that have less impact on our planet’s scarce resources. A good example is HomeSwapper, our national mutual exchange solution. HomeSwapper enables tenants to swap homes either locally or anywhere across the United Kingdom with another social housing tenant, often to reduce their commute to work or schools which has a direct impact on carbon emisisons in the region.

Covid-19 recovery

We have fully embraced hybrid working and have recently formalised our flexible working model and different types of flexibility offered to all employees. We believe flexible working benefits our employees and the business. Our solutions available on this framework are all available remotely allowing our clients employees, users and contractors as applicable to work from any location in accordance with your approved working practices to allow flexibility

Tackling economic inequality

Our employees are all contracted and salaried fairly, in line with the Living Wage standards. All of our employees are paid at least the minimum rates as stated under the current Living Wage. We do not employ anyone on zero hours contracts and have a strong commitment to regularly review salaries in line with our appraisal process. We have a number of apprentices in the business who we are supporting to complete degree level qualifications, who all receive above the apprentice minimum wage. We also offer a comprehensive benefits package for all our staff, which includes health and wellbeing support and access to private health care.

Equal opportunity

We work hard to ensure our employees have a voice. Our business has various committees in place, such as a Diversity, Equity and Inclusion Committee and Employee Resource Groups, such as Women & Allies and LGBTQIA+, which help us understand how employees feel about working at MRI and help us drive forward inclusive events. We have also very recently launched our first ERG – employee resource group for Women and Allies. As a business with over 250 employees in the UK we are required to produce a Gender Pay Gap report. We very much welcome this initiative and our reports are available publically on our website. This report shows the impact we have on reducing our Gender Pay Gap and also highlights the many initiatives we have underway to further reduce our gap. This includes the development of our Flexible Working and Inclusive Policies initiatives, educating our People, People Managers and Business Leaders and working with external partners to attract a diverse staffbase.

Wellbeing

Work hard, play hard. From the day we opened our doors, we set out to build flexible, game-changing solutions that would make people's lives better. We do this by providing our clients with solutions that enable them to provide better places to live, work, and do business. The only way to carry out that mission is to hire the best employees and keep them. We are dedicated to creating a working environment which supports and develops our staff. Some of the benefits that we offer are: Gym reimbursements, Medical assistance, including mental health tools, Flexible working opportunities, including hybrid working Employee engagement is key to MRI's success and we hold quarterly spirit weeks to both connect and enthuse our teams globally. These weeks are themed and where staff are encouraged to learn about different topics or take part in activities that they might not typically have time for. These include fitness sessions, cooking sessions, engagement with families for those working from home or targeting one big event where we can globally feel like we are one team with the same goal. We also carry out bi-annual employee engagement surveys to ensure employees can express their views.

Pricing

Price
£3,600 an instance a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@mrisoftware.com. Tell them what format you need. It will help if you say what assistive technology you use.