Transportation data analytics
Lanternn by ValerannTM, our remotely deployed SaaS ITS platform, uses a Fusion Engine to aggregate, cleanse, and fuse data inputs from virtually any source on the road. The fusion engine provides predictive insights and prioritises incidents for Operators so that resource can be deployed as necessary.
Features
- Incident detection/location/verification of on-road events for reduced response time
- Monitoring/control of real-time traffic flow and congestion, minimising disruption
- Risk profiling/prevention including through highways maintenance/roadworks
- Weather impact/winter maintenance operations
- Congestion/emissions analysis including alerts on air quality
- Identification of asset maintenance needs, execution and resources
- Connect to patrol vehicles/emergency services/recommended response workflows
- Communicate with drivers and ITS infrastructure, and other agencies
- To analyse/track current and historical performance/KPIs
Benefits
- Operators can reduce OPEX/CAPEX expenditure
- Remote deployment saves time/money over traditional deployments
- AI streamlines processes to free up resource
- Use insights to deploy resource to highest priority incidents
- System has track record of reducing fatal road accidents
- Helps Operators to derive more value from their data
- System scale to as many roads/data sources as desired
- Provides real-time access to road status, facilitating quicker decision making
Pricing
£50,000 to £200,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 2 4 0 9 9 9 0 6 1 9 6 0 4 9
Contact
Valerann UK Ltd
John Fagan
Telephone: <removed>
Email: john.fagan@valerann.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Any operator's IT, ITS, or asset management system
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No - Our product is hardware agnostic (we will integrate with any pre-installed or new ITS equipment e.g. any CCTV camera, radar loop or sensor). However, integration/development effort may be required where the equipment is unfamiliar to us.
- System requirements
-
- Product is cloud-based, so requires a modern web browser (Chrome).
- Appropriate data integration mechanisms required
- Setup of a secure redundant VPN (if necessary)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 9 to 5 (UK time), 7 days a week
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
We meet the following SLAs, categorised into four levels of severity, all of which are included in our standard cost. Additional support can be discussed and negotiated to an agreed upon price between the client and Valerann. Our Service Desk is available through our Jira Incident Portal which is reviewed daily. We respond in under 24 hrs to urgent queries and perform regular, proactive check-ins. We can provide monthly incident reports via dashboard, as well as in-depth analytics, trend analysis, and SLA performance forecasting.
SLA: Severity 1 & 2 Incidents (Cat 1 & 2). LbV provides automatic alerts via Grafana, OpsGenie; automatic relay via SMS, Email, Slack, Teams, or Pingdom. Immediate action protocols; 24 hrs resolution for Level 1, 48hrs for level 2
SLA: Severity 3 Incidents (Cat 3). LbV provides automatic alerts as above, plus manual review at daily system status update. 3 working days’ resolution target; must be resolved within 5 working days; regular updates provided to client.
SLA: Severity 4 Incidents (Cat 4+). LbV provides as above. 2 weeks’ resolution target; must be resolved within 1 month; regular updates provided to client. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We provide system users and operators with training as LbV is developed and deployed. This training process will include virtual or onsite sessions depending on customer preference. Throughout this process, Valerann will elicit feedback from users to further tune and configure system features to ensure accurate detection and operation, improve the user experience, and meet any additional needs not previously provided. Users will also be provided with a User Manual; however, Valerann’s team can also be contacted about any issues, concerns or needs. We will make ourselves available through project deployment, especially during the initial use stages, to ensure comfortability and access to the system.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Migration plans will be agreed upon between Valerann and the client. All data will be migrated either to the client’s full custody on the existing cloud or transferred to an alternative cloud provider. At all times, the client will retain full governance and ownership of its proprietary data. This data will never be used by Valerann for any purposes other than fulfilment of its contract. The data will be stored in accordance with both organisations’ Data Security policies, precluding access by unapproved agents.
- End-of-contract process
- At contract end, Valerann will devise a handover plan and work closely with the customer’s chosen provider to ensure that all documentation, data, and “know how” are carried over. Valerann will project manage handover to ensure a seamless transition for the customer and its users. If Valerann is required to delete or store data, it will carefully comply with the law and customer’s requirements. Valerann will provide “after care”, i.e. making its Customer Success Manager available for 3 months post-contract end to answer any questions and assist the customer and incumbent with getting up and running.
Using the service
- Web browser interface
- Yes
- Supported browsers
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- We have a mobile version that supports a reduced feature set for patrol vehicle drivers to log incidents they identify directly or to view incidents they have been allocated to in order to respond.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Through API integration, LbV can serve as the front end for users by ingesting data sources and fusing the data for display and insights through the provided dashboard. It is also possible for LbV to serve as the back end data fusion engine if a separate front end dashboard is preferred. Users are able to access LbV’s data insights through API to integrate with any external systems for further data ingestion or data sharing. Our API includes a detailed SWAGGER interface that provides the application developers an easy and intuitive way to discover the system's capabilities, try them out, and explore the various options to access the data.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Customers can customise the data sources used, the way data is presented on the dashboard, how many users have access, what permissions each user has, types of reporting provided in Grafana, level of automation, use of Machine Vision, level of camera integration, and which of the Lanternn modules to implement (Manage, Monitor, Insights).
Scaling
- Independence of resources
- We load test all services for current users, i.e. we simulate and measure peak concurrent usage performance. All clients are segmented off into their own cloud infrastructure.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
User-specific monitoring/reporting
Latency monitoring
Event-specific insights
Event trends
System service metrics (e.g. uptime %)
We utilise UX monitoring tools, such as Hotjar, to monitor user sessions and interactions. All data captured is anonymised i.e. we cannot link specific sessions to specific users. We maintain an audit trail of key actions carried out within the system (e.g. changing an event status) including the user that carried this out in order to support management reporting. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- We work with users to configure data export mechanisms. They are able to view data through the dashboard as well as through customised reporting which allows for CSV export of specified data outputs.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- System availability of the hosting, network infrastructure, communications network and Hosting Centre is designed to be seven days per week and twenty-four hours per day, subject to the prenotification of any scheduled downtime required for system maintenance. Outside of the scheduled downtimes outlined above, the Performance Target is for the system to be available 99.8% of the time measured over a period of one month.
- Approach to resilience
- We are hosted by AWS who are certified for resilience and have verified that we have resilient infrastructure. The main plank of our resilience strategy is replicating our databases across three regions using managed services such as Kafka, Postgres, etc.
- Outage reporting
- In the event of a service outage, our alert systems immediately notify us. Our team responds as quickly as possible to resolve the issue and avoid disruption. If the outage is extended for any reason, users will be notified as we continue attempts to resolve the issue.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We utilise a role and permission model, meaning some users have restricted access (read only) or may only be able to carry out certain actions within the system based on their user role.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
- Username + Password, Whitelist IP addresses. Optional: identity federation from known providers (Google, Facebook), Optional: VPN, Optional: 2 factor
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Institute of Quality & Control
- ISO/IEC 27001 accreditation date
- 28/12/2022
- What the ISO/IEC 27001 doesn’t cover
- Officially known as the ISO/IEC 27001 Information Security Management standard, it details the requirements for businesses to securely manage information assets and data to an internationally recognised standard. It provides a robust approach for managing assets such as customer and employee details, intellectual property, financial information and third-party data. ISO 27001 requires that organisations assess information security risks, put in place robust security controls and processes, and embed information security management across the organisation. The standard is suitable for all organisations that collect and process data – including SME, corporate and non-profit businesses.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 27017
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 27017
- Information security policies and processes
- Valerann takes the security and privacy of data extremely seriously. We intend to comply with our legal obligations in respect of data privacy and security under the General Data Protection Regulations (GDPR). We follow our Data Management and Information Security Policies. Information Security is overseen by our Chief Information Security Officer, Ran Katzir, with support from our Chief Operational Officer, Danial Yakovich. Every Valerann device has MDM installed to ensure remote security management. Annual training on information security is provided to all staff and enforced via Valerann’s Disciplinary Procedure.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We are using numerous microservices and databases. Every change involves automatic tool scanning for quality and security. Changes are logged and tracked and reported automatically. Every change is peer reviewed and QA tested approved.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Automatic scanning upon every software change using industry recognised tools. Migration and patching as part of the standard on going delivery process (sprints prioritisation and backlog management).
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We identify compromises through investigating of dashboard and logs when an anomalous behaviour / alert is detected.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Employees report to IT+CTO. All employees are notified immediately on both Slack/Email. Incident / Retro reports are provided internally for major events.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
- Any
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We use a SaaS model so a traditional construction-led physical infrastructure is not required. The carbon footprint for deploying Lanternn is minimal. The platform also helps roads to operate more efficiently, resulting in improved traffic flow which reduces emissions.
Pricing
- Price
- £50,000 to £200,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We offer pilots negotiated and tailored to meet client requirements