BriteLocate Footfall Counting
BriteLocate Counters are smart footfall monitoring devices providing a unified people flow counting and tracking system for any built environment operator.
Features
- Footfall Monitoring through unified people flow counting and tracking system.
Benefits
- Accurate people count enables accurate room occupancy estimates
- GDPR compliant with no personally identifiable information stored
- Real time Data insights instantly
- Application reports export use footfall data in your own systems
Pricing
£1,000 a licence
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at fredi.nonyelu@briteyellow.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
5 0 0 0 8 9 7 2 0 3 7 5 2 4 1
Contact
Briteyellow Limited
Fredi Nonyelu
Telephone: +448455570520
Email: fredi.nonyelu@briteyellow.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Support for Intel cameras and Cisco or Ruckus WiFi devices.
- System requirements
-
- Chrome browser
- Safari browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We respond within 4 hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Webchat is accessible from our website.
- Web chat accessibility testing
- We have not done any web chat testing with assistive technology users.
- Onsite support
- Yes, at extra cost
- Support levels
-
All incidents will be assigned one of three priority levels as
• Priority High – Service has suffered a complete failure or significant partial loss of service.
• Priority Medium – Service is suffering problems which affect normal usage but a workaround exists or problem affects one user only.
• Priority Low – Work request (a simple non urgent request for work to be carried out), Non urgent faults (faults that are non urgent), or requests for information (Information request)
There is no difference is the cost.
We provide a technical account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We help users start using our service with online training.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- When the contract ends users can extract their data by downloading it to Excel or .csv.
- End-of-contract process
- At the end of the contract we will keep the data accessible for 30 days before it is securely deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The difference is that on mobile devices the service will adapt automatically to the screen size.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface is our client portal from where customers can access the services online.
- Accessibility standards
- None or don’t know
- Description of accessibility
- There is a Login button on our home page from where it is possible to for customer admin to access the service.
- Accessibility testing
- We have not done any interface testing.
- API
- Yes
- What users can and can't do using the API
- Users can have complete access to configuring the setup to our system including creating new apps, registering new hardware, and getting their data out of our system.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Our cloud platform auto scales on demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Footfall counts and people flow tracks.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data is exported by an export button to download it to .csv or Excel format.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- We do not connect to the buyers network.
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Our service is built on Azure which has a 99.9% service availability.
- Approach to resilience
- We use Azure Cloud services and it has geo-redundant servers.
- Outage reporting
- We report outages via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We use the Azure Dev Ops to restrict access. Everything is protected by Microsoft identity.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Security Essentials
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow ISO 27001 security governance.
- Information security policies and processes
- Our reporting structure follows ISO 27001 guidelines.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our configuration and change management processes are documented in our policy documents.
These are reviewed quarterly for any potential security impact. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use Azure Security centre to test the vulnerability of our site.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- There is an Azure security centre which detects and prevents and responds to threats.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management process follows a pre-defined process for common events that guides users on how to report incidents.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
Briteyellow Limited
Equal Opportunities and Diversity Recruitment Monitoring Form
Job Ref:
In accordance with our Equal Opportunities and Diversity Policy, we are monitoring job applications to ensure that we provide equal opportunities to any job applicant and make sure that discrimination does not occur because of race, sex, sexual orientation, gender reassignment, religion or belief, marital or civil partnership status, age, disability, or pregnancy and maternity.
So that we can assess the success of this policy, we have set up a system of monitoring all job applications. We would be grateful, therefore, if you would complete the questions on this monitoring form and return it with your application form. We have asked for your name in order to enable us to monitor applications at the shortlisting and appointment stage.
All information supplied will be treated in confidence and will not be seen by staff directly involved in the appointment. The monitoring form will be detached from your application form, stored separately and used solely to provide statistics for monitoring purposes.
Thank you for your help.
Pricing
- Price
- £1,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at fredi.nonyelu@briteyellow.com.
Tell them what format you need. It will help if you say what assistive technology you use.