SAF-FORESIGHT
SAF-FORESIGHT is a digitised 3-dimensional visualisation/briefing/analysis/range safety intervention tool supporting live fire military training. SAF-FORESIGHT generates accurate Range Danger Area templates mandatory for live field firing. SAF-FORESIGHT allows for digitisation of entire process for single/multiple ranges overlaid on training areas anywhere in the world, across all phases of live training.
Features
- Weapon/Ammunition Template Generation
- Permanent live fire range design and layout analysis
- Live Fire Exercise Safety Monitoring & Intervention
- Experimentation, Options Analysis and Supply Chain Rationalisation
Benefits
- Reduces template generation time from hours to minutes
- Supports digital analysis to support maximise freedom of design
- Predictive modelling of emerging fratricide risks helps prevent catastrophic incidents
- Maximises training outcomes using available space, ammunition and time/resources
- Supports rapid assessment of implications of new acquisitions
Pricing
£130,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 0 8 0 6 2 4 4 6 0 0 0 6 9 7
Contact
SIMCENTRIC LIMITED
Simon Leng
Telephone: 07768975676
Email: simon.leng@simct.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
-
Recommend/tested on Chrome, Firefox or Safari browsers
Recommend/tested on 5th Generation iPad or Andorid tablet with equivalent CPU/performance.
Other browers such as Opera or Edge can be used - System requirements
-
- Server supports Linux and latest Windows
- Clients support latest browsers and tablet devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Next working day, excluding UK bank/public holidays
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
SimCentric offers a single tier of custmer support, which would be managed by a dedicated/named account manager
The priority of any reported bug will be agreed by SimCentric. The Prioritization Model is used to ensure a consistent approach to defining the priority with which an item needs to be resolved, drive the assignment of resources, and establish the required First Response and closure deadlines.
Upon receipt of a support case, SimCentric will enter its priority level and SimCentric will also provide a determination on whether the support issue is a ‘bug’ or a change request.
If the end customer/user (ECR) disagrees with a priority level assigned by SimCentric, it will notify SimCentric within 2 SimCentric Business Days. Upon receipt of the disagreement, then SimCentric will arrange a discussion with the ECR within 1 SimCentric Business Day. This discussion will cover the broader context, background of the support issue, and technical details of the issue. During this discussion, SimCentric will be required to justify its prioritization directly to the ECR. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onboarding is achieved through a combination of
- Product documentation including tutorials
- Approx 60 'How to' tutorial videos, covering every part of the service from login through to integrated planning
- bespoke in person training courses (cost option) - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
The data used by the service are stored in standard formats such as csv for text based data, and SHP or GEOTIFF for GIS data
The service also includes a print option which will allow all user created data to be extracted in pdf format, again in a standard military format - End-of-contract process
- The service is delivered as a subscription. At the end of the subscription period, the user can extract data entered and then stop using the service
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Service is accessible via web browser running natively on tablet. Operation and GUI will be the same.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The service is configured to support a specific number of clients, therefore the server side components are accurately configured to support estimated requests/bandwidth and storage demands
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The following metrics are recorded and available for review
- Change notifications
- Submission notifications
- Data updates
- User logins
- User permissions - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- The data used by the service are stored in standard formats such as csv for text based data, and SHP or GEOTIFF for GIS data The service also includes a print option which will allow all user created data to be extracted in pdf format, again in a standard military format
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- SHP
- GEOTIFF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
SimCentric will use commercially reasonable efforts to make the Service available with an uptime percentage of at least 99.5%, in each case during the billing cycle.
In the event the Service does not meet the Service SLA, you will be eligible to receive a Credit as described below.
Levels of service are calculated on a monthly basis to identify if the Service does not meet the SLA during the period, and if so by how much.
A credit is calculated on the following basis
If level of service is less than 99.5% but equal to or greater than 99.0% - 10% Credit due
If level of service is less than 99.0% but equal to or greater than 95.0% - 30% Credit due
If level of service is less than 95.0% - 100% Credit due
The credit is then applied against the monthly bill
To receive a credit, the customer must submit a claim by opening a case in the SimCentric ticketing systems, credit requests must be received by SimCentric by the end of the second billing cycle after which the incident occurred and must include full details and information describing the unavailability of the Service. - Approach to resilience
- This is available on request
- Outage reporting
- These are reported via email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to SAF-FORESIGHT is via login and password combination. Within the service, the adminstrator account can be used to assign user roles and permissions on an idividual basis. This allows certain users to be assigned permission to for example submit, edit, or approve data within the service
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas
- ISO/IEC 27001 accreditation date
- 3rd March 2021
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
To meet the information security objectives of the organization, SimCentric has established, operates and maintains an Information Security Policies Manual (ISMS) aligned with the requirements of ISO27001 standard and leading practice guidelines. This document describes SimCentric commitment to safeguarding information within the ISMS scope along with the obligations of the employees, contractors and third parties to perform such purpose.
The scope of ISMS applies to the following internal departments:
Systems Engineering Department
Software Development Department
Project Management Department
Operations Department
In order to support employees, appropriate awareness training and regular updates in organizational policies and procedures are provided to all employees of the organization as relevant to their job functions. Each departmental head arranges training to staff members on relevant policies and procedures. Awareness training is also included in the induction process for new employees during onboarding.
The ISMS policy is reviewed by the Information Security Steering Committee (ISSC) and updated once a year to incorporate any additions, modifications, deletions to policies and controls that may be required due to changes, including but not limited to technology, regulations and contractual requirements.
However non-routine reviews also occur if any significant change arises in SimCentric technical or business environment.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Change management covers the introduction of changes to already developed products in a controlled manner.
From a software development point of view, a key part of change management is software configuration management and control. SimCentric develop software applications which are compatible with multiple environments, and multiple versions of each environment
The SimCentric Release Team are responsible for final test and management of the approved product combinations and manage the availability of these validated installation files so they can be made available for customer download/installation. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Information is a key asset of SimCentric and recognized as needing to be protected. With the increase in interconnectivity, SimCentric recognize that information is exposed to growing numbers of threats and vulnerabilities. Information Security includes the protection of information from threats and vulnerabilities to prevent unauthorized disclosure of information to preserve confidentiality, maintain integrity, ensure business continuity, and minimize business risks.
SimCentric provides information security awareness to employees to ensure continual improvement in information security in all activities/processes within scope while meeting applicable business, legal or regulatory and member (client) requirements through regular review of our Information Security Management System - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
SimCentric InfoSec Team monitor Internet activity occurring on company equipment/networks/accounts. SimCentric use various filtering software to limit access to prohibited sites and other applications on the Internet.
All computers attached to the company network have anti-virus software combinations installed by InfoSec. This software is active, scheduled to perform regular virus checks and has uptodate virus definition files.
If an employee receives what he/she believes to be a virus or suspects that a computer is infected with a virus, it is reported to InfoSec immediately. Any suspected infected computer is removed from the network immediately until it is verified as virus - Incident management type
- Supplier-defined controls
- Incident management approach
-
SimCentric operates an Information Secuirty Policy (InfoSec) as part of adherence and conformance to the processes covered in ISO27001.
All Incidents are immediately reported to InfoSec via Email or Teams, in line with policy. Depending on teh severity of the incident, incidents are either reported back to the InfoSec Management Board as part of monthly review meetings, or if more serious/high level of threat is uncovered, an emergency InfoSec Management Board meeting is covened
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
SimCentric implemented workplace conditions to help employees to continue to work COVID pandemic, including effective social distancing, remote working, and approached to sustainable travel. These have been maintanied post COVID to help support employees who need extra time to return to the full workplace, in particular supporting employees who wish to continue to work from a home location
Pricing
- Price
- £130,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
The trial version has the same functionality as the production/paid for version
The trial version is time limited
The trial version contains generic/representative data, the production version is delivered with valdiated/customer specific data - Link to free trial
- https://www.simct.com/contact_us/