One Big Circle Ltd

AIVR

AIVR enables you to see what your fleet can see, to transform your Safety & Security and meet your business challenges. Our lightweight plug and play device gives you the ability to get remote and secure visibility of your critical environments, and use the data it collects to build insight.

Features

  • Instant video review and replay
  • Machine Learning model automation
  • Measure and markup video using in browser tools
  • Automatic video transmission and replay
  • Remote access for viewing video from assets
  • Accessible through web browser with secure login
  • In browser markup and annotation for building Machine Learning models
  • Collaboration within browser by marking up and communicating with team
  • Export reports and marked up video
  • Linked to standard and bespoke geographical systems

Benefits

  • Work remotely and remove the need for site based work
  • Complete planning works remotely from a browser
  • Inspect completed works remotely
  • Manage incidents with up to date footage, automatically transmitted
  • Build machine learning capability through simple annotation
  • Run AI and Machine Learning automatically to generate insight
  • Share work securely with colleagues through online collaboration
  • Train staff using easily available footage
  • Generate reports including video and data to be used offline
  • Integrated seamlessly with geographical data to ensure accurate response

Pricing

£1,500 to £3,500 a device a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at barnaby@onebigcircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

7 2 9 0 7 0 8 6 7 3 3 2 3 2 5

Contact

One Big Circle Ltd Barnaby Kent
Telephone: 07888679198
Email: barnaby@onebigcircle.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Our standard deployment is to a secure public cloud with a SaaS based subscription. We are able to deploy to a public cloud as a separate bespoke task based on your requirements.
System requirements
Availability of browser listed in capabilities.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond to any questions within 24 hours and 48 hours at weekends. We provide an expedited support for an additional charge which can provide telephone and dedicated email support.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We provide webchat support through our website, support tool and also a dedicated Whatsapp channel according to customer preference.
Web chat accessibility testing
We have worked with assistive technology users before on web chat and phone.
Onsite support
Yes, at extra cost
Support levels
As standard we provide email and telephone support during business hours. We can provide heightened support on request and also further technical consultancy and account management tasks.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide the following:
- Remote training session
- Automated email system that provides emails with information on different features.
- User documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users are able to download data and footage to their own location on contract end.
End-of-contract process
Users are reminded 3 months before contract end and asked if they would like to renew.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
An administrative user is able to login and view service status of their deployed devices and the manner in which they are being used.
Accessibility standards
None or don’t know
Description of accessibility
AIVR is centred around playing back, viewing and collaborating with video in the browser. This means it is an advanced website and without viewing the video it is not possible to get the full value from the product. We have endeavoured to ensure that if the user is able to view video the remainder of the interface is as simple and accessible to use as possible, including tool tips and text alternatives.
Accessibility testing
Informal testing but we do plan on doing further in our roadmap.
API
Yes
What users can and can't do using the API
API is available for clients on request. We have a graded approach to the API to meet our clients needs rather than a public, one size fits all API.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The customisation of AIVR comes from the footage that is received from multiple moving locations. We also enable the following customisation:
- Ability to annotate on images to collaborate with other staff.
- Ability to share links to footage and provide different levels of access to different users.
- Ability to create a machine learning dataset with annotated labels that can be configured.
- Ability to configure and change icons that show for different incidents.

Scaling

Independence of resources
We use horizontally scaling elastic cloud technologies, dependent on load

Analytics

Service usage metrics
Yes
Metrics types
User required metric reports supplied at agreed intervals.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users are able to export their data by selecting a section of a route and having download links emailed to them.
We are able to work with a client to ensure that data can be automatically synchronised to their own private cloud setup depending on their requirements.
Data export formats
  • CSV
  • Other
Other data export formats
  • Mp4 video files
  • Jpeg images
  • Json meta data
Data import formats
Other
Other data import formats
  • GPX files from Garmin VIRB
  • GPX from GoPro

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We run a full service desk that operates 7 days a week. We provide SLA's as following:
- Response to first line support query - 2 hours in office hours, 12 hours out of office hours.
- Response to security patches or bugs - 48 hours.
- Response to critical service affecting incident - 30 mins in office hours. Up to 6 hours out of office hours.
Our platform as currently not experienced any service affecting issues after 12 months of continual operation. We are able to provide a bespoke service agreement for clients if they require additional capability or refunds for not meeting certain SLAs.
Approach to resilience
Our service utilises one of the large cloud providers and takes advantage of a number of the resilience services provided including:
- Data automatically backed up and sharded across nodes.
- Horizontally scalable services and applications that dynamically respond to load.
- Secure and resilient authentication and access control.
In addition to these services we also utilise industry standard software development and deployment techniques for ensuring resilience and quality in an evolving product.
Further information on system architecture and security policy is available on request.
Outage reporting
A dashboard is provided to show usage of platform and also any outages. We also provide messaging systems utilising an API and email alerts to inform of any outages.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
We provide a role based user authentication which ensures that only certain type of users are able to access certain management interfaces. User authentication is based on an email address and password. Any support required is only initiated from the email address associated with the user account.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
CyberEssentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our team have been involved in providing secure government systems for over 15 years. Our governance approach has been based on industry best practice, our teams experience and a growing set of tooling and monitoring tools that automatically determine any issues. We combine this with using approved underlying security techniques such as 2 Factory Authentication by default, communicating over TLS/SSL and using encryption techniques for any personal data stored.
We have data and security issues as a standard agenda item on our company board meetings where we manage risks, discuss issues and allocate budget for improvements.
Information security policies and processes
Each employee signs an agreement which contains information around confidentiality and security. We hold regular training sessions to ensure that any security issue can be identified and then raised immediately with the Chief Technology Officer or designated person in their absence. The CTO has full authority to take any steps necessary if the issue reported needs immediate investigation and remediation.
Our automated systems trigger in our messaging tools and dashboards to ensure that any issues are flagged and need to be identified and resolved. If they are not they are automatically escalated to a more senior manager.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change management is completed through our software development and configuration control tools. Changes are discussed during bi-weekly sprint planning and estimation sessions. Work is then tracked and tested during sprints. We deploy any chances to our staging environment where it is tested before being deployed to our production environment.
All changes to software and configuration are able to be rolled back if any issues are identified.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerabilities are identified by the following techniques:
- Automated internal tools alerting an engineer.
- Externally relevant security alert from relevant mailing lists or industry publications.
- User generated alerts.
Any potential issues will be raised on a daily meeting aside from urgent issues which will be raised immediately on internal messaging tools. Staff are encouraged to raise any concerns immediately and a more senior member will assess the threat level. Ultimately the CTO will decide the threat level. Patches can be deployed immediately if the threat level is sufficiently high.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring systems detect any unusual behaviour and these are made available to our service team. We also run a routine manual check to ensure integrity of the system.
Our team are also trained to identify whether any user reported problems maybe a potential compromise.
All staff are trained to immediately raise any concerns that there has been a compromise and alert other team members to implement a resolution plan. The CTO will be notified of any compromise and manage the resolution.
Incident management type
Supplier-defined controls
Incident management approach
Common events are handled using our service management tool. This ensures that common events can be handled via pre-approved canned replies that are sent to users. Cases are kept open and managed until completion.
Users are able to report incidents via a dedicated support email, telephone line or instance message tool available on the website.
Monthly reports of incidents and their resolution are made available to the management team and ultimately CTO.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

One Big Circle recognises it's responsibility to the environment and climate beyond legal and regulatory requirements. We are committed to reducing our environmental impact and continually improving our environmental performance as an integral part of our business strategy and operating methods, with regular review points. We encourage employees, customers, suppliers and other stakeholders to do the same.
Covid-19 recovery

Covid-19 recovery

NA
Equal opportunity

Equal opportunity

One Big Circle is an equal opportunities employer.

Pricing

Price
£1,500 to £3,500 a device a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at barnaby@onebigcircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.