AIVR
AIVR enables you to see what your fleet can see, to transform your Safety & Security and meet your business challenges. Our lightweight plug and play device gives you the ability to get remote and secure visibility of your critical environments, and use the data it collects to build insight.
Features
- Instant video review and replay
- Machine Learning model automation
- Measure and markup video using in browser tools
- Automatic video transmission and replay
- Remote access for viewing video from assets
- Accessible through web browser with secure login
- In browser markup and annotation for building Machine Learning models
- Collaboration within browser by marking up and communicating with team
- Export reports and marked up video
- Linked to standard and bespoke geographical systems
Benefits
- Work remotely and remove the need for site based work
- Complete planning works remotely from a browser
- Inspect completed works remotely
- Manage incidents with up to date footage, automatically transmitted
- Build machine learning capability through simple annotation
- Run AI and Machine Learning automatically to generate insight
- Share work securely with colleagues through online collaboration
- Train staff using easily available footage
- Generate reports including video and data to be used offline
- Integrated seamlessly with geographical data to ensure accurate response
Pricing
£1,500 to £3,500 a device a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 2 9 0 7 0 8 6 7 3 3 2 3 2 5
Contact
One Big Circle Ltd
Barnaby Kent
Telephone: 07888679198
Email: barnaby@onebigcircle.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Our standard deployment is to a secure public cloud with a SaaS based subscription. We are able to deploy to a public cloud as a separate bespoke task based on your requirements.
- System requirements
- Availability of browser listed in capabilities.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond to any questions within 24 hours and 48 hours at weekends. We provide an expedited support for an additional charge which can provide telephone and dedicated email support.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We provide webchat support through our website, support tool and also a dedicated Whatsapp channel according to customer preference.
- Web chat accessibility testing
- We have worked with assistive technology users before on web chat and phone.
- Onsite support
- Yes, at extra cost
- Support levels
- As standard we provide email and telephone support during business hours. We can provide heightened support on request and also further technical consultancy and account management tasks.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide the following:
- Remote training session
- Automated email system that provides emails with information on different features.
- User documentation. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users are able to download data and footage to their own location on contract end.
- End-of-contract process
- Users are reminded 3 months before contract end and asked if they would like to renew.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- An administrative user is able to login and view service status of their deployed devices and the manner in which they are being used.
- Accessibility standards
- None or don’t know
- Description of accessibility
- AIVR is centred around playing back, viewing and collaborating with video in the browser. This means it is an advanced website and without viewing the video it is not possible to get the full value from the product. We have endeavoured to ensure that if the user is able to view video the remainder of the interface is as simple and accessible to use as possible, including tool tips and text alternatives.
- Accessibility testing
- Informal testing but we do plan on doing further in our roadmap.
- API
- Yes
- What users can and can't do using the API
- API is available for clients on request. We have a graded approach to the API to meet our clients needs rather than a public, one size fits all API.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The customisation of AIVR comes from the footage that is received from multiple moving locations. We also enable the following customisation:
- Ability to annotate on images to collaborate with other staff.
- Ability to share links to footage and provide different levels of access to different users.
- Ability to create a machine learning dataset with annotated labels that can be configured.
- Ability to configure and change icons that show for different incidents.
Scaling
- Independence of resources
- We use horizontally scaling elastic cloud technologies, dependent on load
Analytics
- Service usage metrics
- Yes
- Metrics types
- User required metric reports supplied at agreed intervals.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Users are able to export their data by selecting a section of a route and having download links emailed to them.
We are able to work with a client to ensure that data can be automatically synchronised to their own private cloud setup depending on their requirements. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Mp4 video files
- Jpeg images
- Json meta data
- Data import formats
- Other
- Other data import formats
-
- GPX files from Garmin VIRB
- GPX from GoPro
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We run a full service desk that operates 7 days a week. We provide SLA's as following:
- Response to first line support query - 2 hours in office hours, 12 hours out of office hours.
- Response to security patches or bugs - 48 hours.
- Response to critical service affecting incident - 30 mins in office hours. Up to 6 hours out of office hours.
Our platform as currently not experienced any service affecting issues after 12 months of continual operation. We are able to provide a bespoke service agreement for clients if they require additional capability or refunds for not meeting certain SLAs. - Approach to resilience
-
Our service utilises one of the large cloud providers and takes advantage of a number of the resilience services provided including:
- Data automatically backed up and sharded across nodes.
- Horizontally scalable services and applications that dynamically respond to load.
- Secure and resilient authentication and access control.
In addition to these services we also utilise industry standard software development and deployment techniques for ensuring resilience and quality in an evolving product.
Further information on system architecture and security policy is available on request. - Outage reporting
- A dashboard is provided to show usage of platform and also any outages. We also provide messaging systems utilising an API and email alerts to inform of any outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We provide a role based user authentication which ensures that only certain type of users are able to access certain management interfaces. User authentication is based on an email address and password. Any support required is only initiated from the email address associated with the user account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- CyberEssentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our team have been involved in providing secure government systems for over 15 years. Our governance approach has been based on industry best practice, our teams experience and a growing set of tooling and monitoring tools that automatically determine any issues. We combine this with using approved underlying security techniques such as 2 Factory Authentication by default, communicating over TLS/SSL and using encryption techniques for any personal data stored.
We have data and security issues as a standard agenda item on our company board meetings where we manage risks, discuss issues and allocate budget for improvements. - Information security policies and processes
-
Each employee signs an agreement which contains information around confidentiality and security. We hold regular training sessions to ensure that any security issue can be identified and then raised immediately with the Chief Technology Officer or designated person in their absence. The CTO has full authority to take any steps necessary if the issue reported needs immediate investigation and remediation.
Our automated systems trigger in our messaging tools and dashboards to ensure that any issues are flagged and need to be identified and resolved. If they are not they are automatically escalated to a more senior manager.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Change management is completed through our software development and configuration control tools. Changes are discussed during bi-weekly sprint planning and estimation sessions. Work is then tracked and tested during sprints. We deploy any chances to our staging environment where it is tested before being deployed to our production environment.
All changes to software and configuration are able to be rolled back if any issues are identified. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerabilities are identified by the following techniques:
- Automated internal tools alerting an engineer.
- Externally relevant security alert from relevant mailing lists or industry publications.
- User generated alerts.
Any potential issues will be raised on a daily meeting aside from urgent issues which will be raised immediately on internal messaging tools. Staff are encouraged to raise any concerns immediately and a more senior member will assess the threat level. Ultimately the CTO will decide the threat level. Patches can be deployed immediately if the threat level is sufficiently high. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Monitoring systems detect any unusual behaviour and these are made available to our service team. We also run a routine manual check to ensure integrity of the system.
Our team are also trained to identify whether any user reported problems maybe a potential compromise.
All staff are trained to immediately raise any concerns that there has been a compromise and alert other team members to implement a resolution plan. The CTO will be notified of any compromise and manage the resolution. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Common events are handled using our service management tool. This ensures that common events can be handled via pre-approved canned replies that are sent to users. Cases are kept open and managed until completion.
Users are able to report incidents via a dedicated support email, telephone line or instance message tool available on the website.
Monthly reports of incidents and their resolution are made available to the management team and ultimately CTO.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
One Big Circle recognises it's responsibility to the environment and climate beyond legal and regulatory requirements. We are committed to reducing our environmental impact and continually improving our environmental performance as an integral part of our business strategy and operating methods, with regular review points. We encourage employees, customers, suppliers and other stakeholders to do the same. - Covid-19 recovery
-
Covid-19 recovery
NA - Equal opportunity
-
Equal opportunity
One Big Circle is an equal opportunities employer.
Pricing
- Price
- £1,500 to £3,500 a device a month
- Discount for educational organisations
- No
- Free trial available
- No