PiX Image Transfer User Pack
PiX is a combination of a secure mobile application and server solution, facilitating the secure transfer of imagery from a team on the ground, back into an organisation, with the ability to distribute notifications back out to the team, to enable them view new images.
Features
- Full Audit Trail
- Operation Based Indexing
- Image Annotation & Watermarking
- Linking to an Entity in an Operation
- Geo-Location of Imagery & Mobile Devices (if enabled)
- USB Digital Camera Tethering
- No Imagery Stored on Mobile Device
- Web Based Application
- iOS & Android Mobile Application
- Follows UK Evidential Standards
Benefits
- Secure & Encrypted Image Management
- Hosted Central Server Solution
- Images Linked to Operational Entities (Persons/Items of Interest)
- Multi-Domain Capable
- Fast Image Search and Selection
- Images can be Securley Reviewed Remotely
- Images can be Annotated and Watermarked
- All Process are to UK Evidential Standards
- Device Location Reporting (optional)
- Standard iOS & Android Hardware Platform
Pricing
£150 a user
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 3 6 3 2 9 3 4 0 9 0 1 2 6 1
Contact
Design IT Solutions (Trading as Panoptech)
Andrew Baum
Telephone: 0121 782 7200
Email: abaum@panoptech.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No Non
- System requirements
-
- Linux or Windows Operating System
- IOS or Android Operating System for Mobile Device (Tablet/Phone)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 8 hours during Normal Working Hours, Monday to Friday 9:00 to 17:00, excluding Uk Bank Holidays.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Telephone support with 8 hours SLA, during normal working hours (9:00 to 17:00). Monday to Friday, excluding UK Bank Holidays. Call out to site can be provided on a next working day SLA, but at an additional charge and dependant on location of system. If remote access is available then support can be provided during normal working hours, Monday to Friday, excluding UK Bank Holidays.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Documentation provided includes PiX User and Technical Manuals. Training is delivered either at a customer or Panoptech location. Two levels of training are offered being " Technical Delivery & Support Training" & "User Training". Both are delivered either in "End User" or "Train-the -Trainer" formats. Bespoke training can be provided and costed separately depending on the requirements.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Microsoft Word
- End-of-contract data extraction
- User & Technical Documentation are handed over to customers in paper or electonic formats.
- End-of-contract process
- All of the system is closed down and decomissioned
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Fully worked application on the mobile device. Full admin screen on the desktop which allows more configuration.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Icon, front screen, some of the headings can be customised.
Scaling
- Independence of resources
- Each user's system is separate.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Export of the Database with all of the information in it.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The availability of system is based wholly influenced on the resiliance designed into the infrastructure/network on which whic the solution resides. Panoptech will work with the User to make sure that this offers the best possible uptime for the budget and capability being delivered at which point the availability of the system can be determined.
- Approach to resilience
- Our Servers are multi databased and multi server across sites in the UK.
- Outage reporting
- We have a Network operations Centre whcih can monitor the network on which the PiX software resides if required. This provides a dashboard which allows users a view of the current status of the infrastructure. By way of notification, faults can be highlighted to a user in a SMS or Email format.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- MDM is also used for access management and applying policies to all devices/users
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Security Policy and procedure is applied to ISO 27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes are managed as required.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Patches are tested within an environment before they are applied.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Incidents are responded too as soon as it is online.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users report incidents by the helpdesk.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
The services and products offered have been developed in collaboration with users and communities in the codesign and
delivery of the contract to support strong integrated communities.
Pricing
- Price
- £150 a user
- Discount for educational organisations
- No
- Free trial available
- No