Aetopia Digital Asset Management (DAM)
Aetopia DAM is a powerful and extensible solution for digital collections, galleries, libraries, archives and museums (GLAM), scientific and public archives, healthcare/NHS, brand management, marketing and distribution, digital publishing, education and image management. It also supports digital collaboration workflows. Aetopia DAM is accredited by the DAM Foundation.
Features
- Digital collaboration and approval workflows
- Advanced metadata modelling
- Powerful access control rules
- Fast and flexible search
- Video and Image redaction
- Massively scalable
- Intelligent public portals
- Web-friendly REST API
- Responsive design for smartphones and tablets
- Secure sharing with 3rd parties
Benefits
- Improved security and control of digital assets
- Fast searching and discovery of assets
- Supports legal and regulatory compliance such as GDPR
- Efficient sharing of assets internally and externally
- Improved productivity via collaborative workflows
- Better business intelligence on use of assets
- Enables new revenue streams via asset commercialisation
- Easy categorisation of assets using tags
- Supports online asset uploads from third parties
- Enable users to work more efficiently with digital content
Pricing
£5 to £50 a unit a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 5 1 1 6 9 4 5 9 4 9 1 5 6 6
Contact
Aetopia
Stephen McAreavey
Telephone: 02890998767
Email: tenders@aetopia.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Private cloud deployments may be subject to specific hardware and software pre-requisites.
- System requirements
-
- Supported browser (Chrome, Firefox, Safari, Edge)
- Private Cloud : Linux virtual machines
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response during UK business hours is within one hour. Weekend support times may be longer.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide technical support for all aspects of our DAM solution. This is normally 3rd line support - we expect customers to nominate support representatives and provide a 1st line service (e.g. ICT helpdesk) to their internal users. Triage training to ICT helpdesk operatives will be provided. All of our pricing includes telephone and email support during UK business hours. Extended support (7.00am to 8.30am and 5.30pm to 10pm) and 24x7 support can be provided for an extra cost. All customers have access to cloud support engineers via the Aetopia helpdesk. Larger customers will be allocated a dedicated technical account manager.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Aetopia's on-boarding service includes professional services for configuration, consultancy, data migration and knowledge transfer.
Onsite training packages using a professional trainer are tailored to the needs of the customer and are subject to an additional one-off cost. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Aetopia will assist customers to extract their data in the safest and easiest possible manner for them. The exact method used will depend on the total size and complexity of the data held. Possible options are: 1) Customer self-downloads their data using the DAM application. Suitable for smaller systems. 2) Aetopia copies customer data to a cloud storage bucket and provides customer with security key. Customer can then sync their data to the location of their choice. 3) Aetopia support performs bulk download of media files and metadata to secure and encrypted hard drive(s) which is/are then couriered to the customer. Metadata will be exported in spreadsheet format (XLSX or CSV). Regardless of the exact method used, Aetopia will assist at every step of the way, and after validation that the data has been successfully returned to the customer, we will destroy all of our copies of the data held.
- End-of-contract process
-
Advice and assistance of up to 16 hours are provided as part of the end-of-contract process.
Additional assistance may be chargeable at our daily rate. Most cloud hosting providers impose data transfer charges and these may be passed onto the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None - the desktop service uses a responsive design application that resizes intelligently for mobile device screens. Some administration functions may work better on a desktop browser or tablet due to the amount of information that is displayed on screen.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
All major system user functions such as add asset and metadata, search, edit, download, resize etc. are also available via our REST / JSON API.
Some administrator functions may not be yet available through the API. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Admin users can customise many aspects of the application configuration dynamically, including metadata fields, groups and pages; data validation formats; user digital workflows; image thumbnail resolutions; allow and deny lists for uploads; application security rules and many other aspects of the application. Standard users can tailor application layouts; themes and colours, search and sorting defaults.
Scaling
- Independence of resources
- Aetopia uses a pro-active automated monitoring approach to continually ensure that service levels are being met. Our services are massively scalable and additional cloud resources will be added to match changes in demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- A reporting dashboard which shows various metrics including user logins, dormant users, asset downloads, search terms with results, search terms without results, top asset downloads, used storage space, total asset uploaded. Many of the metrics can also be downloaded in spreadsheet format.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
1) Using the provided functions in the user application, i.e. download media files and export data into a spreadsheet format. Data is downloaded directly to the user's browser.
2) Using the provided function to request media files which are then made available via a download link.
3) Using the application API to export media and/or metadata in JSON or CSV format.
4) Via a request to Aetopia's support helpdesk, who can export data in bulk using cloud and database utilities. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Any digital file format, e.g. Image, Video, Audio, Document
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Aetopia can commit to 99.9% availability. Users may be compensated via a reduced subscription fee should this level not be met.
- Approach to resilience
- Through the use of multiple and resilient layers, e.g. highly-durable file and object storage; compute clusters running across separate availability zones; the use of microservices and serverless computing resources for intensive workloads; and digital checksums to verify the handoff of assets between storage locations. Full details are available on request.
- Outage reporting
- Email alerts using the built-in notification service.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Aetopia manages its cloud servers with the following tools:
Secure Shell (SSH) - all console access to servers is over encrypted SSH channels. SSH key-based access means that our staff are issued with encrypted keys rather than username and passwords for the servers. A user’s key must already exist on the server before they can access it. These keys are issued on a needs-only and time-limited basis.
Application administrative tasks are carried out using the administration screens provided in the software - as per all web application access, these screens are encrypted using a TLS certificate configured with strong ciphers. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Authentication for management access is only possible with a client X.509 digital certificate.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS via Exova BM TRADA
- ISO/IEC 27001 accreditation date
- 1 May 2018
- What the ISO/IEC 27001 doesn’t cover
-
The scope of the certificate is "Information security for the design, development, deployment, support and hosting of digital asset management and digital evidence management software applications for sectors including law enforcement agencies,
scientific and public archives, healthcare/NHS, museums and heritage, marketing and distribution, digital publishing, media/broadcast providers and education in accordance with the Statement of Applicability V1.7." - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Our approach to information security is governed by our ISO27001:2013 Information Security Management System (ISMS). This takes a goal-based and risk-centric approach to information security, where all identified risks are subject to evaluation and appropriate controls are applied to them.
To ensure compliance with ISMS policies, staff awareness is key, and we hold regular training and discussion sessions. Both internal and independent compliance auditing is built into the process and provides assurance that policies are being followed. The ISMS policy owner is the Aetopia Commercial Director.
Aetopia is also a Cyber Essentials certified company.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Aetopia's approach is governed by our ISO27001:2013 ISMS Change Management policy - brief summary:
Changes will be reviewed and approval given based upon the potential risks, benefits, effort required and urgency of the change.
The change will be scheduled, and if necessary communicated to anyone who may be affected.
Once the change is carried out, appropriate testing will be conducted (and documented) to ensure stability has not been impacted.
For urgent or critical changes, (for example, a security breach) the changes can be applied first and subsequently documented. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Aetopia's ISMS puts great emphasis on staff training and awareness, and especially the adoption of secure coding practices using resources from InfoSec special interest groups such as OWASP, Krebs on Security, the Internet Storm Centre and the National Cyber Security Centre (NCSC). Bulletins and advisories from these sources are frequently distributed to all staff, who are encouraged to discuss and learn from them.
External security testing, such as vulnerability scans and penetration testing is part of our regular testing framework. Security patches are given top priority and are often deployed with 24 hours of a vulnerability being identified. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our ISO27001:2013 ISMS includes an audited monitoring process whereby server and application log files are regularly scanned to identify evidence of unauthorised access.
Any potential compromise or incident is subject to our ISMS Incident Management process which is given maximum priority in the company. Response to incidents tends to be immediate. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Aetopia manages information security incidents as per its ISMS Incident Management Policy - where an Information Security Incident has occurred (or is suspected) the following process MUST be followed.
Incidents are reported to a member of the Management Team as quickly as possible, and should provide as much information as possible. Customer-reported incidents can be reported using the support helpdesk.
Once investigations have been concluded, a customer report should be prepared detailing everything that happened, steps that were taken to mitigate the Incident at the time, and record any possible corrective actions which may be recommended to prevent a recurrence.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
The effective use of DAMS software provides a number of important benefits in fighting climate change: 1) A reduction in the number of car journeys used to collect digital media from businesses and members of the public due to the on-line public upload facility. Eliminating these journeys reduces fuel use and traffic congestion, adding to the quality of life for local citizens. 2) A similar reduction in car journeys (due to the DAM on-line sharing features) that would otherwise be required to share digital evidence with authorised third parties. 3) Reduction in the use of consumables such as DVD-ROMs and USB drives. This reduces resource requirements and cuts down on e-waste that needs to be handled.Tackling economic inequality
Aetopia Ltd is entirely based in the UK, meaning that all revenue, salaries, tax and profit from our activities stays in the UK. This indirectly benefits economic inequality by keeping more UK taxpayers’ money inside the country.Wellbeing
Aetopia Ltd can actively demonstrate support of contract staff via health and wellbeing initiatives. Each employee avails of health and wellbeing support both internally and externally via a number of different support metrics inclusive of healthcare provider, dental care provider and mental health and wellbeing support under the companies private healthcare scheme .
Pricing
- Price
- £5 to £50 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Aetopia will be happy to negotiate a free trial on a case-by-case basis.