Briteyellow Limited
BriteScanner Virtual Reality Indoor Mapping
BriteScanner helps you create Virtual Reality Tours to give your visitors an immersive experience of your venues before they've even left home.
Features
- Interactive Virtual Tour for immersive remote experience of your venues.
Benefits
- Virtual Guides enables self-service video navigation on and off-site.
- Pre-arrival planning gives visitors confidence to navigate your places.
- Contextual notifications provides timely and relevant alerts.
- Real time Data insights instantly.
Pricing
£1,000 a licence
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at fredi.nonyelu@briteyellow.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
8 4 6 9 0 4 5 0 2 2 3 7 3 3 3
Contact
Briteyellow Limited
Fredi Nonyelu
Telephone: +448455570520
Email: fredi.nonyelu@briteyellow.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Support for Intel cameras and Cisco or Ruckus WiFi devices.
- System requirements
-
- IOS
- Android
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We respond within 4 hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Webchat is accessible from our website.
- Web chat accessibility testing
- We have not done any web chat testing with assistive technology users.
- Onsite support
- Yes, at extra cost
- Support levels
-
All incidents will be assigned one of three priority levels as
• Priority High – Service has suffered a complete failure or significant partial loss of service.
• Priority Medium – Service is suffering problems which affect normal usage but a workaround exists or problem affects one user only.
• Priority Low – Work request (a simple non urgent request for work to be carried out), Non urgent faults (faults that are non urgent), or requests for information (Information request)
There is no difference is the cost.
We provide a technical account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We help users start using our service with online training.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- When the contract ends users can extract their data by downloading it to Excel or .csv.
- End-of-contract process
- At the end of the contract we will keep the data accessible for 30 days before it is securely deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The difference is that on mobile devices the service will adapt automatically to the screen size.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface is our client portal from where customers can access the services online.
- Accessibility standards
- None or don’t know
- Description of accessibility
- There is a Login button on our home page from where it is possible to for customer admin to access the service.
- Accessibility testing
- We have not done any interface testing.
- API
- Yes
- What users can and can't do using the API
- Users can have complete access to configuring the setup to our system including creating new apps, registering new hardware, and getting their data out of our system.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Our cloud platform auto scales on demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Footfall counts and people flow tracks.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data is exported by an export button to download it to .csv or Excel format.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- We do not connect to the buyers network.
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Our service is built on Azure which has a 99.9% service availability.
- Approach to resilience
- We use Azure Cloud services and it has geo-redundant servers.
- Outage reporting
- We report outages via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We use the Azure Dev Ops to restrict access. Everything is protected by Microsoft identity.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Security Essentials
- ISO267001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow ISO 27001 security governance.
- Information security policies and processes
- Our reporting structure follows ISO 27001 guidelines.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our configuration and change management processes are documented in our policy documents.
These are reviewed quarterly for any potential security impact. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use Azure Security centre to test the vulnerability of our site.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- There is an Azure security centre which detects and prevents and responds to threats.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management process follows a pre-defined process for common events that guides users on how to report incidents.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Wellbeing
Covid-19 recovery
Britescanner helps with Covid-19 recovery by:
● Involvement of local stakeholders and users in design (e.g. design of Briteway points of interest for navigation), helping to improve transport links and accessibility for the disabled, elderly or otherwise vulnerable.
● Providing crowd insights at places like stations helps those that need
effective social distancing. Contextual crowd insights help those that need to travel but want to avoid overcrowding.Wellbeing
Britescanner helps improve wellbeing through:
● involving local stakeholders and/or users in design in the design of navigable points of interest and services services, systems, products or buildings.
● making facilities mapped in Britscaner available for
community groups, education or training.
Pricing
- Price
- £1,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at fredi.nonyelu@briteyellow.com.
Tell them what format you need. It will help if you say what assistive technology you use.