Novus RT
Manage Real Time information (RTPi) for passenger info, fleet management, curtailment and cancellations. Create and manage routes, timetables and schedules. Drive digital displays, manage adherence for subsidised routes, drive Traffic Light Priority schemes. Import and export TXC datasets. Publish data via an Open API and create management KPI dashboards.
Features
- All industry standard data formats are supported
- Communication links are secure and monitored
- Service data can be created, imported and maintained
- Real time departures appear on street signs, web and apps
- Content management system supplements schedule information
- Actual location, arrival and departure information is recorded
- Service provision can be reviewed and played back
- Service monitoring is provided as route ladders
- Common database shared with NOVUS FX
Benefits
- The travelling public get current and accurate real time information
- Information is consistent over a number of channels
- Channels include on-street signs, web and apps
- Information can be supplemented to include late-breaking news
- Single data entry reduces mistakes: common database with NOVUS FX
- Local Authorities and operators can monitor and review Service provision
Pricing
£68,850 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 1 3 5 6 7 4 8 2 6 1 9 3 4 7
Contact
Trapeze Group UK Ltd
Matt George
Telephone: 07353 107447
Email: tenders@trapezegroup.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Modern browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Calls and emails are acknowledged immediately. Best practice SLAs apply.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard support service (no extra cost, with account manager and support engineers):
Priority Level 1 Resolution time (days) 2
A reported problem in the Software, or one of its necessary components, has caused the Software to cease function or has caused a complete system shutdown. The incident may result in a downtime and prohibit the Trapeze Customer from carrying on procedures crucial to the operations are immediately addressed.
Priority Level 2 Resolution time (days) 3
A reported problem in the Software or one of its necessary components has caused a serious disruption of a major business function and cannot be temporarily solved by an alternative method or 'work around'.
Priority Level 3 Resolution time (days) 5
A reported problem or query in the Software, or one of its necessary components, which cannot be temporarily solved by an alternative method or 'work around'.
Priority Level 2 Resolution time (days) 5
A reported problem, question, desire, request, etc. which is not included in the definitions of Priority 1-3 and demands less immediate attention than said priorities.
Priority Level 5 Resolution time (days) Next upgrade
A problem of cosmetic nature that may be corrected in the next release of the software. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- User guides and training, online self-service portal
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Export into standard data exchange formats such as TXC & NaPTAN files or data migration is available as a separate service
- End-of-contract process
- Standard functionality enables data export. Once the contract has ended, access to the browser-based system is revoked.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- Select language. Modify screen layout. Change styling. Screen panels and available functionality can be defined for individuals or groups of users.
Scaling
- Independence of resources
- Capacity is designated in order to provide service to the required number of users
Analytics
- Service usage metrics
- Yes
- Metrics types
- Availability, response times, application logs include usage
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Other
- Other data at rest protection approach
-
Firewalls
Data encryptionWhite listing client sites;
Role base access controls by support staff;
All your backed-up data is automatically encrypted when stored in the cloud using Azure Storage encryption, which helps you meet your security and compliance commitments. This data at rest is encrypted using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is exported in standard formats (TXC, ATCO-CIF, NaPTAN XML). Alternatively, all data can be exported in flat file format such as .csv.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- TransXChange - TXC
- ATCO-CIF
- NaPTAN
- GIS Shape files
- GTFS
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- TransXChange - TXC
- ATCO-CIF
- NaPTAN
- GIS Shape files
- GTFS
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Within Azure we have client separation through resource groups that include localised virtual networks.
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
-
Access lists on VLAN
Firewalls
Network scanning for vulnerabilities
Availability and resilience
- Guaranteed availability
- Minimum is 99.5 but can go up to 99.9 at customer request under separate agreement.
- Approach to resilience
-
Failover lines
Failover firewalls
Resilient switches - Outage reporting
- All servers are monitored 24/7 with email and text alerts if there is an outage. Run via Uptrends which tests accessibility globally.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
The system holds its own passwords which are fully encrypted within the database. The password policy is enforceable and includes reset & expiry features. Superusers can reset passwords.
Unsuccessful logins result in lockouts. There is full login audit. Admin passwords can be regularly changed. - Access restriction testing frequency
- At least once a year
- Management access authentication
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 08/04/2024
- What the ISO/IEC 27001 doesn’t cover
- Scope covers all activities involving client data, not internal systems.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
It is the policy of Trapeze Group UK Ltd to ensure:
>Confidentiality of information is maintained
>Integrity of information through protection from unauthorised modification
>Availability of information to authorized users when needed
>Information is protected against unauthorised access
>Information is not disclosed to unauthorized persons through deliberate or careless action
>Regulatory and legislative requirements will be met
>Business continuity plans are produced, maintained and tested as far as practically possible
>Information security training is given to all Employees maintaining the hosting centre environment
>All breaches of information security and suspected weaknesses are reported and investigated
Induction and ongoing training via an audited on-line course ensure awareness of GDPR and security. There is an appointed Data Protection Officer. responsibility for adherence to policy lies at board level.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We manage change through our ITSM tool following the ITIL defined process. The Service Desk Manager working with the IT Manager ensures that the underlying infrastructure is managed using industry best practice procedures to prevent adverse impacts on security.
In order for changes to progress smoothly, a planning stage includes:
• Identification of issues
• Scope definition
• Gap analysis
• Estimating
• Timeframes
• Resourcing
• Success criteria
Once the change has been defined, often working with you to fully understand the what and why, the plan is shared and explained to all stakeholders. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We ensure up to date patching is applied to both the OS and the application.
We use an industry standard tool for confirming known vulnerabilities are identified and addressed. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use a combination of Rapid7 IVM and IDR which proactively scan for vulnerabilities and security related events. This reports back to a central management portal. A detailed risk analysis is provided by Rapid7 IDR and if deemed to be major, the major incident policy is invoked. Incident management and incident response teams are convened. An investigation will assess the implications. Once the root cause has been identified, a permanent solution will be put in place and the incident is closed. We also use Crowdstrike for rogue behaviour detection along with a managed service that protects the infrastructure 24/7
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We work within ISO27001 / ITIL frameworks. An incident is anything out-of-the-normal occurring that negatively affects us or one of our customers.
Users can report incidents via web portal, email or phone.
Major incidents are dealt with by two teams: The Response Team ensure that all necessary remedial actions are taken as quickly and effectively as possible; the Management Team allows the Response Team to focus on fixing the incident whilst they take strategic decisions, ensure resourcing for the Response Team and deal with external communications. Incident Management is an iterative process: Preparation > Identification > Response > Lessons Learned
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
Trapeze invest in a carbon offset scheme, tree planting etc...Wellbeing
Trapeze have a number of wellbeing initiatives which we run for our staff. These include a 'Healthy Minds' steering group with monthly meetings open to all staff, and trained mental heath first aiders.
Pricing
- Price
- £68,850 an instance
- Discount for educational organisations
- No
- Free trial available
- No