ORBIS Network
ORBIS is an online, intelligence gathering platform. Used to identify and locate individuals.
ORBIS can identify individuals and past and current addresses, with the added capability of linking individuals to family members, co-habitants and business partners.
Bulk data enhancing, searching and data extracting available too.
Features
- URL access
- Remote access, desktop, mobile or handheld
- Secure user login
Benefits
- One license, unlimited user access
- Concurrent user access
- Unlimited search options available
- User friendly interface
- Quick content delivery
Pricing
£1,280 to £43,200 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 4 0 5 2 3 9 6 4 4 3 9 8 0 8
Contact
Simunix Limited
Colin Frith
Telephone: 07792044923
Email: cmf@simunix.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Access via internet, HTTPS:// access only
- Compatible with IE 10, IE11
- Google Chrome
- Firefox
- Bing
- One license - unlimited user access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We aim to provide email assistance within 30 minutes of receiving the query.
We respond to queries Monday to Friday between 9am and 5pm.
In Emergencies, we will respond at weekends. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
We will provide onsite user training free of charge.
There is limited technical support required as ORBIS is available by a secure, private URL.
Any online support required is arrange between the customer and the supplier, at no extra cost. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Once users have signed up to the service, we will provide onsite training.
Any online training can be arrange and set up for a limited number of 50 users.
There is a user manual available to download on the Help section of the users account. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
No data is held by the supplier.
If required, this must be discussed between the customer and the supplier - End-of-contract process
-
A renewal quotation is forwarded 4 months before the contract renewal date.
The customer must give no less than 3 months notice to cancel - if required.
Any service enhancements and upgrades are quoted in renewal.
The customer can have full access to the service.
There are 3 different license options available, ORBIS, ORBIS+ and ORBIS Network.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are very small differences in the interface. This is simply to make the mobile interface compatible with the screen size.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
ORBIS is a service interface.
The access via a secure, private URL to the clients ORBIS site.
Maintained by the ORBIS team. - Accessibility standards
- None or don’t know
- Description of accessibility
-
The web pages can be navigated without a mouse. Tab indexes have been set.
The interface does not use a CAPTCHA.
All images have alt text.
All hyperlinks are sufficiently verbose.
There is no facility to change the interface theme.
The interface is colour blind friendly.
Loading of images is not essential.
There is no sound.
There are no videos. - Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
Access to the API is through a unique API key, supplied on sign up.
All search methods required are accessible with the API key.
Users cannot make changes to the API.
Usage limits are set based on pricing tariffs. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- We have server load distribution and an excess of resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We provide the credit usage reports.
Other reports can be provided by request. - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The bulk downloads are automatically added to a CSV file.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Our servers are located on two independent ISPs. We provide a 99.9% SLA
We have no formalized refund structure. - Approach to resilience
- Available on request.
- Outage reporting
-
Email alerts and account notifications.
Direct phone contact where possible.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Secure user access is managed by the supplier.
Usage restrictions can be placed user level or account level.
License access is restricted to customer, with unique URL and password. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials PLUS
- Information security policies and processes
- Internal security policy with an annual review.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Internal procedures: industry standard workflow and issue tracking software, change management, deployment to staging servers.
A mixture of automated and procedural testing is executed to ensure functionality and security plus regression testing. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Internal management of security, identifies threats from industry sources, news reports etc. We deploy all patches as soon as they are available - and in recent cases, before they are available for automated updates, seeking and deploying the manual patches.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Bespoke monitoring software working behind our firewall, analyzes and reports unusual events to key IT personnel. An event triggers an appropriate response immediately.
- Incident management type
- Undisclosed
- Incident management approach
-
Users report problems via our contact forms or by conventional communications channels.
Incident reports are communicated only to the reporter, via email.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
-
- Companies House
- Land Registry
Social Value
- Fighting climate change
-
Fighting climate change
N/A - Covid-19 recovery
-
Covid-19 recovery
N/A - Tackling economic inequality
-
Tackling economic inequality
N/A - Equal opportunity
-
Equal opportunity
We provide equal opportunity to all staff - Wellbeing
-
Wellbeing
We provide personal support and care to all staff.
The Company will comply with all appropriate legislation relating to leave for time off for dependants. Employees have the right to take a reasonable period of time off work to deal with an emergency involving a dependant.
Pricing
- Price
- £1,280 to £43,200 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Limited access to the full service.
Limited number of days per trial.
Criteria to be discussed by the supplier and customer. - Link to free trial
- https://orbisdb.com/videodemo