Maritime Domain Situational Awareness
Observation, Analysis and Alerting of vessel activity at sea
Features
- Real time reporting and visualisation
- Remote monitoring
- Autonomous alerting
- Multi-sensor fusion
- Computer Vision
- Radar Analysis
- EM Spectrum Analysis
- Remote sensor management and communication
- System integration and Smart Data
Benefits
- Vast sea areas are monitored with minimal human involvement
- Automated detection, classification and identification of maritime objects
- Shared domain awareness across many users
- Maritime C4ISR
- Cost effective maritime data
Pricing
£100,000 a licence a year
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at malcolm.glaister@siriusinsight.ai.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
9 8 1 0 2 1 6 1 6 1 5 8 4 6 4
Contact
Sirius Constellation Ltd
Malcolm Glaister
Telephone: 077 4062 5007
Email: malcolm.glaister@siriusinsight.ai
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- For real-time operation requires up to one hour maintenance window per day
- System requirements
- No specific licence required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 30 min response during working hours. Weekend and out of hours dependent on tasking.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Technical Support and Training provided within Contract
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite and Online Training is provided, with user documentation
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users will have accessed data throughout contract. Access to data ceases at contract end
- End-of-contract process
- Service terminates
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Tracks, Images and Vessel data may be accessed by API to multiple users.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customers can ingest data to existing data wharehouse or visualisation systems, or can chose to utilise a dedicated proprietary C2 platform.
Scaling
- Independence of resources
- Support and operational resource is scaled according to contract volume
Analytics
- Service usage metrics
- Yes
- Metrics types
- On request - user access levels, traffic volume
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via API and directly on request
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Dependent on tasking
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Provided on request
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- Provided on request
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Provided on request
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Provided on request
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Provided on request
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Provided on request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
- MODnet
Social Value
- Fighting climate change
-
Fighting climate change
The monitoring of vessels at sea can highlight vessels with illegal fuel types and identify, and respond to, environmental disasters. - Covid-19 recovery
-
Covid-19 recovery
Monitoring of vessels in transit or waiting for cargo is an important indicator of continuing fallout from Covid-19 related port closures - Equal opportunity
-
Equal opportunity
SiriusInsight is a equal opportunities employer
Pricing
- Price
- £100,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Access to trial data and systems for 1 month evaluation, depending on location
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at malcolm.glaister@siriusinsight.ai.
Tell them what format you need. It will help if you say what assistive technology you use.