Stredia

Stredia Team

Stredia Team is a performance enhancement tool that provides root cause analytics of positive team work factors. It shows a team how it can immediately begin to make improvements .

Features

  • Real time dashboards
  • On line data gathering
  • Instant qualitative and Quantitative reports

Benefits

  • Seven minute data gathering
  • Dashboard aids leader's decision making
  • Clear root cause analysis
  • Supports evidence based management

Pricing

£10 per user per 6 months

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

148548377852137

Stredia

Geoff Thomas

0845 838 5302

geoff.thomas@stredia.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints 99.99% availability
System requirements Client side Browser

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Within 24hrs
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels User Support included
Leader or manager support extra
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started On-site training
Service documentation No
End-of-contract data extraction Reports stored as PDF format
Spreadsheet of data supplied if requested
End-of-contract process All data handling is included. Consultancy is available if next steps are not clear.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Screen adapted
Accessibility standards None or don’t know
Description of accessibility Text rich data gathering. Low graphics version of report available.
Accessibility testing Results in analysis
API No
Customisation available Yes
Description of customisation Internal managers can adjust the organisational structures, issue paswords; edit and delete staff;

Scaling

Scaling
Independence of resources The system is designed with low user packet volume interaction with the server. Scalable serve model.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can export raw data as CSV files or reports as pdf files
Data export formats
  • CSV
  • Other
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability If 99.99% availability is breached then user's contact is extended by one week.
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Access restricted via username and password in SSL environment.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Presently working towards ISO 27001
Information security policies and processes Information security policy include in all staff induction.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach New modules are thoroughly tested for security implications before release. Any code changes are similarly tested. Regular reviews are undertaken of all modules.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Potential threats are assessed using information from Kaspersky Labs. If patches cannot be immediately deployed and the the threat is deemed 'extreme' under our policy then users are warned and a temporary suspension of service may ensue.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Regular penetration testing and analysis of results. Sharing of results with clients. Use of Red amber green RAG system to prioritise potential compromises and reactions.
Incident management type Supplier-defined controls
Incident management approach Incident management processes are overseen by a director.Incidents are reported via a web form. All incidents are logged and a daily incident log report is produced for the director. A copy of the incident log weekly digest can be requested.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £10 per user per 6 months
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A one month Trial period for up to ten users is avaiable

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑