LiveDataset is a configurable data management platform to build custom online applications for efficient business processes. Replace legacy or spreadsheet-based systems. Simplify information collection. Build high-quality, robust business processes, from small teams to thousands of users. Make it easy for people to work with data.
- Configurable data management platform for building online applications.
- Build your own applications or use our expert consultants.
- Replaces legacy systems and unreliable spreadsheet-based processes.
- Spreadsheet-like data input, editing, deletion is fully auditable.
- Database-like data organisation, integrity, resilience, views, and role-based permissioning.
- Agile prototyping: reconfigure business process workflows in a few clicks.
- Secure. ISO-27001 accredited. Multiple independent audits per year.
- Import and export data (CSV, JSON, XLS, WebQuery)
- API to integrate with other systems
- Responsive user interface supports modern browsers on desktop and mobile.
- Make your business processes more efficient and streamlined.
- Take control of your data with secure role-based permissions.
- Replace legacy systems and unreliable spreadsheet-based processes.
- Ensure your data is reliable and well organized.
- Trust your data. Know it’s consistent and fully auditable.
- Work with organised data as easily as using spreadsheets.
- Implement quickly. Weeks not months. Months not years.
- Easily adjust processes in a few clicks when requirements change.
- No coding required (apart from integration with other systems).
- Deploy to a small team or to thousands of users.
£20 per user per month
0207 702 3777
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
The LiveDataset service is updated every other Friday at about 10:30am. The update typically completes within a minute.
Aside from this update, all planned maintenance is completed outside UK business hours, typically during a weekend.
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Critical Issues: within 0.5 hours (target fix in 4 hours)
Non-critical issues impacting service: within 0.5 business hours
Routine issues: within 1 business day
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Critical Issues: within 0.5 hours (target fix within 4 hours)
Non-critical issues impacting service: within 0.5 business hours
Routine issues: within 24 business hours
Emergency support outside regular UK business hours can only be initiated by telephoning the supplied support number.
If required, enhanced support levels can be agreed for individual clients.
|Support available to third parties||No|
Onboarding and offboarding
Online user documentation is available for all LiveDataset users, online training is available upon request. Advice and support is available via email or phone.
Where Krescendo professional services have been engaged, a full service is provided including configuration, data migration, and where required customised user documentation and training materials.
|End-of-contract data extraction||
Users can extract data they are allowed to access by exporting to a spreadsheet (.xlsx) a comma separated file (.csv) or a tab-delimited file (.txt)
Users with account admin permissions can export all data from all datasets.
Developers can use the LiveDataset API to extract all data from all datasets.
|End-of-contract process||Database backups can be provided if required, however the system offers full data export features. When instructed the service/account will be disabled, and after an agreed period of time the service/account will be deleted.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||No functional differences. Responsive design techniques have been applied so some parts of the application will be rendered differently to make efficient use of the available space.|
|Accessibility standards||None or don’t know|
|Description of accessibility||
Measures that have been taken to achieve a certain level of accessibility include:
- enforcing a text contrast ratio of 4.5:1
- alternative text for all images
- support high contrast mode rendering everything clearly
- keyboard navigation to all mouse-accessible features
- minimum text size of 12px
- legibility remains to a magnification of 200% or more
|Accessibility testing||We have worked with an external workers’ committee to ascertain that we meet a specified level of accessibility.|
|What users can and can't do using the API||There is an API available for importing and exporting data to and from LiveDataset. The API is REST based over HTTPS. Authentication is token based per Dataset/View. Authentication tokens can be generated to live forever or with an expiry/TTL.|
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||
LiveDataset can be easily configured using its browser-based user interface to design views of each dataset that specify which parts of the dataset different roles can access, how the data is presented and the types of changes they are allowed to make. Similarly users can be assigned role-based access to the appropriate views. Configuring LiveDataset does not require technical skills, but requires high-level access so is normally restricted to a small number of administrators.
Customising LiveDataset is a technical task, using the LiveDataset API for data input/output. For example the LiveDataset API may be used for data feeds from other systems, providing data to a data warehouse / BI reporting tool, or for bespoke calculations. Customising LiveDataset requires coding skills and can be done by the customer, by a Krescendo professional services consultant or by an authorised third party.
|Independence of resources||Real time capacity and performance monitoring tools are used to ensure there is enough infrastructure to satisfy demand. Although the standard offering will be running on shared infrastructure, the application and/or database for customers that start to outgrow the shared platform can be easily moved onto dedicated infrastructure (a custom pricing model will be applied).|
|Service usage metrics||Yes|
Account metrics: number of datasets
Dataset usage metrics for each dataset: number of entries, number of users, number of attached files, file size
Reports are based on daily snapshots of the volume of data and users in your account. These snapshots are available for download:
Current month, Last 3 months, Last 6 months, Last 12 months
|Reporting types||Real-time dashboards|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
Users select the menu option "Export entries..." to export data by downloading to a text file or an Excel spreadsheet.
Users can also create webqueries to directly query data in a LiveDataset dataset.
See https://help.livedataset.com/export for more information.
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
Service Level Agreement for Availability is 99.7%
>99.7% uptime: no credit
90.0% - 99.7% uptime: 2% credited on next invoice per 1% below SLA
<90.0% uptime: 50% credited on next invoice
Service Level Agreement for Resolution Times is provided in Terms and Conditions document
|Approach to resilience||
Krescendo’s production servers are hosted in secure datacenter facilities in London. A primary production setup is mirrored, machine for machine, in a secondary secure datacenter located more than 15 miles apart. All electronic data held on the production servers is replicated in near-time to the disaster recovery environment. Daily checks are carried out by Krescendo personnel to ensure that the replication channels are operating correctly. Within the disaster recovery facility, replicated databases are also backed up every 24 hours, to mitigate the potential impact of rare events that trigger data corruption.
Further details are available on request.
|Outage reporting||Outages are reported via email alerts.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Infrastructure: only Systems Administrators have full access to hosted servers. Day-to-day access for development, QA, and support is strictly limited with read only permissions for databases and logs. Only Systems Administrators can elevate privileges for individuals so that planned or emergency changes can be executed, but time limited. Software: only a small number (no more than 5) dedicated Application Administrators can see an manage all data, however these privileges should only be exercised under exception support circumstances or for system initialisation.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||You control when users can access audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Less than 1 month|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||24/06/2017|
|What the ISO/IEC 27001 doesn’t cover||Everything is covered.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All changes to service must go though a change management process, which is a required control for ISO 27001 certification. A change request must be submitted and approved before a change can be made. The change control system requires details of the change, a risk assessment of the impact of the change, rollback and testing details, and communication requirements. The person raising the change cannot approve their own change.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Weekly vulnerability scans are performed using HackerTarget. Any Critical patches are applied immediately (out of hours), and all servers are patched at least quarterly to resolve any other issues.
We also receive regular industry feeds from technology suppliers and independent providers.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Infrastructure: Industry standard open source monitoring tools are installed and configured on all servers for "real time" intrusion and rootkit detection. Container level firewall software is also installed on all servers with external login access to protect against brute force login attacks (this is an additional layer to the hardware Firewalls). In-house scripts are deployed to alert on privileged user access to servers and databases. Software: password policies are configured, which include rules for complexity, expiry, and lockout.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Incidents are either reported internally or by communication from the end users. All Incidents are logged in an Incident Management system and re-mediation prioritised based on Severity (Urgency/Impact). All Incidents are associated with a Problem, which can only be closed out once a full RCA has been produced. All Security Incidents are escalated to senior management, who will liaise with the customer before, during, and after resolution. Where requested or deemed necessary breach details and full RCA details will be broadcast. Incident reports can be produced on request.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£20 per user per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
A free trial of LiveDataset is available for up to 30 days.
This includes the full features of LiveDataset including support, online documentation, and if requested online training.
|Link to free trial||https://livedataset.com/start/|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Terms and conditions document||View uploaded document|