LiveDataset is a configurable data management platform to build custom online applications for efficient business processes. Replace legacy or spreadsheet-based systems. Simplify information collection. Build high-quality, robust business processes, from small teams to thousands of users. Make it easy for people to work with data.


  • Configurable data management platform for building online applications.
  • Build your own applications or use our expert consultants.
  • Replaces legacy systems and unreliable spreadsheet-based processes.
  • Spreadsheet-like data input, editing, deletion is fully auditable.
  • Database-like data organisation, integrity, resilience, views, and role-based permissioning.
  • Agile prototyping: reconfigure business process workflows in a few clicks.
  • Secure. ISO-27001 accredited. Multiple independent audits per year.
  • Import and export data (CSV, JSON, XLS, WebQuery)
  • API to integrate with other systems
  • Responsive user interface supports modern browsers on desktop and mobile.


  • Make your business processes more efficient and streamlined.
  • Take control of your data with secure role-based permissions.
  • Replace legacy systems and unreliable spreadsheet-based processes.
  • Ensure your data is reliable and well organized.
  • Trust your data. Know it’s consistent and fully auditable.
  • Work with organised data as easily as using spreadsheets.
  • Implement quickly. Weeks not months. Months not years.
  • Easily adjust processes in a few clicks when requirements change.
  • No coding required (apart from integration with other systems).
  • Deploy to a small team or to thousands of users.


£20 per user per month

Service documents

G-Cloud 10



Krescendo Team

0207 702 3777

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints The LiveDataset service is updated every other Friday at about 10:30am. The update typically completes within a minute.

Aside from this update, all planned maintenance is completed outside UK business hours, typically during a weekend.
System requirements
  • Internet access
  • Chrome, Edge, Firefox, Internet Explorer 9+, Opera or Safari

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical Issues: within 0.5 hours (target fix in 4 hours)

Non-critical issues impacting service: within 0.5 business hours

Routine issues: within 1 business day
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Critical Issues: within 0.5 hours (target fix within 4 hours)
Non-critical issues impacting service: within 0.5 business hours
Routine issues: within 24 business hours

Emergency support outside regular UK business hours can only be initiated by telephoning the supplied support number.

If required, enhanced support levels can be agreed for individual clients.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Online user documentation is available for all LiveDataset users, online training is available upon request. Advice and support is available via email or phone.

Where Krescendo professional services have been engaged, a full service is provided including configuration, data migration, and where required customised user documentation and training materials.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Users can extract data they are allowed to access by exporting to a spreadsheet (.xlsx) a comma separated file (.csv) or a tab-delimited file (.txt)

Users with account admin permissions can export all data from all datasets.

Developers can use the LiveDataset API to extract all data from all datasets.
End-of-contract process Database backups can be provided if required, however the system offers full data export features. When instructed the service/account will be disabled, and after an agreed period of time the service/account will be deleted.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No functional differences. Responsive design techniques have been applied so some parts of the application will be rendered differently to make efficient use of the available space.
Accessibility standards None or don’t know
Description of accessibility Measures that have been taken to achieve a certain level of accessibility include:
- enforcing a text contrast ratio of 4.5:1
- alternative text for all images
- support high contrast mode rendering everything clearly
- keyboard navigation to all mouse-accessible features
- minimum text size of 12px
- legibility remains to a magnification of 200% or more
Accessibility testing We have worked with an external workers’ committee to ascertain that we meet a specified level of accessibility.
What users can and can't do using the API There is an API available for importing and exporting data to and from LiveDataset. The API is REST based over HTTPS. Authentication is token based per Dataset/View. Authentication tokens can be generated to live forever or with an expiry/TTL.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation LiveDataset can be easily configured using its browser-based user interface to design views of each dataset that specify which parts of the dataset different roles can access, how the data is presented and the types of changes they are allowed to make. Similarly users can be assigned role-based access to the appropriate views. Configuring LiveDataset does not require technical skills, but requires high-level access so is normally restricted to a small number of administrators.

Customising LiveDataset is a technical task, using the LiveDataset API for data input/output. For example the LiveDataset API may be used for data feeds from other systems, providing data to a data warehouse / BI reporting tool, or for bespoke calculations. Customising LiveDataset requires coding skills and can be done by the customer, by a Krescendo professional services consultant or by an authorised third party.


Independence of resources Real time capacity and performance monitoring tools are used to ensure there is enough infrastructure to satisfy demand. Although the standard offering will be running on shared infrastructure, the application and/or database for customers that start to outgrow the shared platform can be easily moved onto dedicated infrastructure (a custom pricing model will be applied).


Service usage metrics Yes
Metrics types Account metrics: number of datasets
Dataset usage metrics for each dataset: number of entries, number of users, number of attached files, file size
Reports are based on daily snapshots of the volume of data and users in your account. These snapshots are available for download:
Current month, Last 3 months, Last 6 months, Last 12 months
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users select the menu option "Export entries..." to export data by downloading to a text file or an Excel spreadsheet.

Users can also create webqueries to directly query data in a LiveDataset dataset.

See for more information.
Data export formats
  • CSV
  • Other
Other data export formats
  • Spreadsheets (.xlsx)
  • Tab-separated files (.txt)
Data import formats
  • CSV
  • Other
Other data import formats
  • Spreadsheet (.xls or .xlsx)
  • Tab-separated (.txt)

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Service Level Agreement for Availability is 99.7%
>99.7% uptime: no credit
90.0% - 99.7% uptime: 2% credited on next invoice per 1% below SLA
<90.0% uptime: 50% credited on next invoice

Service Level Agreement for Resolution Times is provided in Terms and Conditions document
Approach to resilience Krescendo’s production servers are hosted in secure datacenter facilities in London. A primary production setup is mirrored, machine for machine, in a secondary secure datacenter located more than 15 miles apart. All electronic data held on the production servers is replicated in near-time to the disaster recovery environment. Daily checks are carried out by Krescendo personnel to ensure that the replication channels are operating correctly. Within the disaster recovery facility, replicated databases are also backed up every 24 hours, to mitigate the potential impact of rare events that trigger data corruption.

Further details are available on request.
Outage reporting Outages are reported via email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Infrastructure: only Systems Administrators have full access to hosted servers. Day-to-day access for development, QA, and support is strictly limited with read only permissions for databases and logs. Only Systems Administrators can elevate privileges for individuals so that planned or emergency changes can be executed, but time limited. Software: only a small number (no more than 5) dedicated Application Administrators can see an manage all data, however these privileges should only be exercised under exception support circumstances or for system initialisation.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 24/06/2017
What the ISO/IEC 27001 doesn’t cover Everything is covered.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Information security policies and processes are defined in compliance with ISO 27001. The Company Policies include (but are not strictly limited to): ISMS Policy: including objectives, review program, and awareness. Security Policy: including the computing environment, physical and environmental security, access to the computing environment, forensic analysis, operational contingency, third party management, and incident handling. Data Protection Policy: including confidentiality, personal information, information related to children, information classification, information storage, decommissioning, and data retention. Privacy Policy: including commitment to privacy, collected information, use of information, commitment to data security, commitment to children's privacy, accessing information, cookie policy, and changes to privacy policy. Change Management Policy. Incident & Problem Management Policy. Asset Management Policy. Acceptable use of resources Policy. Health and Safety Policy. Clear Desk Policy.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes to service must go though a change management process, which is a required control for ISO 27001 certification. A change request must be submitted and approved before a change can be made. The change control system requires details of the change, a risk assessment of the impact of the change, rollback and testing details, and communication requirements. The person raising the change cannot approve their own change.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Weekly vulnerability scans are performed using HackerTarget. Any Critical patches are applied immediately (out of hours), and all servers are patched at least quarterly to resolve any other issues.
We also receive regular industry feeds from technology suppliers and independent providers.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Infrastructure: Industry standard open source monitoring tools are installed and configured on all servers for "real time" intrusion and rootkit detection. Container level firewall software is also installed on all servers with external login access to protect against brute force login attacks (this is an additional layer to the hardware Firewalls). In-house scripts are deployed to alert on privileged user access to servers and databases. Software: password policies are configured, which include rules for complexity, expiry, and lockout.
Incident management type Supplier-defined controls
Incident management approach Incidents are either reported internally or by communication from the end users. All Incidents are logged in an Incident Management system and re-mediation prioritised based on Severity (Urgency/Impact). All Incidents are associated with a Problem, which can only be closed out once a full RCA has been produced. All Security Incidents are escalated to senior management, who will liaise with the customer before, during, and after resolution. Where requested or deemed necessary breach details and full RCA details will be broadcast. Incident reports can be produced on request.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £20 per user per month
Discount for educational organisations No
Free trial available Yes
Description of free trial A free trial of LiveDataset is available for up to 30 days.
This includes the full features of LiveDataset including support, online documentation, and if requested online training.
Link to free trial


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑