theOblong Global Ltd

Mapcite PlugIns

Mapcite is a Location Intelligence software company specialising in helping individuals and organisations understand and exploit the spatial element of their data. Mapcite PlugIns are bringing this spatial understanding into your favourite BI tools.


  • Designed for non-specialist users
  • Connected to the data sources in your BI tool
  • Visualisations including pins and heatmap
  • Selectable map layers


  • An ability to explore your data spatially without specialist help
  • A better understanding of your data from a spatial perspective
  • Enabling more informed decision making


£75 per person per year

Service documents


G-Cloud 11

Service ID

2 7 8 4 4 0 5 8 2 9 3 1 4 0 2


theOblong Global Ltd

Julian Oates

07513 408556

Service scope

Software add-on or extension
What software services is the service an extension to
BI Tools as listed on our website including MS Excel and OpenText
Cloud deployment model
Public cloud
Service constraints
Mapcite's Excel PlugIn requires Excel 2010 (or later), windows 7 (or later) with IE8 (or later) installed
System requirements
Access is through a standard up to date internet browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond within 1 working day - Office hours, Monday to Friday, excl public holidays
User can manage status and priority of support tickets
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
Support is provided during UK office hours, Monday to Friday, excluding public holidays. Support requests should be sent by email to, detailing the problem and providing contact details. Support is provided on a fair usage basis.
Support available to third parties

Onboarding and offboarding

Getting started
Mapcite PlugIn software is designed for non-specialist users and does not require lengthy training. It is provided with a User Guide and short videos of how to use the product are available on the website. Additional training is available through the Technical Support services.

Mapcite PlugIns require data to be geocoded (i.e. have a latitude and longitude). Mapcite’s Excel PlugIn can be used to geocode data if this is required.
Service documentation
Documentation formats
  • PDF
  • Other
Other documentation formats
Simple Videos
End-of-contract data extraction
Users can download their data as CSV exports at any time during the term of the service, so no final data export is included as standard.
End-of-contract process

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
Whilst the user interface is designed to work with mobile devices, a suitable screen size is required to fully utilise the functionality
Service interface
Customisation available


Independence of resources
Mapcite PlugIns are designed to integrate with your BI tool as prescribed by your BI vendor.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
Other data at rest protection approach
Data security is managed by the host BI system
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported by drawing on the map around the data to be exported and selecting the export command.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
It will operate as an extension to your existing BI tool and will not change the way in which you connect to your BI tool.
Data protection within supplier network
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
The PlugIn is an extension to your existing BI tool and governed by the restrictions in place for that tool.

Availability and resilience

Guaranteed availability
Mapcite PlugIns are extensions to your BI tools, installed and operated on infrastructure running your BI Tools.
Approach to resilience
Outage reporting
There is no specific reporting

Identity and authentication

User authentication needed
User authentication
  • Username or password
  • Other
Other user authentication
Access is via username and password. However, if required, access can be locked down to specific IP addresses.
Access restrictions in management interfaces and support channels
Access is protected by username and password and permissions. If required, this can be locked down to specific IP addresses
Access restriction testing frequency
At least once a year
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Access is via username, password and permissions. However, if required, we can limit access to specific IP addresses.

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Mapcite PlugIns are offered as standard extensions to proprietary BI tools and outside our control.
Information security policies and processes
All security issues are reported to a Board Director and overseen by that Board Director until resolved. Any clients impacted by the issue will be contacted and kept appraised of the situation until resolved.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All components are version numbered.
Changes to systems are assessed for impact. Testing is based upon the extent and severity of the impact.
Vulnerability management type
Vulnerability management approach
Potential threats are assessed based upon their likelihood and impact.
Servers are patched on a monthly basis during the maintenance window
Software patches for the application would be released as required, dependent upon an assessment of the threat and its impact.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Potential compromises would be detected through vigilance of staff and reporting by clients. Automated monitoring is available at additional cost through our technical support team.
Potential compromises would be investigated immediately. This would include consulting with the Customer with regards the sensitivity of the data and might include the closure of access to the service, whilst the investigation continues.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents via the support email.
Reports are reviewed and users contacted for more detail where required
Incidents are investigated and repeating issues are resolved by the latest agreed process.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£75 per person per year
Discount for educational organisations
Free trial available
Description of free trial
Free trials are typically time limited versions of the full version. However, longer trials or free versions may be offered, where functionality is reduced in comparison with the paid version of the product.
Link to free trial

Service documents

Return to top ↑