GB Group plc

GBG Loqate

Loqate is a real-time registration and data verification solution. The service allows you to capture and validate postal addresses and if desired, gain insight about that specific location e.g co-ordinates, building height or flood risks. Loqate can Validate Email addresses, landline, Bank Account details and mobile phone numbers.


  • Intuitive user interface and search tools
  • Instant data verification
  • Enrich basic location data
  • Returns results in sub-second speed
  • Improves on boarding experience
  • Supports targeted marketing campaigns
  • Validate telephone numbers, email addresses to confirm if live
  • Builds great customer relationships
  • Provides quality location intelligence
  • Provides full global coverage


  • Validates identities to support onboarding process
  • Improves overall cusomer experience
  • Provides valuable insight to support targeted marketing campaigns
  • Provides usable customer profiles
  • provides fast and accurate validation services
  • Offers global service accross 240 global territories


£200 per user per year

  • Free trial available

Service documents


G-Cloud 11

Service ID

2 8 0 1 9 0 0 8 1 5 2 6 9 5 3


GB Group plc

Geoff Bibby

01244 657333

Service scope

Software add-on or extension
Cloud deployment model
Hybrid cloud
Service constraints
The systems consuming GBG Loqate must be able to connect to HTTPS/Port 443 and also be TLS 1.2 compliant.
System requirements
  • HTTPS/Port443 Connection
  • Compatible Browser
  • Valid Licensed Credentials

User support

Email or online ticketing support
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
24/5 support (Mon-Fri)
Support available to third parties

Onboarding and offboarding

Getting started
Online documentation
Training available on request
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
GBG don't hold data, user credentials will be deleted 30 days after contract end (or sooner by request)
End-of-contract process
To be discussed with the client

Using the service

Web browser interface
Application to install
Designed for use on mobile devices
Service interface
What users can and can't do using the API
API provided access to most functionality available through the Portal.
Some exceptions will exist such as producing PDF reports.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Via the API the service can be blended into your own applications


Independence of resources
Capacity planning and management are part of the GBG Loqate Service provision. The usage and consumption of resources is regularly monitored and additional infrastructure can be introduced should usage approach capacity.


Service usage metrics
Metrics types
Self Service reports are available for administrators
Reporting types
Regular reports


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via PDF reports or CSV file
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
Other data import formats
User types in Search Criteria

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Target Availability is 99.9%
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Available on request
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
The GBG Information Security Policy combines the development, delivery, management and maintenance of secure infrastructure and applications, in support of GBG Identity Management offerings, and specifically Verification and Assurance. Within GBG, the Chief Information Security Officer (CISO) has overall accountability for Information Security and it is the responsibility of the CISO to make the appropriate provisions for establishing controls to ensure adherence to the GBG Information Security Management System. The CISO also provides the Executive Management Team and GBG Shareholders with an Information Security review at the end of the financial year. The Company Secretary chairs the quarterly Internal Controls Board, and is the main document signatory for GBG. The Company Secretary is also head of GBG’s Legal team, who are responsible for ensuring compliance to all relevant legislation.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request
Vulnerability management type
Vulnerability management approach
Available on request
Protective monitoring type
Protective monitoring approach
Available on request
Incident management type
Incident management approach
Processes are in place.
Available on request

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£200 per user per year
Discount for educational organisations
Free trial available
Description of free trial
Included: Subject to client requirement
Not Included: Subject to client requirement
Limited Time Period: Typically 4 weeks

Service documents

Return to top ↑