GB Group plc

GBG Loqate

Loqate is a real-time registration and data verification solution. The service allows you to capture and validate postal addresses and if desired, gain insight about that specific location e.g co-ordinates, building height or flood risks. Loqate can Validate Email addresses, landline, Bank Account details and mobile phone numbers.

Features

  • Intuitive user interface and search tools
  • Instant data verification
  • Enrich basic location data
  • Returns results in sub-second speed
  • Improves on boarding experience
  • Supports targeted marketing campaigns
  • Validate telephone numbers, email addresses to confirm if live
  • Builds great customer relationships
  • Provides quality location intelligence
  • Provides full global coverage

Benefits

  • Validates identities to support onboarding process
  • Improves overall cusomer experience
  • Provides valuable insight to support targeted marketing campaigns
  • Provides usable customer profiles
  • provides fast and accurate validation services
  • Offers global service accross 240 global territories

Pricing

£200 per user per year

  • Free trial available

Service documents

G-Cloud 11

280190081526953

GB Group plc

Geoff Bibby

01244 657333

geoff.bibby@gbgplc.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints The systems consuming GBG Loqate must be able to connect to HTTPS/Port 443 and also be TLS 1.2 compliant.
System requirements
  • HTTPS/Port443 Connection
  • Compatible Browser
  • Valid Licensed Credentials

User support

User support
Email or online ticketing support No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels 24/5 support (Mon-Fri)
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Online documentation
Training available on request
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction GBG don't hold data, user credentials will be deleted 30 days after contract end (or sooner by request)
End-of-contract process To be discussed with the client

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices No
Service interface No
API Yes
What users can and can't do using the API API provided access to most functionality available through the Portal.
Some exceptions will exist such as producing PDF reports.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Via the API the service can be blended into your own applications

Scaling

Scaling
Independence of resources Capacity planning and management are part of the GBG Loqate Service provision. The usage and consumption of resources is regularly monitored and additional infrastructure can be introduced should usage approach capacity.

Analytics

Analytics
Service usage metrics Yes
Metrics types Self Service reports are available for administrators
Reporting types Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Via PDF reports or CSV file
Data export formats
  • CSV
  • Other
Other data export formats PDF
Data import formats Other
Other data import formats User types in Search Criteria

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Target Availability is 99.9%
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Available on request
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 07/05/2019
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The GBG Information Security Policy combines the development, delivery, management and maintenance of secure infrastructure and applications, in support of GBG Identity Management offerings, and specifically Verification and Assurance. Within GBG, the Chief Information Security Officer (CISO) has overall accountability for Information Security and it is the responsibility of the CISO to make the appropriate provisions for establishing controls to ensure adherence to the GBG Information Security Management System. The CISO also provides the Executive Management Team and GBG Shareholders with an Information Security review at the end of the financial year. The Company Secretary chairs the quarterly Internal Controls Board, and is the main document signatory for GBG. The Company Secretary is also head of GBG’s Legal team, who are responsible for ensuring compliance to all relevant legislation.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Available on request
Vulnerability management type Undisclosed
Vulnerability management approach Available on request
Protective monitoring type Undisclosed
Protective monitoring approach Available on request
Incident management type Undisclosed
Incident management approach Processes are in place.
Available on request

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £200 per user per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Included: Subject to client requirement
Not Included: Subject to client requirement
Limited Time Period: Typically 4 weeks

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑