Ai Recruitment Technologies


Horsefly provides accurate talent market analytics to drive a competitive advantage on time/cost to hire, workforce planning and strategic business decisions.


  • Real-time supply and demand talent analytics
  • Employer competitors for specific candidate markets
  • Career path projections
  • Top universities for graduate or emerging talent markets
  • Keywords (job titles / transferable skills) for optimised attraction strategies.
  • Visualisation of all analytics pulled from multiple global data sources
  • Heat-map of candidate density by country, region or city location
  • Compensation reports including average salary for alignment and benchmarking.
  • Gender insights to develop your diversity plans
  • Unite around accurate data for forward-thinking strategic workforce planning.


  • Talent availability informs where is best to base a role
  • Make smart decisions on which locations to advertise your opportunities
  • Top talent competitors will inform your talent acquisition strategy
  • Develop valuable graduate programmes by partnering with the right universities
  • Align and meet gender diversity targets
  • Create high performing talent-attraction plans by understanding target talent language
  • Communicate insights across the business with intuitive visualisations
  • Work towards evidence-based decisions and don’t rely on gut instincts.
  • Develop language for an effective brand presence reflecting your culture
  • Widen the available talent pool by understanding key transferable skills


£22400 per licence per year

Service documents


G-Cloud 11

Service ID

3 4 9 0 0 7 6 1 6 0 5 4 8 1 6


Ai Recruitment Technologies

Ian Ellahee

0207 193 0220

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Horsefly is a robust and intuitive cloud system. It is subject to ongoing maintenance in order to optimise the user experience. Users are given advance notice of any such maintenance, and the work is undertaken at a specified time to limit any potential disruption.
System requirements Browser version

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Weekdays 9am till 5pm within 1 hour

All other times within 24 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AAA
Web chat accessibility testing We have not conducted interface testing with users of assistive technology.
Onsite support Yes, at extra cost
Support levels We provide a tiered range of support options from our UK-based customer support centre. All in-bound calls are answered promptly within 60 seconds and undergo a comprehensive case management process. The first line of support is our customer service centre which receives all in-bound emails and support tickets. This level 1 support tier will be able to troubleshoot and resolve most issues within 1 hour. If the issue is not capable of resolution at first line support, then it is escalated to second line support who will undertake a detailed investigation to diagnose the problem and recommend a solution. Second line support personnel also have access to a specialist engineer support service if required. If second tier cannot resolve the customer's issue, then it is escalated further for root cause analysis and fix. At all stages in the process, the customer is kept regularly updated and informed about progress by email, telephone call, and/or web-conference as appropriate.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Full onsite and online training available.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Report from Customer Success Team.
End-of-contract process Access to the platform is provided on a revolving subscription basis. Upon expiry of the contract, access is removed and final user statistics will be supplied.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Service interface Yes
Description of service interface Horsefly's talent market analytics interface provides users with real-time data metrics from multiple national & international employment resources, combining 350M+ candidate profiles from social media, private sector recruitment portals and government sources.

Utilising the intuitive service interface, users can tailor Horsefly's metrics analysis tools to provide multi-layered analysis of current trends in talent and recruitment markets; proactively develop workforce planning and recruitment strategies; tailor your candidate offer to become an employer of choice; and, extract accurate supply, demand, salary and benefits data.

All customers benefit from both online and onsite individual support from our dedicated Customer Success team.
Accessibility standards None or don’t know
Description of accessibility [TBC]
Accessibility testing Non-text content is only for visual formatting. This would allow it to be ignored by assistive technology. Where the customer’s hardware and/or browser allows, Horsefly will adapt when switched to assistive colours.

Horsefly is responsive and, without assistive technology, text can be zoomed to 200 percent without loss of content or functionality. Where supported by hardware and/or browser, Horsefly will allow speech to text input on all text boxes.

We have not conducted interface testing with users of assistive technology.
Customisation available Yes
Description of customisation Reports can be customised to meet the requirements of users within certain parameters.


Independence of resources Real time monitoring of server loads with pre-set alerts on critical components, for example, CPU load, memory load etc.  Two servers are in use at any one time to ensure load balance.


Service usage metrics Yes
Metrics types User search
Reporting types
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach PDF, PNG, JPG
Data export formats Other
Other data export formats
  • PDF
  • PNG
  • JPEG
  • SVG
Data import formats Other

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 99.98% uptime with scheduled and notified maintenance schedules.
Approach to resilience Available on request.
Outage reporting API - Fail Notifications
Email and Text Alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Permissions to management interfaces and support channels regulated based on role, organisational unit and appropriate need for access. All user activity is recorded and logged for audit and security purposes.
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials (Whole Network | Single Site) Registration No. QGCE/2749.

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach AWS provides several security capabilities and services to increase privacy and control network access. These include:Network firewalls built into Amazon VPC, and web application firewall capabilities in AWS WAF let you create private networks, and control access to your instances and applications; encryption in transit with TLS across all services; and, connectivity options that enable private, or dedicated, connections from your office or on-premises environment
Information security policies and processes We have several IS policies in place that are tailored to industry standards. These are mainstreamed throughout the company and compliance is measured through established internal controls and procedures, all of which are fully documented. Further details are available upon request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our hosting provider maintains documented operational procedures for both infrastructure operations and customer-facing support functions. Newly provisioned infrastructure undergoings appropriate testing procedures to limit exposure to hardware failure, whilst documented procedures and configuration version controls provide protection from errors during configuration. Changes to configuration are controlled by a defined technical change management policy including impact risk assessment, customer sigh off and back out planning.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Our operational management team ensure that we keep up to date with industry specific security alerts and advice through multiple fora and sources (industry press, clients, UK National Cyber Security Centre) and action taken as required to maintain the security and integrity of our technology or operational processes.
Protective monitoring type Supplier-defined controls
Protective monitoring approach In accordance with our Cyber Essentials accreditation (Registration No. QGCE/2749), we apply mechanisms and trained specialists to analyse threats, vulnerabilities, and potential impacts which are associated with business activities. This allows us to
• Detect and correct any malicious behaviour
• Facilitate a rapid and effective response to recover from any identified incident or threat
Incident management type Supplier-defined controls
Incident management approach Responses to incidents consist of a 5 step data security breach process:

(i) Identification and Assessment;
(ii) Containment and Recovery;
(iii) Risk Assessment;
(iv) Notification; and,
(v) Evaluation and Response.

Users can report incidents via email, telephone and web chat.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £22400 per licence per year
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑