The Liveboard is a topic-based cloud service that allows users to create and share digital content boards – that are called liveboards - with other users. Thus, users can post content to liveboards anytime, anywhere using a computer or mobile device connected to the Internet


  • The liveboards are stored securely in the cloud.
  • Access from any connected device to add content.
  • Liveboards store text messages, documents or files.
  • Any file type allowed when posted from a computer.
  • Attach video or photos – via mobile device.
  • Liveboards can be personal or shared.
  • Liveboards are ideal for keeping personal daily logs.
  • Liveboards are shared by redeeming (QR) codes.
  • Invitation to share boards by email or SMS.
  • Search facility integrated with Liveboard to filter content.


  • The Liveboard sits on a secure cloud platform.
  • The search facility allows filtering liveboards and locating content.
  • Stream all audio/videos posted on a liveboard.
  • Play / Pause / Stop audio or video attachment.
  • Receive notifications about new posts on a liveboard.
  • Daily summary of liveboard activity over email.
  • No need to create an account if not wished.
  • Content is displayed in a user-friendly way.
  • Liveboard also posts web links.
  • Useful for consumers, business and education alike.


£0.00 to £8.49 per unit per month

Service documents

G-Cloud 10




+34 963 939 900


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints NONE
System requirements
  • Internet connected required to access the service.
  • A minimum 3G/4G/LTE/WiFi data connectivity is required
  • Access to user's Liveboard is provided via client applications.
  • There is no Web access to liveboard content, only apps
  • Windows supported: Windows XP, 7 and 8 (desktop version only).
  • IOS supported (iPhone, iPad, iPod touch): iOS 8 and higher.
  • Android supported: 4.x and above.
  • Mac OS X from version 10.6 (Snow Leopard) onwards.
  • Licenses offer 50 / 250 / 1000 GB storage space.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We provide:
• 7x24 h for web and e-mail access
• 8h to 17h, Monday to Friday support for phone calls (Central European Time)
The response times we offer depends on the serverity of the incident
For critical priority incidents (Critical impact on business) the response time is 4 hours.
For high priority incidents (Significant impact on business) the response time is 12 hours
For medium priority incident (Minimum impact on the business) the response time is 24 hours
For low priority incidents (No impact on business) the response time is 48 hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels We provide an unique support level for our service, standard support. This support is included in the service price without additional cost.
The response times of the standard support depends on the serverity of the incident:
For critical priority incidents (Critical impact on business) the response time is 4 hours.
For high priority incidents (Significant impact on business) the response time is 12 hours
For medium priority incident (Minimum impact on the business) the response time is 24 hours
For low priority incidents (No impact on business) the response time is 48 hours
We provide a technical account manager or cloud support engineer for Customers that purchase our service when the sum of what they pay per month is superior to £2000.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The service will be activated the day after the Contract is signed and once the payment confirmation is received. The last step in the activation process will be to download, install and configure the software for the different platforms. The download and installation process is very easy and intuitive but nevertheless a user guide will be provided. After successful installation, the user will simply need to click / tap on the application icon and the Wizard will commence asking the user to create a username and password although it is not mandatory.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The users can download their data any time before the contract ends from their desktop application clients (Windows or Mac) or their mobile devices (Android or iOS).
End-of-contract process Five days before the end of the Contract, the Customer will be informed of the expiration date and asked to download his data - unless the service is renewed. One day before the expiration date is reached, a new notification is sent asking the Customer for the service urgent renewal and warning him about service unavailability. One business day after that, the access to data will be lost. During that period (or previously) the Customer can explicitly request for a free extra-persistence of data for a 5 calendar day period, after which the data will be completely erased. This complimentary extra service is only to let Customer verify the consistency of his downloaded data, but without normal access to the service. Then, if previously requested, the Customer could audit the proof of its destruction during 10 days after the effective day of destruction. Customer will pay for the audit expenses. If the Customer finds any problem with his downloaded data during the extra-persistence period, he could decide to renew the service for an additional month at his own expenses to have enough time to duly terminate the service.

Using the service

Using the service
Web browser interface No
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The mobile interface has been designed with the same look & feel as the desktop interface. They also share the same capabilities and any divergence is the direct result of the limitations imposed by the operative system. For instance, the desktop interface allows users to upload any type of file to the Liveboard while iOS mobile interface only allows the uploading of photos or videos from the local disk. The desktop interface contemplates the uploading of files either by drag and drop or by using a file explorer while the mobile interface only uses a file explorer.
Accessibility standards None or don’t know
Description of accessibility The service is accessed via mobile or desktop clients. They are compliant with the “WCAG 2.0 Success Criterion 2.4.6 Headings and labels” criterion.
Accessibility testing None
Customisation available No


Independence of resources We are monitoring system threshold and we will increase infrastructure resources once current resources utilisation exceeds 85 %


Service usage metrics Yes
Metrics types Dashboard metrics and reports with real-time dashboards.
Reports on request.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Cloud Computing Platform

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach Our Information Security Management System is ISO 27001 certified. We have specific procedures for data at rest protection:
The pysical access to the hard disk is protected by Data Center biometric access control.
We have perimeter-based defenses such as firewalls and anti-virus programs.
And when it is necessary we encrypt hard disk information.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The users can directly download their data from their desktop client to their personal computers. Alternatively, they can save their data from the mobile clients to the local disk.
Data export formats Other
Other data export formats Data is exported in their original format.
Data import formats Other
Other data import formats
  • Any file type can be uploaded from computers.
  • Photos and videos can be uploaded from iOS devices.
  • Any file type can be uploaded from Android devices.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability The Service Level Agreement (SLA) we offer on this service is 99,995%, where the Service Availability is calculated according to the following formula:
% Availability = ((Service committed hours) – (Service down hours)) / (Service committed hours)
o Service committed hours: Amount of hours where service infrastructures will be available apart from maintenance windows.
o Service down hours: Amount of hours where service infrastructures won´t be available apart from maintenance windows.
o Availability: Percentage of committed service hours where service infrastructures are available.
This Service Availability is measured each month.
In case of non-compliance with our offered SLA we offer the following Financial Recompense Model:
We apply a discount on next month quota in case of service levels are not meet as follows:
• 5% discount for meeting service level under 95% (measured over last month medium).
• 2% discount for meeting service level under 98% (measured over last month medium).
Approach to resilience Our service is hosted in our Tier IV Data Center design certified by The Uptime Institute. This guarantees a high level of reliability and availability.
We consider for our data center resilience the natural threats (is built considering earthquake, flooding, winds, extreme climatic temperatures, etc), human and security threats (the data center is secure against unauthorized access, vandalism, etc.), environmental threats (multiple power supplies, redundancy communications, redundacy in refrigeration system, fire protection system, etc...) and our ISO 20000 an ISO 27001 certification for Management, Operational and Technical Controls.
More detailed information is available on request.
Outage reporting Our service is monitored by different applications. We have monitors that check the status of processes, services, daemons, devices, access, response times, capacity, etc. In case of an outage or incident, the monitoring system automatically generates an alert to our incident managemet system, and informs as well to the customer by email.
Our service desk starts to work on resolution of the incident, and periodically informs the customer about the status of the incident and the expected resolution time.
If during a month the service has had any outages, we send the Customer a report with detailed information about it.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Management interfaces and support channels are only available for users with the right profile and permissions with a 2-factor authentication
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 IQNet and AENOR, Spanish Association for Standardization and Certification
ISO/IEC 27001 accreditation date 13/12/2017
What the ISO/IEC 27001 doesn’t cover We comply with all the requirements of the ISO/IEC 27001 standard
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Directive 95/46/EC, GDPR Regulation (EU) 2016/679

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Our security policy aims to protect our information assets against all types of threats, whether internal or external, deliberate or accidental.
Information security is defined as the preservation of the following characteristics:
Confidentiality: it is guaranteed that the information is accessible only to those persons authorized to have access to it.
Integrity: safeguards the accuracy and completeness of information and processing methods.
Availability: It ensures that authorized users have access to the information and related resources when required.

In our Security Policy we define:
• The security policy, where is defined the vision and goals of our Security Management System.
• The security regulations, that are guides to action on which the procedures are based, and that identify at a high level the regulations that should be considered.
• The security process, that develop more specific aspects of the regulations.For example, we have specific security processes for security incident management, Security audits, Risk Assessment, Physical access to the data center. Logical access, etc.
If the security policies are not followed, any premeditated or negligent violation of the security policies and norms will be sanctioned according to the mechanisms enabled by the legal, contractual and corporate regulations.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Service and Data Center operations are ISO 27001 and ISO 20000 certified.
Configuration management process is based in a CMDB. We:
• Registry Configuration Items (CI)
• Control, information and changes to CIs, so we maintain the state and the lifecycle of them.
• We implement de audit process of the CIs.
In relation with the change management process, each Request for Change (RFC) is evaluated in a CAB meeting and is assessed for potential impact in each process (capacity, security, business impact, etc…). If change is approved, is scheduled for implementation, and finally a post implementation review is done.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Our vulnerability management process includes:
• Determine criticality of the assets, the owners, the frequency of scanning, establishes timelines for remediation;
• The discovery and inventory of assets on the network;
• The discovery of vulnerabilities
• The reporting and remediation of discovered vulnerabilities.
We use EAR / PILAR (Environment for the Analysis of Risk) for assess potential threats to our services
We get information about potential threats from INCIBE (Spanish National Cybersecurity Institute), CCN-CERT (Spanish national cryptological center) and vulnerabilities reports and patches information of our assets providers.
For critical threats we deploy a patch as soon as possible.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We continually scan our infrastructure and systems looking for unusual patterns of behaviour. We use Intrusion Detection Systems for detect and automatically alert us about potential compromises.
This alert are managed by our 24x7 Security Operating Centre (SOC) that can respond in a few minutes to an incident.
We have an Intrusion Prevention System and for the rules and configuration we have made it responds immediately.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Our incident management process is under the ISO 20000 and ISO 27000 certification. The objective is to restore the service as soon as possible.
Incident management is based on a ticketing tool that allows us to record, classify, escalate, manage the state and manage SLAs compliance.
Our Service Desk is a three level support team. We have pre-defined processes and Incident Management Work Instruction that are step by step instrucctions for common and known incidents and for workarounds.
We provide monthly incident reports to the customer by email.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £0.00 to £8.49 per unit per month
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑