Planbox Imaginatik Limited

Agile Work Innovation

Planbox Imaginatik offers an all-one-in cloud-based solution to manage all your innovation activities. Crowdsource, discover, collect, develop, evaluate, manage and experiment on ideas from your workforce, customers, partners and suppliers. Our agile innovation management platform employs advanced searching, artificial intelligence, and machine learning to aid information discovery and idea creation


  • Software solution covering the full lifecycle from imagination to innovation
  • Crowd vote for their favourite ideas
  • Comprehensive reporting and data analytics
  • Facility to engage with external partners and suppliers
  • Employee recognition and rewards management
  • Gamification, leaderboards and recognition management
  • Customisable business rules driven workflow and notification
  • Idea evaluation, prioritisation and investment appraisal
  • Manage activities in a single system of record for innovation
  • Integration with complementary platforms - SharePoint, Yammer, CRM, etc.


  • Ensure great ideas don't fall through the cracks
  • Identify and develop small incremental improvements in key business areas
  • Motivate staff by involving them in business success
  • Connect employees with the needs of customers, partners and suppliers
  • Maximise the return on investments
  • Discover new technologies, business models and partnering opportunities
  • Optimise a wide range of business activities and processes
  • Seed ideas for exciting new products, services and solutions
  • Capture ideas that will increase capacity and productivity
  • Dramatically raise levels of employee engagement


£10000 per instance per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

4 0 3 5 7 1 9 8 9 5 5 3 6 3 4


Planbox Imaginatik Limited

Nathan Jacob

44 7899 770 081

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints No
System requirements Client must simply have one of the supported web browsers

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical (4 hour resolution/response)
- Entire system not accessible
- Emails not being sent
- System bug impacting broad user base

High (8 hour resolution/response)
- System performance issues
- User locked out of system
- System bug impacting individual or small user base

Medium (24 hour resolution/response)
- Portions of system not accessible
- Reports not accessible
- Administration functions not accessible
- Search engine not accessible

Low (48 hour resolution/response)
- Data updates
- Cost savings/avoidance amount updates
- Changes a submitter on an idea

For more information please review our SLA (service level agreement) at
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Planbox offers unparalleled support to create the best user experience possible and ensure the highest uptime possible. We maintain business continuity for enterprises running mission-critical innovation processes by pro-actively preventing issues. Support is offered in multiple, tiered support levels which are available to ensure an enterprise-grade customer experience. Planbox will provide a dedicated Account Manager with years of experience managing innovation programs for some of the world’s largest and most innovative organizations. They will work with the client to ensure that we understand their program goals and that we can tailor our services accordingly. Our subscription offers you access to our support portal and includes guides, best practices and how to's to maximize the use of your subscription.
Our standard Silver subscription will provide you with 24/7 Support with access to a support specialist during working business hours and 500 GB of Data Storage.
Our upgraded Gold Subscription package will provide you with an account manager for up 75 hours of professional services, accelerated support ticket processing and a set of cloud technology benefits which include a sandbox environment, and 1 TB of storage.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started As part of the implementation, we offer extensive administrator training that covers all the administration functions. Planbox has adopted a train-the-trainer model; therefore, Planbox includes training of 3 to 5 business days to one or many of Sadara's dedicated innovation contributors. This training can be offered online via Web-based live training sessions with the Professional Service team or our services team can do on-site training on-demand. We have developed very specific training programs that add value at whichever stage our customer is in within their innovation journey.
We have various webinars to show off new features and functionalities. We also have specific webinars scheduled throughout the year in partnership with Leading Innovators and Analysts. The topics include: how to plan your innovation objectives, how to build a business case for innovation management and how to manage your innovation portfolio amongst many others. An admin guide is also supplied as part of the training material. We can also work with you to create training material and learning content above and beyond what is provided as part of our standard content.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data is backed up on a daily basis. When the contract ends, the final backup of data can be provided to the client.
End-of-contract process The price of the contract includes all data retention and destruction policies at no extra charge. Customer data stored in the Planbox cloud platform will be retained as long as the client maintains an active subscription. No customer-data is automatically purged from the system. Planbox will take reasonable steps to ensure proper data destruction (such that any customer information is rendered unusable and unreadable) when it is no longer needed to deliver its services. In the event of the termination or expiration of a customer agreement, all customer data is deleted within sixty (60) days following termination. Upon request, Planbox will provide written certification that all such customer information has been deleted.
For more info:

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The platform is fully responsive in design and web-based which means it can run on any desktop or mobile device, any operating system, and most browsers. All elements within each page are sized based on the dimensions of the device's screen. Furthermore, we have a mobile application available on iOS and Android that replicates the user experience from our web platform.
Service interface Yes
Description of service interface Our platform is based on an HTML and javascript rich front-end.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing All elements of all pages have been tested against the following HTML 508 checklist and comply with all WCAG 2.1 standards:
What users can and can't do using the API Planbox provides a comprehensive REST-like web API which lets you do anything. We believe so strongly in an open API that we built Planbox itself around the API. Anything the web application can do, you can do (better). Using the Planbox Innovation Management Platform SDK (a strongly-typed .NET class library), you can easily interact with the API with full code completion and documentation at your fingertips. Planbox Innovate's API consists of multiple distinct endpoints (like the user endpoint or authentication endpoint) which accept standard HTTP GET, POST, and DELETE requests. For example, you can retrieve a list of users in Planbox Innovate by calling GET /latest/users, or submit an idea by calling POST /latest/ideas with the idea. These are called REST methods because they conform to the standard REST philosophy. Some endpoints also provide special ad-hoc methods; for example, you can retrieve the current authenticated user by calling GET /latest/users.current.

All methods are included in the client SDK, so you don't need to research the API structure or available endpoints. For example, you can log in to Planbox Innovate and invite a user in three lines.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Users have complete control over the look and feel of your portal page, the challenge page, and the idea page as it is built on HTML5 while also giving you access to making all the necessary modifications as necessary, via the Admin Panel.

Furthermore, Planbox is able to automate the workflow via our Workflow Manager and Business Rules engine. These two features work in tandem in order to facilitate the automation of the user's process flow, while making sure ideas are always handled in an expedited fashion, based on your configuration. The business rules engine is easily configured using simple conditional logic written in plain English (IF THIS THEN THAT methodology), along with giving users the ability to set up very simple rules in the early stages of their deployment, and moving towards more complex ones as the culture of innovation grows within the organization.

Planbox also comes with a reporting engine that allows users to build reports from the ground up. It gives users access to all the data sources, out of the box fields and custom fields, so they have the ability to create the right reports for all their needs.


Independence of resources Dedicated server


Service usage metrics Yes
Metrics types Planbox acts as Innovation portfolio management solution as it can assess and rank ideas based on specific metrics captured within the system across all levels of the business and capture all relevant information on user activity within the platform and display it all in a visually meaningful way. This can be achieved by creating the appropriate forms with the corresponding field types that would enable you to capture such information, which then can be run through the reporting engine to give you the desired results. Engagement, Velocity, Cost analysis, gap analysis, ROI reports, are all possible among others.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach All data can be exported to Excel with the click of a button.
The export option can be enabled for users from the Admin Settings menu. After the feature has been enabled, users will see an export button on all pages that showcase exportable data.
By clicking on on the Request Export button, an email will be sent to the user who has made the request. The email will contain a link to CSV download the file. Typically this email takes about 1 to 3 minutes to generate.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Please see SLA:
Approach to resilience We have a full set of security protocols in place and ensure we apply the industry best practices when it comes to securely monitoring our solution and tracking any security threats. Furthermore, we apply the same stringent standards when it comes to developing our world-class solution by following web standards such as OWASP. As part of the monitoring standards in place, we enable the use of the Microsoft Azure Security Center and screening. Our servers are hosted on Microsoft Azure (Azure). Azure offers world class security and reliability for their cloud offering. Learn more about security at Azure:
Outage reporting All outage reporting methods are available. We can make service reports available through public dashboards or API as well as sending email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Planbox enables you to create all kinds of different user levels, each with a high level of granularity with regards to permissions and level of access to the platform, from admins, super-admins, super-users, reviewers, etc. In the same vein, tasks are all defined based on the specifics of your workflow, which our professional services will implement for you.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 British Standards Institute (BSI)
ISO/IEC 27001 accreditation date 29/11/2011
What the ISO/IEC 27001 doesn’t cover See:
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 19/06/2017
CSA STAR certification level Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover See:
PCI certification No
Other security certifications Yes
Any other security certifications SOC2 Certification

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Internally: SOC2
Our data Centers: View Azure website for detailed list:
Information security policies and processes Security Council has ultimate responsibility for information security within the company. More specifically, it is responsible for ensuring that Planbox complies with relevant external requirements. The Council is also responsible for:
- Ensuring that users are aware of this policy;
- Seeking adequate resources for its implementation;
- Monitoring compliance;
- Conducting regular reviews of the policy, having regard to any relevant - - Changes in legislation, organizational policies and contractual obligations;
- Ensuring there is clear direction and visible management support for security initiatives.
Due to Planbox's decentralized structure, every team leader is responsible for information security within their own team. They must ensure that the team has adhered to the company's information security policy to meet its own particular needs, consistent with the requirements of this global policy. Team leaders should identify their own information security requirements and provide a management framework for meeting those requirements.
Specific roles and responsibilities for information security within each team are clearly identified.
Team leaders must approve any policies that impact security, and ensure that it is implemented based on the guidelines of the Security Council and kept under regular review.
For more info:

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Planbox Cloud DevOps performs changes to cloud infrastructure, operating software, product software, and supporting application software to maintain operational stability, availability, security, performance, and service delivery of Planbox Cloud. Planbox follows formal change management procedures to provide the necessary review, testing, and approval of changes prior to deployment in Planbox Cloud production environment.

Changes made through change management procedures include system and service maintenance activities, upgrades and updates, and Customer specific changes. Planbox Cloud Change Management procedures are designed to minimize service interruption.

Please see link for more info:
Vulnerability management type Supplier-defined controls
Vulnerability management approach The degree of security control required depends on the sensitivity or critical nature of the information. The first step in determining the appropriate level of security, is a process of risk assessment, in order to identify and classify the nature of the information held and the adverse possible consequences of security breaches.

Risk assessment is first carried out by team leaders. Where appropriate, information assets are labeled and handled according to their importance and sensitivity.

Information security risk assessments are repeated periodically and carried out as required during the operational delivery and maintenance of the company's infrastructure, systems, and processes.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Planbox takes advantage of the Microsoft Azure Security Center to continuously monitor service availability and performance. Any issues detected by the monitoring system is logged and the appropriate notifications are sent to designated Planbox Devops team members.

The monitoring system, tightly integrated with the Microsoft Azure system, will take some actions autonomously given some types of alerts such as low performance, intrusion detection and poor system health.

For more info:
Incident management type Supplier-defined controls
Incident management approach For detailed information see:

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £10000 per instance per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial The free version of our software includes an innovation portal to collect ad hoc ideas and run challenges in a single community. Our solution includes one standard workflow and a standard reporting engine which can be deployed for a time period of 14 days.

Service documents

Return to top ↑