QuantSpark Analytics

Location Intelligence (LOCINT) Tool

QuantSpark's location intelligence platform offers deep insights and predictive intelligence across space using a data-driven geospatial model. Informing and targeting communications campaigns, identifying community groups, and location optimisation for retail or other operations is simplified using data visualisation and open-source intelligence modelling.


  • Integration of open-source intelligence with geospatial modelling
  • High-quality, interactive data visualisation
  • Compare regions on key metrics
  • Select inputs of interest to build custom visuals
  • Search, discovery, and analytics capabilities
  • Identify hubs and communities
  • Strategic analytics support
  • Optimise location choice


  • Open-source and comprehensive data integration
  • Immediate actionable insights
  • Intuitive user-interface
  • Processed and tidied open-source data
  • Fully hosted web service and centrally stored data
  • Informs messaging to drive response rates
  • Adaptable to different projects, campaigns, or businesses
  • Informs location optimisation to drive demand and footfall


£10000 to £250000 per instance per year

  • Education pricing available

Service documents

G-Cloud 11


QuantSpark Analytics

Adam Hadley

020 300 84318


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints QuantSpark's location intelligence software is provided as a fully hosted web service, which can be accessed via any web browser.
System requirements Access to web browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Business hours are Monday to Friday, 9am to 6pm.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Technical advice and support is provided during standard business hours. Support ranges from basic technical support to administrative assistance and strategic support depending on client requirements.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started During the on-boarding phase QuantSpark will tailor and configure the data inputs and the platform to client requirements. This includes providing technical support on using the tool and offering advice on best-practice. User training can be delivered onsite, online or a combination of both.
Service documentation No
End-of-contract data extraction Any specific requirements for data extracts can be discussed at the beginning of the contract to ensure data security and robustness of the process.
End-of-contract process QuantSpark will engage with the user at the end of, and throughout, the process to address any specific requirements that arise. The end-of-contract processes will ensure minimal disruption to a continued service.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Customisation available Yes
Description of customisation QuantSpark's platform can be customised to ensure suitability to your organisations campaign or objectives.
The data inputs and modelled outcomes of the product can be customised to reflect the interests of your organisation.
This will be completed by QuantSpark during the requirements phase of on-boarding.


Independence of resources The architecture of the service is robust and has been designed to ensure that high concurrency rates do not impact the performance of the platform for any users.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Data can be exported from the platform by the user using in-built features.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99% availability year-round, with the exceptions of downtime for required maintenance and updates
Approach to resilience We apply industry standards to AWS deployment including multi site backups and redundancy.
Outage reporting Outages will be reported to the user via email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels We use 2-factor authentication and physical credential verification where required.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Aligns closely with ISO/IEC 27001
Information security policies and processes The business has an Information Security Policy and Data Protection Policy. In terms of best practice, QuantSpark has a cyber-security and information security consultancy on retainer who are working with the business’s cyber resilience, data compliance and information security. The business follows the ISO27001 principles and is looking to gain certification by the middle of 2020.
Heads of department report to either the CEO or the COO and the business’s Data Protection Officer monitors and audits policy and process compliance.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We deploy industry project management and risk analysis tools, e.g. Atlassian and Jira. In addition, we maintain a weekly risk register that incorporates feedback from our on-site deployed engineers. Furthermore, we use Atlassian help desk to log feature requests, appropriately prioritise and share change management updates.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Our systems are continually being updated and tested to have the latest versions of the software, to avoid any possible vulnerability. At the same time, any issue founded by our engineers is immediately reported to our internal teams, vendors and providers to alert them and act accordingly with the situation and create a new patch if is required.
Protective monitoring type Supplier-defined controls
Protective monitoring approach System event monitoring is used to facilitate the identification, classification and analysis of potential security incidents. Any security-related incident is classified as a severe and is escalated accordingly and actioned immediately. Different techniques and processes are employed to mitigate and recover service integrity, depending on the nature of the incursion. Further details are available on request.
Incident management type Supplier-defined controls
Incident management approach Our first point of contact is a multidisciplinary support pool who are in charge of giving the first diagnostic to the issue following a preset list of checking procedures. In case the problem is beyond the knowledge database, a ticket is created and escalated to the next tier of more specialized engineers. Once the problem is solved the ticket is analyzed to detect and prevent future incident; then classified and stored as case use in our knowledge base.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £10000 to £250000 per instance per year
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑