Flex-S Survey System

Highly flexible online survey platform with backend rule-driven engine that combines the input data (and data from other sources) to automatically create highly personalised content such as html, pdf, etc. This content can be returned to the user as self-service output or used to drive business processes. No-code setup.


  • Highly flexible user-configurable survey and questionnaire platform
  • Rules-driven data transformation engine
  • Automated generation of personalised HTML and documents
  • No-code setup and management
  • Integration with CRM (eg HubSpot)
  • Customisable/brandable look and feel in front end survey platform


  • Automate complex processes that are driven by user interaction
  • Enable customers/users to self-serve content based on their stated needs
  • Create highly personalised content in response to user needs


£50 to £1500 per licence per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

4 6 2 2 1 4 8 4 4 3 3 1 4 8 6



Alan Cotterell

020 8064 1177


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
No constraints
System requirements
  • Broadband internet connection
  • Web browser, such as Chrome, FireFox, Edge, or Safari

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 hour response target on normal UK business days (excluding weekends).
User can manage status and priority of support tickets
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
We offer the same level of support to all customers: we aim to respond within 24 hours (our normal performance is much quicker than that). Issues are handled in the first instance by our customer services team, but technical issues are addressed by our engineering team and technically-oriented customers can deal directly with engineers if they prefer.
Support available to third parties

Onboarding and offboarding

Getting started
Users access online documentation to get started. We provide onsite and online training at extra cost.
Service documentation
Documentation formats
End-of-contract data extraction
Data is downloadable by users at any time throughout the duration of the contract.
End-of-contract process
Data is available for download until the contract ends in Microsoft Excel format. If data is required in a different format or help is required to migrate data to a different system, this is available at an additional cost.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The application functionality is the same across devices, with the layout of the application changing responsively to different screen and window dimensions.
Service interface
Customisation available
Description of customisation
We offer two levels of customizations: 1) Self-service settings, which includes, but is not limited to front-end page styling and design, the addition of custom data fields, and configuration of response notifications, and 2) Vendor-provided customisations, which may cover various aspects of the system, such as custom analytics, authentication requirements, and integration with 3rd party systems.


Independence of resources
The architecture of the system allows for hardware- and infrastructure-independent, customer-specific instances to be deployed on demand. Additionally, the system is hosted with an infrastructure-provider, who offers continuous resource upgrades.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The product's operational data can be exported via the application's backend interface on demand in the form of Excel spreadsheets or CSV documents. All account data can be requested through support and will be provided as an archive, containing spreadsheets and JSON documents.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other protection within supplier network
Not applicable

Availability and resilience

Guaranteed availability
99.9% availability of online services guaranteed. Refunds are provided as prorated credit on the account against the next billing cycle.
Approach to resilience
We use a third-party hosting provider. The data center has 24-hour security staff on site, two backup power generators, 24-hour network infrastructure monitoring and connections to two independent data carriers. More information is available upon request.
Outage reporting
Email alerts. Public API and dashboards are planned.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interface is restricted based on IP-address, as well as with a username and password. Support channels are password protected and provided by a third party.
Access restriction testing frequency
Management access authentication
  • Username or password
  • Other
Description of management access authentication
IP-address restrictions

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We follow industry best-practices and adhere to vendor recommendations when using third-party platforms, software and services. Our suppliers (eg hosting) are security certified. We take security seriously and responsibility for governance is held at the highest level in the company.
Information security policies and processes
Intraflex’s IT security policies are classified in three categories:
1)The security characteristics of the products developed by Intraflex:Our software follows the encryption, authentication, and authorization guidelines, as published in the official documentation of the software development frameworks we use.
2)The security of Intraflex’s infrastructure:We enforce strong password requirements, password expirations, and two-factor authentication, where available.
3)The security of the 3rd party components, frameworks, and tools used in the development of Intraflex’s products.We subscribe to all vendor-issued security issue notification bulletins and follow all patch, hotfix, and configuration advisories within one business day.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We monitor vendor-issued security bulletins and ensure we are utilizing only the latest versions of each component.
Vulnerability management type
Vulnerability management approach
We are subscribed for security bulletins with the vendors of all software products, which are imployed in the development and support of our product.
Protective monitoring type
Protective monitoring approach
Our incident response time is 8 hours.
Incident management type
Incident management approach
Users can report incidents via our support email address or our support ticketing system. We provide incident reports in the form of responses to the support ticket threads that have been opened.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£50 to £1500 per licence per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑