Flex-S Survey System

Highly flexible online survey platform with backend rule-driven engine that combines the input data (and data from other sources) to automatically create highly personalised content such as html, pdf, etc. This content can be returned to the user as self-service output or used to drive business processes. No-code setup.


  • Highly flexible user-configurable survey and questionnaire platform
  • Rules-driven data transformation engine
  • Automated generation of personalised HTML and documents
  • No-code setup and management
  • Integration with CRM (eg HubSpot)
  • Customisable/brandable look and feel in front end survey platform


  • Automate complex processes that are driven by user interaction
  • Enable customers/users to self-serve content based on their stated needs
  • Create highly personalised content in response to user needs


£50 to £1500 per licence per month

  • Education pricing available

Service documents

G-Cloud 11



Alan Cotterell

020 8064 1177


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No constraints
System requirements
  • Broadband internet connection
  • Web browser, such as Chrome, FireFox, Edge, or Safari

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 hour response target on normal UK business days (excluding weekends).
User can manage status and priority of support tickets No
Phone support No
Web chat support No
Onsite support Yes, at extra cost
Support levels We offer the same level of support to all customers: we aim to respond within 24 hours (our normal performance is much quicker than that). Issues are handled in the first instance by our customer services team, but technical issues are addressed by our engineering team and technically-oriented customers can deal directly with engineers if they prefer.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Users access online documentation to get started. We provide onsite and online training at extra cost.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Data is downloadable by users at any time throughout the duration of the contract.
End-of-contract process Data is available for download until the contract ends in Microsoft Excel format. If data is required in a different format or help is required to migrate data to a different system, this is available at an additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The application functionality is the same across devices, with the layout of the application changing responsively to different screen and window dimensions.
Service interface No
Customisation available Yes
Description of customisation We offer two levels of customizations: 1) Self-service settings, which includes, but is not limited to front-end page styling and design, the addition of custom data fields, and configuration of response notifications, and 2) Vendor-provided customisations, which may cover various aspects of the system, such as custom analytics, authentication requirements, and integration with 3rd party systems.


Independence of resources The architecture of the system allows for hardware- and infrastructure-independent, customer-specific instances to be deployed on demand. Additionally, the system is hosted with an infrastructure-provider, who offers continuous resource upgrades.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach The product's operational data can be exported via the application's backend interface on demand in the form of Excel spreadsheets or CSV documents. All account data can be requested through support and will be provided as an archive, containing spreadsheets and JSON documents.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network Other
Other protection within supplier network Not applicable

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% availability of online services guaranteed. Refunds are provided as prorated credit on the account against the next billing cycle.
Approach to resilience We use a third-party hosting provider. The data center has 24-hour security staff on site, two backup power generators, 24-hour network infrastructure monitoring and connections to two independent data carriers. More information is available upon request.
Outage reporting Email alerts. Public API and dashboards are planned.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Management interface is restricted based on IP-address, as well as with a username and password. Support channels are password protected and provided by a third party.
Access restriction testing frequency Never
Management access authentication
  • Username or password
  • Other
Description of management access authentication IP-address restrictions

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We follow industry best-practices and adhere to vendor recommendations when using third-party platforms, software and services. Our suppliers (eg hosting) are security certified. We take security seriously and responsibility for governance is held at the highest level in the company.
Information security policies and processes Intraflex’s IT security policies are classified in three categories:
1)The security characteristics of the products developed by Intraflex:Our software follows the encryption, authentication, and authorization guidelines, as published in the official documentation of the software development frameworks we use.
2)The security of Intraflex’s infrastructure:We enforce strong password requirements, password expirations, and two-factor authentication, where available.
3)The security of the 3rd party components, frameworks, and tools used in the development of Intraflex’s products.We subscribe to all vendor-issued security issue notification bulletins and follow all patch, hotfix, and configuration advisories within one business day.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We monitor vendor-issued security bulletins and ensure we are utilizing only the latest versions of each component.
Vulnerability management type Undisclosed
Vulnerability management approach We are subscribed for security bulletins with the vendors of all software products, which are imployed in the development and support of our product.
Protective monitoring type Undisclosed
Protective monitoring approach Our incident response time is 8 hours.
Incident management type Undisclosed
Incident management approach Users can report incidents via our support email address or our support ticketing system. We provide incident reports in the form of responses to the support ticket threads that have been opened.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £50 to £1500 per licence per month
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑