Flex-S

Flex-S Survey System

Highly flexible online survey platform with backend rule-driven engine that combines the input data (and data from other sources) to automatically create highly personalised content such as html, pdf, etc. This content can be returned to the user as self-service output or used to drive business processes. No-code setup.

Features

  • Highly flexible user-configurable survey and questionnaire platform
  • Rules-driven data transformation engine
  • Automated generation of personalised HTML and documents
  • No-code setup and management
  • Integration with CRM (eg HubSpot)
  • Customisable/brandable look and feel in front end survey platform

Benefits

  • Automate complex processes that are driven by user interaction
  • Enable customers/users to self-serve content based on their stated needs
  • Create highly personalised content in response to user needs

Pricing

£50 to £1500 per licence per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

4 6 2 2 1 4 8 4 4 3 3 1 4 8 6

Contact

Flex-S

Alan Cotterell

020 8064 1177

alan@flex-s.net

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No constraints
System requirements
  • Broadband internet connection
  • Web browser, such as Chrome, FireFox, Edge, or Safari

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 hour response target on normal UK business days (excluding weekends).
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We offer the same level of support to all customers: we aim to respond within 24 hours (our normal performance is much quicker than that). Issues are handled in the first instance by our customer services team, but technical issues are addressed by our engineering team and technically-oriented customers can deal directly with engineers if they prefer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Users access online documentation to get started. We provide onsite and online training at extra cost.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data is downloadable by users at any time throughout the duration of the contract.
End-of-contract process
Data is available for download until the contract ends in Microsoft Excel format. If data is required in a different format or help is required to migrate data to a different system, this is available at an additional cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The application functionality is the same across devices, with the layout of the application changing responsively to different screen and window dimensions.
Service interface
No
API
No
Customisation available
Yes
Description of customisation
We offer two levels of customizations: 1) Self-service settings, which includes, but is not limited to front-end page styling and design, the addition of custom data fields, and configuration of response notifications, and 2) Vendor-provided customisations, which may cover various aspects of the system, such as custom analytics, authentication requirements, and integration with 3rd party systems.

Scaling

Independence of resources
The architecture of the system allows for hardware- and infrastructure-independent, customer-specific instances to be deployed on demand. Additionally, the system is hosted with an infrastructure-provider, who offers continuous resource upgrades.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The product's operational data can be exported via the application's backend interface on demand in the form of Excel spreadsheets or CSV documents. All account data can be requested through support and will be provided as an archive, containing spreadsheets and JSON documents.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
Not applicable

Availability and resilience

Guaranteed availability
99.9% availability of online services guaranteed. Refunds are provided as prorated credit on the account against the next billing cycle.
Approach to resilience
We use a third-party hosting provider. The data center has 24-hour security staff on site, two backup power generators, 24-hour network infrastructure monitoring and connections to two independent data carriers. More information is available upon request.
Outage reporting
Email alerts. Public API and dashboards are planned.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interface is restricted based on IP-address, as well as with a username and password. Support channels are password protected and provided by a third party.
Access restriction testing frequency
Never
Management access authentication
  • Username or password
  • Other
Description of management access authentication
IP-address restrictions

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow industry best-practices and adhere to vendor recommendations when using third-party platforms, software and services. Our suppliers (eg hosting) are security certified. We take security seriously and responsibility for governance is held at the highest level in the company.
Information security policies and processes
Intraflex’s IT security policies are classified in three categories:
1)The security characteristics of the products developed by Intraflex:Our software follows the encryption, authentication, and authorization guidelines, as published in the official documentation of the software development frameworks we use.
2)The security of Intraflex’s infrastructure:We enforce strong password requirements, password expirations, and two-factor authentication, where available.
3)The security of the 3rd party components, frameworks, and tools used in the development of Intraflex’s products.We subscribe to all vendor-issued security issue notification bulletins and follow all patch, hotfix, and configuration advisories within one business day.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We monitor vendor-issued security bulletins and ensure we are utilizing only the latest versions of each component.
Vulnerability management type
Undisclosed
Vulnerability management approach
We are subscribed for security bulletins with the vendors of all software products, which are imployed in the development and support of our product.
Protective monitoring type
Undisclosed
Protective monitoring approach
Our incident response time is 8 hours.
Incident management type
Undisclosed
Incident management approach
Users can report incidents via our support email address or our support ticketing system. We provide incident reports in the form of responses to the support ticket threads that have been opened.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£50 to £1500 per licence per month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑