Atom Content Marketing Ltd

Business Advice Resource Centres

Business Advice Resource Centres are white-label websites of business advice content aimed at small businesses. There are six sites available to license covering start-up, marketing, legal, tech and finance issues, plus business sector information. Each site can be customised within the template and customers can also include their own content.


  • Articles, guides, FAQs, case studies, toolkits and checklists
  • News and blogs
  • Ongoing content maintenance processes
  • Access to Google Analytics to monitor engagement
  • Custom domain or sub-domain
  • Client branding and content
  • Access to CMS to edit and customise


  • Provide clients and prospects with online business support
  • Market your services
  • Add your own content eg events, articles etc
  • Customise with your branding
  • Add display ads
  • Drive newsletter sign-ups
  • Feature your advisers
  • Add your social media feeds
  • Embed calls-to-action within the content


£15,750 to £28,000 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

5 0 2 2 2 5 2 9 8 0 8 0 9 7 0


Atom Content Marketing Ltd Lisa Williams
Telephone: 07714243638

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Customisation limited to platform template
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 hours within working week (Mon-Fri, 9am-5pm)
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We provide an account manager and access to our production team who will provide support as required.
Support available to third parties

Onboarding and offboarding

Getting started
Online training and full documentation. Onsite training available if required.
Service documentation
End-of-contract data extraction
Data such as the user's own copy or blog can be extracted by the user and by Atom as required. At the end of the contract the client site is deleted from the Resource Centre platform and inaccessible thereafter.
End-of-contract process
At the end of the contract the client site is deleted from the Resource Centre platform. There is no additional cost associated with this.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All features available on both mobile and desktop
Service interface
Customisation available
Description of customisation
A range of customisation options available including layout, colours, logo, copy, featured content, calls to action banners, social media feeds, news, blogs and articles.
We provide access to the CMS along with helpful guides to edit and customise your own Business Advice Resource Centre/s.
Key staff will be granted access to customise.


Independence of resources
Hosting solution scalable as required


Service usage metrics
Metrics types
Google Analytics reports
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
Physical access control
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Other than content, there is no other 'data' uploaded to the system. For example we do not collect email addresses or other personal data. Users can extract their uploaded content directly from the CMS.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our hosting solution SLA guarantees 99.99% uptime. Maintenance updates may be required from time to time but these will be carried out outside of working hours and notified in advance.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
The service provides open access web browsing and secure access for administrator access. Role based access control.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
IT security is reviewed annually and regularly discussed with our IT support company Signal Networks.
Information security policies and processes
Employee onboarding process and training followed by regular reviews. We have a nominated DPO who is responsible for privacy and data protection. Policies available on company website.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our production team track all new components alongside our development team. All new components are subject to a rigorous testing and sign-off process.
Vulnerability management type
Vulnerability management approach
The underlying Drupal technology has a dedicated security team; Atom's development team pro-actively monitors security alerts and applies updates as needed.
Protective monitoring type
Protective monitoring approach
Potential compromises are proactively monitored by our development team and notified to our head of production. The potential compromise will be assessed immediately and dealt with accordingly. In the case of high-risk compromises these may be dealt with immediately by the development team without referral to the head of production.
Incident management type
Incident management approach
All incidents reported to head of online production by phone or email. Head of online production notifies development team and manages accordingly. All clients notified in writing (by email) of any significant incidents.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£15,750 to £28,000 a licence a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.