MSP Gather Ltd

Mobile App Data Capture

Secure mobile data capture app for any kind of data collection from business cards to customer data and images. Ideal for any face to face engagement between department and customer/contact. Used for sales, marketing, events, research, indemnities replacing pen and paper.

Features

  • Use your own device (Apple or Android mobile)
  • Offline capability (Capture data offline)
  • Built in Compliance (GDPR compliant and editable permissions)
  • Multi Lingual (works across any language)
  • Eliminate Duplicates (data validation as standard)
  • Guest Lists (Download lists for events from your systems)
  • QR Code Scan (secure data transfer)

Benefits

  • OCR (Convert business card images into editable data)
  • Tag events & Campaigns (Measure ROI)
  • Save Time (reduce manual processing time costs)
  • 99% Accurate (OCR technology and data validation)
  • Reduce costs (no specialist hardware or internet needed)
  • Real time (Use the data you collect in real-time)

Pricing

£99 to £399 per licence per month

Service documents

Framework

G-Cloud 11

Service ID

5 3 4 1 5 1 9 5 2 2 4 9 4 3 8

Contact

MSP Gather Ltd

Hugo Spalding

01273712830

hugo.spalding@gathercapture.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Our software integrates seamlessly, via API, to any CRM/MAP or ERP system.
Cloud deployment model
  • Private cloud
  • Community cloud
Service constraints
None.
System requirements
  • IOS or Android OS (App)
  • Smartphone or Tablet (App)
  • Browser (Portal)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Full SLA available upon request.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Full support summary with problem management, service levels and system performance available upon request.
Support available to third parties
No

Onboarding and offboarding

Getting started
Onboarding commences with a client specification. Upon client approval we proceed to configuration and testing. UAT involves client and is only promoted live upon UAT sign-off. Full training is provided pre-go live and support is in place for duration of contract.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Via our Portal (secure Username and Password). Data can also be sent via secure .SFTP via our support desk.
End-of-contract process
Solution will be disabled and content deleted. Collected data will be securely transferred to client and all data purged from database, SAN storage and other. All documents and specifications will be securely stored or deleted upon client request.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
App is downloadable from the Apple and Android store(s) to any smartphone or tablet.

The browser provides access to the portal (data) for data capture which the app syncs data to.
Service interface
No
API
Yes
What users can and can't do using the API
Our platform cam integrate with any API and 'push' the data direct to single entities, tables or quarantine area as designated by the recipient system such as CRM/MAP or ERP.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Fully managed service where the Gather team provide a specification, or scope, and implement the configuration via a structured build->test->UAT->Live release process.

Scaling

Independence of resources
All users are assigned dedicated cloud services ensuring that performance degradation is eliminated with scale by volume of users or global location of users.

Analytics

Service usage metrics
Yes
Metrics types
Full suite of service metrics available from unique ID assignment to time, location, campaign, event, user, region, device and full service logs. Available in real-time dashboards, via API feed or as custom/bespoke reports.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Standard functionality is a .CSV export from a HTTPS secure browser. Options for export include custom export (to CRM/MSP/ERP sstem import). FTP data delivery or integration to API or via Web Services.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XML
  • TXT
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
Management of the cloud based systems is secured behind a firewall with enforced IP restrictions. When at rest in our cloud infrastructure it is behind our Tier1 firewall providing security. When in transit the data is encrypted using the latest TLS standards. This encryption is a secondary layer that sits inside the device Sandbox, offering complex encryption and security.

Availability and resilience

Guaranteed availability
Full SLAs available n request consisting of 99% service uptime (cloud) and full problem resolution summary with acknowledgement, response and resolution SLAs.
Approach to resilience
Full information, including network schematic, available upon request.
Outage reporting
We distribute email alerts from our support desk.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Full Information Security Manual (ISMS) available upon request.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Region hierarchy including access permissions. Full Information Security Manual (ISMS) available upon request.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QMS International Ltd
ISO/IEC 27001 accreditation date
01/03/2018
What the ISO/IEC 27001 doesn’t cover
Full Information Security Manual (ISMS) available upon request.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Full Information Security Manual (ISMS) available upon request.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Full Information Security manual (ISMS) available upon request.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Full Information Security Manual (ISMS) available upon request.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Full Information Security Manual (ISMS) available upon request.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Full Information Security Manual (ISMS) available upon request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£99 to £399 per licence per month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trial available via our website for Gather Lite. gather Pro and Enterprise can be demonstrated via web demo.
Link to free trial
Www.gathercapture.com

Service documents

Return to top ↑