Intuitive cloud based digital signage platform, suitable for both internal and external communications. Can integrate with and display data from a large number of systems, including reporting and business intelligence platforms and employee social networks.
- Digital signage
- Remote display management
- Real-time updates
- Branded content layouts
- Integration with external data providers
- Live and on-demand video playback
- Content scheduling
- Location based and localisable content
- Fine-grained permissions and approval system
- Intuitive interface
- Easily and instantly share rich communications across your entire organisation
- Quickly manage content on the move
- Combine local content with organisation-wide content with ease
- Keep displays fresh with dynamic content feeds
- Ensure content is always on brand
- Communicate with colleagues who have no access to company IT
- Prepare content ahead of time
- Instantly update all screens with a single click
£180 to £240 per device per year
- Education pricing available
- Free trial available
5 5 8 9 1 1 2 5 0 6 1 3 5 0 5
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||No applicable constraints|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
We aim to respond to all tickets within 30 minutes during UK business hours, or within 12 hours at other times.
24/7 telephone support is available for urgent enquiries related to service availability.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.1 AA or EN 301 549|
|Web chat accessibility testing||Web chat provided by intercom.io. See here for details: https://www.intercom.com/blog/messenger-accessibility/|
Support is included within the standard licence agreement at no extra cost. A technical account manager will be assigned to assist with deployment, in-life troubleshooting, and issue resolution.
End user support is available through all previously mentioned support channels, and by means of an online user guide.
|Support available to third parties||Yes|
Onboarding and offboarding
We offer training either onsite or as an online webinar, and also provide a range of self-guided resources including an online knowledge-base, and in-app product tours.
Additional technical documentation is available on request to assist with systems integration and advanced networking tasks.
|End-of-contract data extraction||Users can extract their data by contacting their account manager and requesting this service.|
Users may request export of their data free of charge within a 60 day period following the contract end date. Users will still be able to access the system during this time, but will not be able to create new content, and any screens registered to the account will stop displaying content.
After this 60 day period (or earlier, if requested), user access to the system will be revoked, and all data deleted.
There are no additional charges associated with a contract ending.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||All features are accessible on mobile.|
|Description of service interface||Online content management system accessed through a web browser. The intuitive design makes creating great looking content easy, through use of a WYSIWYG slide editor interface. Our cutting-edge template system allows users to quickly create content that adheres to internal brand guidelines, using assets such as fonts, logos and colour palettes.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Our service is designed primarily to enable users to create visual content designed to be displayed on digital screens. Unfortunately this activity is not suited to users with a high level of visual impairment and therefore we are not able to accommodate this type of user.|
|Description of customisation||
The service is highly customisable:
Administrators of the service can define user roles that will enable or disable certain features for non-administrator users.
Our development team are able to implement custom integrations with third party data providers, and can design and develop templates which conform to brand guidelines, displaying data or messaging to our customers' specification.
|Independence of resources||System resources are automatically scaled according to the demand on the service. This includes both the number of active licences and the current rate of user requests to our infrastructure.|
|Service usage metrics||Yes|
The real time status of each screen can be monitored through the online dashboard within the content management system.
Reports for content and user activity metrics, as well as screen uptime for a given period can be provided on demand.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Users can export their data by contacting their account manager and requesting this service.|
|Data export formats||
|Other data export formats||JSON|
|Data import formats||Other|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||We offer an uptime SLA of 99.99%. This excludes maintenance periods during which screens will continue to display cached content.|
|Approach to resilience||
We use redundancy at every level of our infrastructure with automatic failover.
More detailed information is available on request.
|Outage reporting||We display outage information on the platform itself, as well as provide email notifications for critical incidents.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||IP whitelisting can be enabled on request.|
|Access restrictions in management interfaces and support channels||
The management interface uses roles and permissions checks for every request to ensure that users are authorised to access or modify a particular resource.
Support channels require verification of the user's identity (either manually or automatically) before discussion of any non-public information.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Less than 1 month|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||We are currently working towards ISO27001 certification.|
|Information security policies and processes||
We have a range of infosec and acceptable use policies that are documented and communicated to all employees including policies for:
- Clean desk
- Acceptable use
- Use of equipment
- Remote access
- Service security
- Web application security
All employees report to the Head of Infrastructure and Security who in turn reports to the board. Policies are enforced through regular training, and random internal audits.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
We maintain an up-to-date log of all known issues and change requests on our source control platform.
Individual changes follow a pre-defined workflow, including phases for pre-production testing and customer approval. Security is a keystone of our development process, and each change is individually reviewed and approved by the Head of Infrastructure and Security.
Our internal product roadmap is regularly reviewed and prioritised based on both internal strategic vision and customer requirements.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
We make use of mailing lists and online security bulletins as well as some automated tooling to stay up to date with the latest threats and vulnerabilities.
We have weekly maintenance windows for standard software patching, but aim to deploy patches for critical vulnerabilities within 48 hours of a fix becoming available.
In cases where the threat to our service cannot be ascertained internally, our policy is to engage with an external security provider for more information.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We monitor and are alerted to all infrastructure access in real-time and implement controls to detect and block unauthorised access and attacks on our system.
We implement accounting and audit trails across both our infrastructure and application which allows us to investigate any potential compromises and alert our customers of any security concerns.
We respond to all incidents immediately and comply with GDPR notification requirements.
|Incident management type||Supplier-defined controls|
|Incident management approach||
All incidents will be investigated by the Head of Infrastructure and Security. We have a pre-defined process that is followed for all incidents that includes collection and documentation of evidence, communication with relevant stakeholders, and post-incident root cause analysis and correctional action.
Users may report incidents through any support channel or directly to the Head of Infrastructure and Security.
Incident reports are created using a pre-defined template, and are distributed to relevant customers by email.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£180 to £240 per device per year|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Free trial includes full access to the service for use with one screen for 30 days. Extensions and additional screens may be available if deemed appropriate.|