Intuitive cloud based digital signage platform, suitable for both internal and external communications. Can integrate with and display data from a large number of systems, including reporting and business intelligence platforms and employee social networks.


  • Digital signage
  • Remote display management
  • Real-time updates
  • Branded content layouts
  • Integration with external data providers
  • Live and on-demand video playback
  • Content scheduling
  • Location based and localisable content
  • Fine-grained permissions and approval system
  • Intuitive interface


  • Easily and instantly share rich communications across your entire organisation
  • Quickly manage content on the move
  • Combine local content with organisation-wide content with ease
  • Keep displays fresh with dynamic content feeds
  • Ensure content is always on brand
  • Communicate with colleagues who have no access to company IT
  • Prepare content ahead of time
  • Instantly update all screens with a single click


£180 to £240 per device per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

5 5 8 9 1 1 2 5 0 6 1 3 5 0 5



Sales team



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No applicable constraints
System requirements
  • HDMI compatible display, 16:9 aspect ratio
  • Access to Internet
  • Modern web browser (e.g. Chrome, Firefox, Edge, Safari)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We aim to respond to all tickets within 30 minutes during UK business hours, or within 12 hours at other times.

24/7 telephone support is available for urgent enquiries related to service availability.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing Web chat provided by intercom.io. See here for details: https://www.intercom.com/blog/messenger-accessibility/
Onsite support No
Support levels Support is included within the standard licence agreement at no extra cost. A technical account manager will be assigned to assist with deployment, in-life troubleshooting, and issue resolution.

End user support is available through all previously mentioned support channels, and by means of an online user guide.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We offer training either onsite or as an online webinar, and also provide a range of self-guided resources including an online knowledge-base, and in-app product tours.

Additional technical documentation is available on request to assist with systems integration and advanced networking tasks.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Users can extract their data by contacting their account manager and requesting this service.
End-of-contract process Users may request export of their data free of charge within a 60 day period following the contract end date. Users will still be able to access the system during this time, but will not be able to create new content, and any screens registered to the account will stop displaying content.

After this 60 day period (or earlier, if requested), user access to the system will be revoked, and all data deleted.

There are no additional charges associated with a contract ending.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All features are accessible on mobile.
Service interface Yes
Description of service interface Online content management system accessed through a web browser. The intuitive design makes creating great looking content easy, through use of a WYSIWYG slide editor interface. Our cutting-edge template system allows users to quickly create content that adheres to internal brand guidelines, using assets such as fonts, logos and colour palettes.
Accessibility standards None or don’t know
Description of accessibility Our service is designed primarily to enable users to create visual content designed to be displayed on digital screens. Unfortunately this activity is not suited to users with a high level of visual impairment and therefore we are not able to accommodate this type of user.
Accessibility testing N/a
Customisation available Yes
Description of customisation The service is highly customisable:

Administrators of the service can define user roles that will enable or disable certain features for non-administrator users.

Our development team are able to implement custom integrations with third party data providers, and can design and develop templates which conform to brand guidelines, displaying data or messaging to our customers' specification.


Independence of resources System resources are automatically scaled according to the demand on the service. This includes both the number of active licences and the current rate of user requests to our infrastructure.


Service usage metrics Yes
Metrics types The real time status of each screen can be monitored through the online dashboard within the content management system.

Reports for content and user activity metrics, as well as screen uptime for a given period can be provided on demand.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data by contacting their account manager and requesting this service.
Data export formats
  • CSV
  • Other
Other data export formats JSON
Data import formats Other

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We offer an uptime SLA of 99.99%. This excludes maintenance periods during which screens will continue to display cached content.
Approach to resilience We use redundancy at every level of our infrastructure with automatic failover.

More detailed information is available on request.
Outage reporting We display outage information on the platform itself, as well as provide email notifications for critical incidents.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication IP whitelisting can be enabled on request.
Access restrictions in management interfaces and support channels The management interface uses roles and permissions checks for every request to ensure that users are authorised to access or modify a particular resource.

Support channels require verification of the user's identity (either manually or automatically) before discussion of any non-public information.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards We are currently working towards ISO27001 certification.
Information security policies and processes We have a range of infosec and acceptable use policies that are documented and communicated to all employees including policies for:
- Passwords
- Email
- Clean desk
- Acceptable use
- Use of equipment
- Remote access
- Service security
- Web application security

All employees report to the Head of Infrastructure and Security who in turn reports to the board. Policies are enforced through regular training, and random internal audits.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We maintain an up-to-date log of all known issues and change requests on our source control platform.

Individual changes follow a pre-defined workflow, including phases for pre-production testing and customer approval. Security is a keystone of our development process, and each change is individually reviewed and approved by the Head of Infrastructure and Security.

Our internal product roadmap is regularly reviewed and prioritised based on both internal strategic vision and customer requirements.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We make use of mailing lists and online security bulletins as well as some automated tooling to stay up to date with the latest threats and vulnerabilities.

We have weekly maintenance windows for standard software patching, but aim to deploy patches for critical vulnerabilities within 48 hours of a fix becoming available.

In cases where the threat to our service cannot be ascertained internally, our policy is to engage with an external security provider for more information.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We monitor and are alerted to all infrastructure access in real-time and implement controls to detect and block unauthorised access and attacks on our system.

We implement accounting and audit trails across both our infrastructure and application which allows us to investigate any potential compromises and alert our customers of any security concerns.

We respond to all incidents immediately and comply with GDPR notification requirements.
Incident management type Supplier-defined controls
Incident management approach All incidents will be investigated by the Head of Infrastructure and Security. We have a pre-defined process that is followed for all incidents that includes collection and documentation of evidence, communication with relevant stakeholders, and post-incident root cause analysis and correctional action.

Users may report incidents through any support channel or directly to the Head of Infrastructure and Security.

Incident reports are created using a pre-defined template, and are distributed to relevant customers by email.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £180 to £240 per device per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Free trial includes full access to the service for use with one screen for 30 days. Extensions and additional screens may be available if deemed appropriate.

Service documents

Return to top ↑