Wazoku Limited

Idea Spotlight - Private Cloud

Idea Spotlight is your Global Home for Ideas - where you capture, evaluate and select the best Ideas to implement and grow; a single place to curate ideas, trends and themes, across the organisation and beyond, whether you are looking to Improve, Innovate, Compete or Reward.


  • Create business challenges: problem statements or questions to your audience
  • Crowd-source ideas from internal and external users
  • Build flexible idea forms & canvases to capture valuable information
  • Configure unique workflows for developing, evaluating and selecting ideas
  • Engage your audience with a full suite of social features
  • Utilise the extensive Evaluation Toolkit to select the right ideas
  • Integrate with the Enterprise stack including Microsoft Office365 and SharePoint
  • Gain deep insight data analytics & visualisations, reporting and dashboards
  • Spotlight.ai to connect People, Ideas and Problems
  • Mobile optimised with a complementary native app for online/offline access


  • Engage staff in helping to solve complex organisational challenges
  • Uncover quick-wins, cost-savings and innovative new ideas
  • Boost employee engagement and productivity
  • Improve transparency and encourage collaboration
  • Best practice advice, training and support from innovation experts
  • Simple system management and administration
  • AI tools surfacing the right ideas to the right people
  • Secure cloud hosting to protect data
  • Simple and quick to setup - no software installation
  • Excellent ROI with help from industry experts


£8.50 to £60 per user per year

  • Education pricing available

Service documents


G-Cloud 11

Service ID

5 5 9 1 4 9 3 9 2 5 9 8 5 6 7


Wazoku Limited

Simon Hill



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints There is no pre-requisite infrastructure, software or hardware required to use Idea Spotlight. There are no plugins or additional installations required on any device (e.g. Java). The only requirement is access to an internet-enabled device (desktop, tablet or mobile).

OS supported:
- macOS
- Windows
- iOS
- Android

Browsers supported:
- Internet Explorer v11
- Microsoft Edge (latest)
- Firefox (latest)
- Chrome (latest)
- Safari (latest)
System requirements
  • Internet enabled device (desktop, tablet or mobile)
  • Latest version of Chrome, Safari, Firefox, Microsoft Edge
  • IE11+

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We respond to tickets within 4 hours of receipt during UK working hours (Mon - Fri, 9am - 6pm).
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Standard support includes a dedicated Wazoku Customer Excellence Consultant to support the client through their initial onboarding experience, whether this is their first step into Idea Management, or augmenting their existing strategy and capabilities.

Technical support is also provided free of charge throughout the contract through an 24/7 online portal and CX Representative during UK business hours.

Additional support is available throughout the life of the contract with a dedicated Customer Success Manager on hand to provide guidance an support to ensure the success of your Idea Management programme.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started • Dedicated Customer Excellence Consultant to guide the client through an iterative onboarding process to fully understand business needs and goals.
• Progress clients from scoping, through training, launch planning and launch, to Business as Usual and future strategy and success planning.
• Comprehensive and interactive training to make the client the expert – engaging sessions to learn by using the platform
• Consultancy and best practice to help build scalable innovation initiatives and idea management and business process workflows.
• Guidance on strategies to ensure the platform achieves desired goals. Setting out the path for the platform and innovation initiative's growth and development within the organisation.
• Audience engagement planning – expertise to ensure the platform is well adopted and utilised on an ongoing basis.
• Technical integration / API support where required to make the most of platform extensions.
• Full project schedule provided and managed throughout to ensure launch timelines and outcome milestones are met.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Throughout the life of the contract, System Admins can export platform data including ideas, comments, votes, user information, evaluation information.

Upon contract termination, clients are provided a full data export of all client data in a CSV format.
End-of-contract process There are no additional fees at contract end.

Upon contract termination, all data can be provided to customer in a CSV format. All data is then removed from Wazoku servers.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Some admin functions that require more detailed configuration are not available on mobile devices.

All end user functions are available on the mobile.

In addition, we offer a native Idea App (iOS and Android) to support adding/editing/voting/commenting on Ideas with online and offline support.
Service interface No
What users can and can't do using the API The API allows users of Idea Spotlight to add, edit, manage and delete content (i.e. ideas, challenges, social) within the platform.

Authentication is through user tokens. Once authenticated users can manage users, manage challenges, add/edit ideas, comment/vote on ideas, manage conversations and utilise the site wide search function.

There are some rate limits in place but these limits can be negotiated on request.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Idea Spotlight's user interface can be fully personalised and branded, to make it seamless fit within existing internal or external systems. The platform can be configured for a unique registration and login experience.

The platform has built-in tools to allow the organisation to build and maintain their home page, communities & community home pages, idea capture forms, challenge workflows and evaluation criteria.

The platform supports language localisation that permits organisations to select the languages supported for the application interface, as well as Admin tools permit managers to provide user generated content, such as Challenge description, statuses, categories, etc, in different languages.


Independence of resources We employ multiple redundancies for our core services.

We constantly monitor our service and proactively alter the available resources in order to cope with increases in demand.


Service usage metrics Yes
Metrics types A full analytics portal is provided to system admins including reporting and data analysis on the full range of idea management and innovation metrics.

Challenge Managers have their own challenge-based analytics to provide insight into specific challenges, including engagement, social, financial and time-based metrics.

All users have access to an analytics dashboard that provides information about the platform, including leaderboards and gamification leaderboards.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Admin users can export content including ideas, comments, votes, user information, evaluation information, in a CSV format at any time through the platform. The level of data that can be exported is determined by the admin user's permissions (i.e. a System Admin can export all data, but a Community Admin can only export the data for their community).

Media and attachments can be downloaded by any user given at any time.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network Other
Other protection within supplier network Internal traffic between different components of the platform is sent unencrypted. This traffic is transmitted via private, virtualised networks, which are secured at the network layer by our hosting partner.

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% system uptime SLA across a rolling 3 month reporting period, excluding scheduled and notified maintenance work.

In the event that the Availability Percentage is not achieved, the charges for the period in question will be reduced by the appropriate proportion:
99.5% - 100% = 0%
98.5% - 99.4% = 2%
96.5 – 98.4% = 4%
<96.4 = 8%
Approach to resilience Available on request
Outage reporting Outages are reported via email to nominated system administrators, or via service unavailability messages within the service / API.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication Our recommended authentication method is through SAML2.0 Single Sign On.
Access restrictions in management interfaces and support channels Access is restricted based on defined user roles.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Username or password
  • Other
Description of management access authentication We recommend SAML2.0 Single Sign On.

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 22/01/2019
What the ISO/IEC 27001 doesn’t cover Anything outside the provision of managed hosting, cloud computing, network and colocation services.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Wazoku have written Data Classification, Data Breach and Disaster Recovery policies - all of which are available on request. Our reporting structure is as follows:

• Simon Hill, CEO
• Rosemarie Diegnan, Chief Strategy & Product Officer and Data Protection Officer
• Chris Bailey, Technical Director

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Wazoku operates an Agile methodology, including full peer-review and security review as part of the software development life cycle.

All developers contribute to the automated test suite comprising unit and integration tests, which are automatically run against all code. Passing the test suite is a prerequisite to the code progressing in the SDLC. The test suite is peer-reviewed and regularly probed to ensure it is testing appropriately.

Wazoku has a dedicated QA team to complete automated and manual testing. Manual tests uncover issues automated tests don't and allow us to address issues before they reach the production environment.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We run internal (quarterly) and external (annually) vulnerability scans and penetration tests. Actions resulting from these tests are incorporated into our roadmap and and development work required is prioritised.

We run monthly OS level updates against all virtual machines in all environments to ensure that the software they run and the packages they hold are up to date. In cases where a high-level vulnerability is released we will run the upgrade as soon as a patch is made available and we can ensure that any remedial action required will have the minimum effect on active customers.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We collect all system logs to a central aggregation service. This allows us to identify and respond to peaks in traffic as well as inconsistencies in service response and use.

We make use of industry leading intrusion detection systems and review their output and recommendations daily.

We pride ourselves on responding immediately to intrusion events, both with remedial action and notifying customers.
Incident management type Supplier-defined controls
Incident management approach We have a process for incident management outlined in our information security documentation. Users can report incidents through our Helpdesk software or to a representative of our dedicated Customer Success team. Incident reports would be provided for initial contact, regular updates and post mortem. This information would be available through email contact of key persons and through wider reports made available to clients.

Full Incident Response Plan documentation is available on request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £8.50 to £60 per user per year
Discount for educational organisations Yes
Free trial available No

Service documents

Return to top ↑