Placecube Ltd

Digital Place for Connected Data

Provides you with an integration solution for connecting data about places, communities and services, based on globally leading (Gartner) Digital Experience Platform (DXP). Designed to bring together multiple data sources and sensory inputs to help organisations, communities and business users address their needs, improve outcomes and aid future service design.


  • Open platform of components designed to connect systems and data
  • Utilises Liferay DXP core for authentication, personalisation and geolocation
  • Extended with open source data services for analysis, visualisation, publication
  • Connect to data from transactional services and Internet of Things
  • Collect, manage and publish open data
  • Ensure security and privacy by design for personal data
  • Access back-office systems to extract data for service performance analysis
  • User configurable components and open architecture puts you in control
  • Persona based permissions to control access and management of data
  • Integrates with Digital Place platform to extend intelligent services capabilities


  • Understand contextual data about Place and people’s needs within it
  • Predict service and infrastructure demand and spot emerging trends
  • Map service use and visualise metadata for user service journeys
  • Share service performance, assess needs for new services and information
  • Engage communities, businesses, multi-stakeholder groups in co-development initiatives
  • Combine sensor data from local place infrastructure with strategic needs
  • Connect data across local public services, developing place-based insights
  • Unlock silos and remove restrictions of legacy back-office applications
  • Co-developed with public sector for public sector
  • Low cost, flexible solution


£17000 per unit per year

  • Education pricing available

Service documents


G-Cloud 11

Service ID

5 9 3 3 4 2 8 4 9 1 1 9 4 0 8


Placecube Ltd

Jenny Dias

020 8895 6756

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements
Computer with a browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Level Acknowledge Receipt (2)
1 08:00 –18:00 1 clock hour
2 08:00 –18:00 2 business hours
3 08:00 –18:00 2 business hours
4 08:00 –18:00 24 business hours
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Level 1 Support
Level 2 Support
Level 3 Support
Level 4 Support
Placecube provides a comprehensive support service. Once the service is live, it will be in support, and managed by our dedicated Support Manager
Support available to third parties

Onboarding and offboarding

Getting started
Upon initiation of the service, Placecube consultants will work with you to discuss your specific on-boarding needs and solution requirements. An initial on-boarding assessment will be conducted using virtual meeting facilities, and further discussions can take place either virtually or in-person, as required. The on-boarding session will include a walk-through of the service, demonstrating the various administrative and end-user interfaces.
Service documentation
Documentation formats
End-of-contract data extraction
In the event that you no longer wish to use the service, PFIKS can provide an encrypted archive of all client-owned data stored within the platform.
End-of-contract process
The customer is contacted 3 months prior to end of contract to renew. They will have 2 months to renew the contract.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
Description of service interface
Access through web browser over the internet
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Third party testing, customer testing, internal testing
What users can and can't do using the API
Through the API, users can view, create, edit and delete any entity their user account has permissions to perform those actions on.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Colour scheme, logos, pages, navigation, features, forms, and content can be customised.


Independence of resources
Proactive monitoring and auto-scaling


Service usage metrics
Metrics types
All login requests and end user contribution activity.
Reporting types
API access


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other data at rest protection approach
All data encrypted at rest using AES-256.
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The platform provides built-in export tools for users to download a compressed archive of data.
Data export formats
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Uptime target of 99.9%, excluding any planned maintenance
Approach to resilience
Redundancy across all application tiers, spread across multiple physical data centers.
Outage reporting
Support platform where service outages are reported and customers are added to the ticket and emailed the details.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Role-based access control
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
UKAS by Bureau Veritas
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Physical location, which is covered by Hosting Partner
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow ISMS standards and processes. Placecube have a policy and manual set that all staff must accept sign and adhere to.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change Control Policy and Procedure – Specifies the scope and process for change control of our organisation’s information processing facilities for hardware, software and devices.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All components within the stack (infrastructure and software) are continuously tested for vulnerabilities. PFIKS are alerted of any detected vulnerabilities by third party suppliers, and take action on a timescale commensurate with the severity.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Services are monitored continuously, with alerting to the support team. The support team will assess the potential compromise and undertake corrective action according to the severity threat level.
Incident management type
Supplier-defined controls
Incident management approach
Managed through our support desk. The CSO and ISO ensure appropriate action taken in accordance with ISO27001 Incident management policy.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£17000 per unit per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑