Inspired Mobile

Inspired Digital Transformation Platform

Via a single login access solutions for research building, managed QR codes, Events , Email/SMS , & over 2500 digital publishers for advertising

All wrapped with a Creative Studio and CRM engine to better understand your customer.

No longer work with 10 platforms and support Small businesses become digital


  • GDPR Compliant Platform
  • Single Source platform - No longer work with 10 platforms
  • Omni Channel Reporting
  • Big Data Solutions
  • Digital Transformation Solutions
  • Artificial Intelligence & automation
  • Campaign Management
  • Digital Solutions
  • Connected Cities
  • Email, SMS, Research, Advertising, QR Codes all in 1


  • GDPR Compliant Opted in Customer Data Experiences
  • Digital Content Creations
  • No need for Coding (drag and drop)
  • Mobile first solutions
  • Empowerment of Small & Medium Sized Businesses
  • Simplification of too many technologies
  • Quick and easy to use
  • Free Sign up
  • Resell Inspired services
  • Test and Learn


£0 to £1000 per person per month

Service documents

G-Cloud 11


Inspired Mobile

Pratick Thakrar


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No
System requirements Internet Connection

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support is currently Mon to Fri but can be extended to Weekends
User can manage status and priority of support tickets No
Phone support No
Web chat support No
Onsite support Yes, at extra cost
Support levels We provided dedicated support based on client needs. We need more information before confirming costs
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Training is predominately online (tool tips) but we do provide webinars and onsite training for key clients.

Subject to contracts, dedicated account management teams will also be set up to support accordingly
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We have an export feature and can supply an API if required (pot. at extra cost)
End-of-contract process At the end of the contract, the login will expire.

All data must be exported prior or additional fee's will apply

The data is owned by the customer/client

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The platform is not accessible via mobile (tablet yes) but the output produced from the platform is mobile first focused.

Users can customise the experiences accordingly.
Service interface Yes
Description of service interface Each user has a unique login to access the platform (via which takes the user to the campaigns management dashboard
Accessibility standards WCAG 2.1 AAA
Accessibility testing We have a dedicated Q&A team that constantly test the platform
What users can and can't do using the API Subject to requirements, & GDPR compliance, APIs exist to manage customer engagement strategies

Each customer also has dedicated portal to giving their customers access to the data they hold on that customer via Inspired
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The platform is ultimately a shell for customers to shape around their needs.

Additional development might be required, as we did for Department of International Trade at the last Mobile World Congress


Independence of resources Services are load balanced and we provide end points within all major regions of the world.

We have stress tested the platform and we're confident of no service impact.


Service usage metrics Yes
Metrics types Usage data is provided within platform with the admin console.

Master users and logins can be created with restrictions around services purchased by user types can be applied also
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach There is an export functionality to Excel
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We have a detailed SLA that can be sent to you (over 200 words)

Clients are compensated in accordance with the SLA
Approach to resilience Available upon request.
Outage reporting Email alerts are sent to the development team and outages addressed immediately, due to offices, in other countries

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Limited access is provided to users dependant on role requirements.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Amazon AWS
  • We work with Stripe for payment processing

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We are in the process of becoming IS27001 compliant
Information security policies and processes We are looking to adhere to IS27001

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Services & changes are tracked & assessed via AWS.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Services are provided through AWS who would advise us of any security risks and servers are updated as required.

We have real time monitoring as well
Protective monitoring type Undisclosed
Protective monitoring approach We log all incoming traffic to the platform and KPIs are put in measure.

Anything out of the ordinary is flagged within our system and checked
Incident management type Undisclosed
Incident management approach The incidents are logged and real time measures are in place to address immediately

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £0 to £1000 per person per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We offer a free package that has limited access to certain channels but can be upgraded depending on needs.
Link to free trial

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑