Focaldata Public Insight Platform
A marketing intelligence and optimisation self-service platform so clients make more effective marketing decisions. We make their market research far more powerful. Our platform unifies that data into a hyper-granular view and surfaces new, actionable insights for smarter marketing decisions, more relevant products, targeted ads and effective communications and campaigns.
- Upload data or commission new surveys through the platform
- Manage projects and surveys easily on the platform
- Custom built data science models on any question in survey
- Models combined with Focaldata database to create new analysis
- Intuitive dashboard to explore data interactively
- Automated charting from your results (from survey database)
- Audience builder tool to understand who to target
- Geographic exploration tool to understand how precise geographies think
- Add custom information to geographic view for deeper insights
- Filter across database to really drill down on results
- Unifies market research into hyper-granular, new and actionable insights
- Smarter marketing decisions, more relevant products, targeted ads, communications, campaigns
- Know who, how, when to target with granular demographics/geographies
- Trustworthy, accurate data clients can rely on to increase revenue
- Reduce research budget by using smaller sample sizes
- Clients use their past data to reduce future research costs
- Using their previous research also extracts further value
- Consumer analysis can be quickly updated
- More efficient resource allocation means enhanced campaign ROI
- Automation delivers 1 week turnaround (unlike 3 weeks for manual)
£5000 to £10000 per licence per month
- Education pricing available
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||We can't provide unlimited users or unlimited data processing.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Within 30 minutes or less during the week, on average. Responses may vary over weekends. Questions are logged immediately on both weekdays and weekends. Answers are usually provided within 2-3 days, if not fewer.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.1 AAA|
|Web chat accessibility testing||N/A|
|Onsite support||Onsite support|
Our specialist senior engineers provide on-site support, and are assigned to the query depending on the nature of the problem.
Any frontend issues (for example displaying data problems on the visualisation tool) will be assisted by a senior UX/UI consultant, and any backend issues relating to data analysis will result in a senior data scientist on site.
|Support available to third parties||Yes|
Onboarding and offboarding
We provide onsite training, online training and user documentation.
Onsite training involves dispatching an engineer to explain to users how to use the tool - specifically how to upload the data, analyse the data, explore the findings on the online portal and export the data into formats needed for customer business.
Online training functions the same as onsite training, just over a Skype call.
User documentation is distributed for training purposes, tailored to the exact grade, sector and position of the staff using the tool e.g. high-level summaries for senior-level employees and more detailed explanations for junior staff.
|End-of-contract data extraction||Users sent the support team an email requesting data extraction, and Focaldata and the client then extra the data together in partnership. Continuous updates are provided until extraction is complete.|
Two days before the end of the contract, customers will be alerted and asked whether they want to (a) renew the contract, (b) not renew the contract or (c) undergo a modified contract for a different service.
The contract price includes visualisations and reports on the final estimates and results of analysis on the Focaldata platform (online portal) - see the services agreement for more details. A reasonable level of customer support is also included in the contract price.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||They are completely the same.|
|Accessibility standards||None or don’t know|
|Description of accessibility||
The colour scheme presented can be edited to the users preference upon request, especially in cases of visual colour impairment. We are currently unable to cater for the blind as our interface is very much dependent on our visuals.
We also present the same information in different contexts (i.e. graphs, tables, maps) making the data very transparent, accommodating to different learning styles.
Currently users are timed out after a 2 hour session. At this time, the user is unable to stop or amend the time-out, and simply has to log back in again.
|What users can and can't do using the API||Through our API users can directly query and access our processed consumer insight data. This way the data can be used either in your own business or intelligence systems or for further analysis using Microsoft Excel.|
|API documentation formats||
|API sandbox or test environment||No|
|Description of customisation||Currently the interface isn’t directly customisable by users, but any bespoke customisations can be flagged to and requested from Focaldata at a cost.|
|Independence of resources||We are deployed in the cloud with autoscaling.|
|Service usage metrics||Yes|
The metrics majorly depends on the nature of the market and the consumer research.
That being said, for research that is conducted frequently we provide comparative time series metrics like change Year over Year, change Quarter over Quarter, change Month over Month, etc.
Furthermore we provide the deviation from the country average, called index. The index metric allows for insight about how certain demographic features differ from the general population.
|Reporting types||Reports on request|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||A variety of formats including CSV, JPEG or PNG.|
|Data export formats||CSV|
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||We provide a Supplier Services Agreement for each project, outlining the exact services provided. We can guarantee 99% availability on all projects. Please see the Focaldata Supplier Services Agreement for details.|
|Approach to resilience||Available on request (confidential).|
|Outage reporting||With email and telephone alerts updated every 15 minutes, we keep customers informed of the status concerning the outage problem, root cause, staff working on the root cause and solution applied once the solution is successful.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||2-factor authentication|
|Access restrictions in management interfaces and support channels||Focaldata uses 2-factor authentication on Google Cloud, with the second step involving secure unique passcodes that change combination every 60 seconds, besides AWS access needing a multi factor authentication token beyond a username and password. Access to the portal services can only be secured with designated Focaldata permissions, username and password.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We take this very seriously. Our leadership manages the team to not only ensure that everyone is aware and complies with our security policy, but that all employees are aware of their specific roles and responsibilities.|
|Information security policies and processes||Every quarter we follow and review the application in practice across all departments of our GDPR-compliant Data Protection Policy, Data Storage Server Security Policy, Information Security Policy, Operational Security Policy, Encryption Standards, Identity and Access Management Policies, Remote and Mobile Access and Working, Third Party Access and Third Party Assurance.|
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||The latest security measures and updates are performed on Focaldata core systems and configurations, and while data migration takes place towards the new updated version systems, the legacy systems are deactivated. Additionally, new changes are tested rigorously prior to deployment so that the platform stability remains at an optimum level. Scalability, operational systems and feature stability are all key features.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Network traffic is scanned and detected for threats, errors, or irregular activity.
Access is limited to Focaldata data scientists provided that their identities are verified both by security passes in person, and as well as online through a robust password-protected system no other department can access. This is then followed by an additional password-protected system for database and opinion estimates.
Focaldata's internal policies and staff guidelines govern the way staff conduct their day-to-day activities concerning real or potential threats.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Any system errors are notified to the product and data science team contacts RTI and 24/7, following which the contacts will investigate the contacts to find out the cause of the threats or attacks.
The issue is recorded, and continuously monitored until resolution and an update concerning the resolution has been concluded.
Systems are brought offline on evidence of threats resulting in compromise.
Focaldata policies detail its approach to identifying and mitigating potential risks before they materialise in order to reduce the number of incidents the systems face in the first place.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Focaldata’s analytics tool monitors and logs incidents on the online portal, before incidents are reported via telephone, email and RTI communication channels.
Incidents are then classified for the appropriate department and assessed for their significance (minor, medium, major, critical), and then escalated to a named individual contact who will resolve the issue and provide an update on progress with resolution.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£5000 to £10000 per licence per month|
|Discount for educational organisations||Yes|
|Free trial available||No|