Designed for organisations looking to improve their customer service, boost internal communications, or support HR and compliance.
Oplift is created with the user in mind to improve employee engagement, simplify learning, and streamline operations. See what we can do for you.
- News & notifications service delivered across web and mobile apps
- Knowledgebase with rich content, categories and rich text search
- Acknowledgements to ensure policy compliance
- Micro-learning playlists to support fast learning on the go
- Checklists to organise work tasks
- Review for places and people, with configurable insights
- Issue and action tracking
- Internal marketing
- Bespoke extensions to adds new capabilities
- Workforce Analytics to better support employee activities
- A single dashboard for services and knowledge sources
- Communicate quickly and clearly
- Ensure compliance to safety and legal policies
- Speed the on-boarding of new employees
- Learn on the job, with integrated progress tracking
- Structure regular tasks with easy reporting and improved accuracy
- Let people know of issues in seconds
- Digitise operations manuals
- Speed audits and personal reviews
- Support remote staff as easily as those in an office
£12 to £60 per person per year
- Education pricing available
- Free trial available
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
Oplift Engage is available for up to date web browsers and as an app for iOS and Android tablets and phones.
Oplift Review is available as an app for iOS tablets and phones, with reports available for web browsers.
|Email or online ticketing support||Email or online ticketing|
|Support response times||Service Level Agreements can be tailored to customer requirements, including 24 x 7 support if required.|
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
We provide two support levels:
Standard: 9 to 5, 5 days a week
Full: 24 x 7
Standard support is included in the service licence cost and Full or bespoke support contracts are available at extra cost. Every customer is allocated a technical account manager.
|Support available to third parties||Yes|
Onboarding and offboarding
Oplift is provided with options for onsite training, training at our corporate offices and online training. This can be our standard training support or tailored to a specific organisation's requirements.
Ocasta also provides comprehensive administrative documentation and sample content to begin the process of configuration.
Ocasta can also provide more detailed consultancy support to help load existing content, to design reports and reviews and structure compliance and news services, together with a bespoke design service to customise the look and feel.
|End-of-contract data extraction||At the end of contract if a client wants a copy of their stored data this should be requested in writing and an archive file will be securely made available for download.|
There are no extra costs at the end of the contract.
If no export of customer data is required the service will simply be halted and the service hardware cleaned.
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Oplift Engage has been designed to work optimally across all devices and access methods using either the web interface or the dedicated mobile apps for iOS and Android. Oplift Review is available for iOS and Android (later in 2018).
Mobile app services can take advantage of specific features such as push notification and offline working, aside from this the capabilities across wen and app are the same.
|Accessibility standards||WCAG 2.0 A|
|Accessibility testing||Interface testing is carried out with assistance from automated testing tools to cover the wide range of interface types that Oplift products cater for, including responsive web sites and mobile applications for iOS and Android on phones and tablets.|
|What users can and can't do using the API||
The Oplift mobile apps and web interface are all driven from the platform API to ensure a consistency of approach and functionality across user devices. This API can also be made available to custom front end services as required.
Through the capabilities of the Ocasta Extend service the API can be developed further to provide complete bespoke solutions while making use of shared Oplift data sources and user authentication.
|API sandbox or test environment||Yes|
|Description of customisation||
Oplift is an engagement platform and many aspects of the service can be configured by an administrator. Features include:
* Regions, locations and location types
* Users and user roles
* Content layout, design and categorisation
* News categories and summaries
* Compliance acknowledgements
* Internal marketing banners
* Learning modules
* Checklists and checklist items
* People and place reviews and audits.
|Independence of resources||Each Oplift Engage deployment is to a separate instance of the platform, scaled to the requirements of the individual contract. This can then be scaled upwards automatically as demand increases from the specific client.|
|Service usage metrics||Yes|
Many aspects of the service can be analysed including:
Engagement statistics on news & articles
Aggregated stats on content popularity
Bespoke reports can also be developed to analyse further aspects of the service as required.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Users can extract their data in CSV format from the administration interface.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Approach to resilience||Detailed information on our service resilience is available on request.|
|Outage reporting||A public dashboard is provided with real time status.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||User roles & accounts are set with access privileges to match the required level of responsibility, as advised to us by the client. Each aspect of the platform from content management, user management and administration etc can be allocated separately.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users receive audit information on a regular basis|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||OWASP 2.0|
|Information security policies and processes||
Oplift follows OWASP security policies.
The Open Web Application Security Project (OWASP) is a 501(c) worldwide not-for-profit charitable organization focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP uniquely provides impartial, practical information about AppSec to individuals, corporations, universities, government agencies and other organizations worldwide.
Operating as a community of like-minded professionals, OWASP issues software tools and knowledge-based documentation on application security.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Code is tracked through Github based code control procedures with peer review of all code submitted. Each code release is tested thoroughly before migration to live using automated suites of tests and manual checking. Director level sign off is required before moving to live.
The change itself is documented in advance with appropriate backups and back out procedures planned in the event of unforeseen failures.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Potential threats are alerted to us by CVE (https://www.cvedetails.com) and reviewed internally by our DevOps team for potential impact to the service.
Key threats are escalated immediately and any patching needed moves directly to our release schedule, to be controlled by established change management procedures.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Ocasta runs continuous monitoring processes and alerts generated from these are flagged immediately into incident control systems. Potential compromises are then evaluated and responded to according to threat levels and potential impact.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
Users report incidents via phone, email and online web service. These are immediately flagged to our support team who respond according to agreed SLAs and evaluate the incident.
Incidents requiring further work or an active response are escalated to engineering for resolution.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£12 to £60 per person per year|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
For organisations needing to pilot the service and review efficiency gains an Innovation Pilot may be available.
This lasts eight weeks and allows a specified sub-set of users to configure and use all aspects of the platform via Engage and Review.
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|