Brandwatch Vizia Data Visualisation and Live URL Distribution Platform
Brandwatch Vizia is a real-time data visualisation and insight distribution platform. Vizia enables you to combine multiple data sources and visualise them on any screen across your organisation. Vizia Reporting is a central distribution platform that allows you to seamlessly share social and marketing insights via a Live URL.
- Over 44 visualizations, options for data representation
- Intuitive drag and drop technology
- Multiple data sources including; Brandwatch, Hootsuite Impact, Google Sheets etc.
- Market-leading real-time capability for sharing marketing insights
- Dedicated Account Manager, comprehensive training and Help Centre access
- Innovative data distribution system
- Live URL Reports to an unlimited number of users
- The Vizia Framework - build custom integrations for the platform
- Secure network
- Consistent access to all updates at no extra cost
- Your organisation understands the importance of your customer's voice
- Stay on top of emerging trends in real-time
- Identify crises before they happen and share information internally
- Bring multiple data sets together, maintaining performance management.
- Prove the value of your teams work
- Integrate your proprietary data
- Gather competitive intel and monitor performance
- Track marketing campaigns and respond quicker when you need to
- Identify new audiences and social media influencers
- Engage senior stakeholders in new data sets and initiatives
£95 per licence per month
- Pricing document
- Skills Framework for the Information Age rate card
- Terms and conditions
- Modern Slavery statement
|Software add-on or extension||No|
|Cloud deployment model||Community cloud|
Brandwatch only collects publicly available data
Fair usage policy applies to our Enterprise Q Accounts
Must have an active internet connection to access the system
|Email or online ticketing support||Email or online ticketing|
|Support response times||4 business hours - most calls are fixed within 45 minutes|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Brandwatch support comes in a variety of options, some included and some offered as additional services. Free support includes access to an AM, our support teams around the world and access to the help centre. Paid for support comes in the form of bespoke training packages, professional services and consultancy.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Brandwatch will always propose a bespoke onboarding service based a specific client's needs. We follow a customer success methodology when onboarding a client, with each element of the process aligned to deliver maximum value in the shortest time. Elements include training, professional services setup and account management.|
|Other documentation formats||
|End-of-contract data extraction||Prior to termination of service, clients are free to download their data out of the platform if required.|
|End-of-contract process||30-day notice period. We ask our clients to submit notification in writing to their Account Manager. As soon as the notice period has expired, your account will be deactivated and can no longer be accessed.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Optimised for desktop, mobile and large screen display. The display is a adaptive and therefore responds to the device screen size. The experience is fundamentally the same but all of the component of Vizia are optimized for readability|
|Description of service interface||The Vizia deck editor works similarly to a google slide/ PowerPoint deck. There are slides which can be populated with different components (data sources and visualizations). Slides can be customized as needed with multiple different layout options available. Users also have the option to share the deck to individuals (via email) or to big screens.|
|Accessibility standards||None or don’t know|
|Description of accessibility||The Brandwatch application is compatible with Google Chrome Web applications. For example, users who have a sight impediment are able to install ChromVox plug in (a screen reader app) and this will work with the Brandwatch app platform. All users can access our platform using an active internet connection and most web browsers.|
|Accessibility testing||No testing with users of assistive technology has been completed to date’|
|What users can and can't do using the API||Brandwatch has a RESTful API that allows you to access all your data, metadata and metrics available within Brandwatch Analytics. Our API provides HATEOAS links for internal navigation, making it simple, quick and easy to use. The Brandwatch API allows you to export data to create custom reports.|
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||No|
|Description of customisation||Brandwatch Vizia is highly customizable in regards to the combination of visualizations (44 in total), which you can configure and build to your needs. Vizia comes with two present options of a light and dark theme. You can also assign different colours, such as brand colours, to categories within the some of the visualizations. For an extra cost, you can commission a custom skin which can be built based on your brand guidelines or any other kind of colour scheme. This also includes a logo of your choice.|
|Independence of resources||The Brandwatch service utilise cutting edge hardware and load balances multiple instances across all of our services. For periods of high usage we distribute load across many machines.|
|Service usage metrics||Yes|
|Metrics types||Mention count. Impressions. Retweets. Shares. Likes. Comments. Reach. Metrics are also completely user defined with our customisable rules engine which allows the used to set the criteria by which they want data categorised, becoming new user specific metrics.|
|Reporting types||API access|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Other data at rest protection approach||
Physical security controls: The data centres are manned 24x7 with
secure perimeter, biometric security, CCTV monitoring and offsite storage,
and Brandwatch has fully
owned dedicated systems housed in locked racks.
Production environment is segregated from other systems and
Remote access is only permitted from trusted sources following a
multi-factor authentication and authorisation process.
Brandwatch does not permit access to systems or data by third parties
or sub-contractors, and any system maintenance will be supervised.
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||All data can be downloaded from the Brandwatch platform by the user. Data download formats include Excel, CSV, JPG and PNG. In addition, users are able to download data in the form of PPt reports. All data exporting can be achieved at the click of a button by any.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||Other|
|Other protection between networks||We use Secure Socket Layer (SSL) to encrypt all of the customer’s authentication Information transmitted (in transit) between ourselves and the customer. We do not allow any unencrypted access to the customer’s information. We use an SSL certificate issued by a trusted root certificate authority.|
|Data protection within supplier network||Other|
|Other protection within supplier network||
Within this network, hardened systems are segregated into zones, with only approved traffic flows permitted between zones or systems.
Admin access is restricted and controlled by multi-factor authentication. Any data that leaves our trusted network environment
must have encryption, typically through HTTPS (TLS). Within our trusted network, application access remains protected by HTTPS and secure protocols are widely used, but are not mandatory unless credentials are included. We also have extensive monitoring capabilities and this helps detect anomalous traffic and other issues.
Availability and resilience
Brandwatch publishes support and availability SLAs on our website.
Currently, this is for 99.5% over any calendar month excluding our regular
scheduled maintenance window.
Brandwatch exceeded Service availability SLAs during every month in 2016.
|Approach to resilience||
Brandwatch has a Primary and Secondary datacentre coupled with a system architecture that avoids
single points of failure. This arrangement helps us to maintain service availability during major
infrastructure changes or incidents.
Brandwatch Business Continuity/Disaster Recovery requirements include annual testing for each system component
so we are prepared to act if the worst happens. If a pandemic or other scenario affects one of our office locations,
we have the capability to maintain operations remotely or from other offices.
|Outage reporting||We endeavour to provide two days notice of any scheduled maintenance of Brandwatch. We give notice within the Brandwatch notification interface. For any unforeseen outages, we would use Twitter Initially, if down for an extended period we would rely on critical incident management process, direct notification to clients.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Client Administrators are tagged with their organisation identity, and unable to access
and other client data. Brandwatch Support teams have Two Factor
authentication for access to administrative functions. Monthly reviews of admin users
ensure this is correctly allocated and our Leaver process ensures that accounts are
immediately disabled and access tokens retrieved.
Out of band or back-end System access is strictly limited to
operational roles following senior management approval.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Bsi Assurance UK Ltd.|
|ISO/IEC 27001 accreditation date||NaN/NaN/NaN|
|What the ISO/IEC 27001 doesn’t cover||
All Annex A controls are Applicable. The ISO27001 certification
is for the Brandwatch Applications and services delivered to
our customers and the supporting process. Internal operations
and business process may not be formally covered by certification,
but security policies and procedures are applied to all
parts of the business, regardless.
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
We have a high level information security policy with more granular policies
for specific topics.
Security Policy supports all areas of our ISO27001 certification and is reviewed annually.
All staff agree to Acceptable Use and confidentiality in employment contracts.
Training is provided during induction process and ongoing throughout employment.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Brandwatch adopts a centralised management approach,
with regular automated updates and checks to ensure all systems
are correctly configured.
Change management - application code changes are released twice monthly.
Brandwatch has a 4 week development cycle which includes 2 weeks of
QA and other testing, following peer review and management approval.
Infrastructure and system changes that may affect live systems
take place during maintenance window.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Strategy is to minimise exposure to vulnerabilities through system design and configuration, patch critical vulnerabilities as soon as possible and make other updates during regular maintenance.
The Vulnerability Management lifecycle covers Discovery/identification, Analysis/risk assessment, Treatment/patch or config change, Tracking/monitoring the status of treatment, and Testing/confirmation of fix.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Brandwatch has in depth monitoring of systems, networks and applications for performance, capacity, errors and attacks. We use automated alerting and dashboards to identify anomalies and required actions. Centralised logging allows us to correlate events and protect audit data.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Possible Incidents may be raised through automated systems or reported by customers, operational staff or anyone in the organisation. On-call or dedicated teams perform Triage, or assessment, to determine actions, priority and severity. Security incidents of high severity require post incident review and reporting, and critical incidents have a separate process, including notification to clients.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£95 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|