Polecat - risk intelligence

Polecat Reputation and Risk Intelligence

Polecat's intelligence platform ingests data across millions of sources and then applies algorithms to surface and analyse emerging trends, topics or stakeholders (media, social media, Influencers, Stakeholders, Governments, IGO's, NGO's, think tanks, health bodies, regulators and research institutes) across 234 countries. Polecat's platform eliminates resource needed to analyse big data.


  • Real-time media monitoring & social listening (incl. NLA/broadcast)
  • Stakeholder intelligence and influencer identification
  • Campaign measurement and effectiveness evaluation
  • Real-time reputation and crisis management
  • Interactive and exportable visualisations
  • API integration
  • Geographic real-time email alerts and news briefs
  • Competitor tracking and identification of Trends
  • Reporting and consultancy
  • Risk identification


  • Effective horizon scanning across global sources
  • Improve communications planning and campaign execution
  • Navigate and report on stakeholder conversations and emerging trends
  • Mitigate crises, spot emerging topics before they develop
  • Report across multiple sources (media, social, online communities and websites)
  • Face to face training, support and excellence in client partnerships
  • Segment regionally and be kept up-to-date of local developments
  • Utilise impact metric (authority of source, topic focus and relevance)
  • Help shape your strategy or answer any questions of importance
  • Deliver proactive intelligence that empowers teams with forward-focused data


£0 to £500000 per licence per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

7 2 8 8 2 1 6 0 9 4 1 4 4 1 2


Polecat - risk intelligence

Caroline Skipsey



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints The platform is hosted online so there are no constraints to the buyer.
System requirements
  • Internet browser & internet connection to view data live
  • Optional - NLA End User Licence to access print media
  • Optional - Login/subscription to view paywall content (e.g. Financial Times)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We respond within 24 hours Monday-Friday 9am-5pm GMT. Response times out of hours may vary and take up to 48 hours.
Where service levels need to utilize crisis packages, response times may be agreed and contracted on a bespoke requirement.
Client Partners are allocated to each account and can be contacted by mobile for urgent issues
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing We use Intercom for our webchat, a known and widely used plugin.
Accessibility level and details can be found:
Onsite support Onsite support
Support levels - Polecat offers x1 named Customer Support Manager (Technical Account Manager) for all subscriptions. This includes training, onboarding and ongoing support. There is also an in-app chat.
- x1 named Client Partner are included in enterprise subscriptions, helping with strategic applications of our technology and best practices.
- There is a larger team of analysts and data scientists that can help support.
- More specialised support (e.g. strategic workshops, consultancy, reporting) is available at an additional cost.
All clients have access to webchat during office hours and two support emails.
For teams requiring consultancy in terms of reporting and strategic workshops this is charged based on requirements and time by number and extent of reporting and consultancy daily rates.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started All customers are offered training, in person where possible or online. Polecat also offers an online Help and FAQ section, user guide and manual for our products.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data can be exported from the platform.
End-of-contract process At the end of the contract if the user does not wish to renew their contract the service will be shut off and the login will become void.
There is the option to export data at the end of the contract (subject to contractual arrangements).
Polecat will advise the client ahead of any end of contract date, so that the client and relevant users are aware of the termination of agreements.
A final review of service is also possible.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The platform is accessible via mobile applications though there is no specific mobile app for the platform.
Service interface Yes
Description of service interface The platform allows users and organisations to analyse and interrogate unstructured information in any language, from any source. This core capability powers Polecat Reputation Management capability, and associated use cases.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing Range of screen readers, magnifiers and built in accessibility tooling on Windows and Mac
What users can and can't do using the API Polecat offer a API allowing Polecat Intelligence to be integrated into customer and partner BI and LoB applications. The API is configured in the same manner as the core platform; through the configuration of topics and organisations the user wishes to monitor. Data can then be integrated with a range of tooling to support further analysis and decision processes.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The service can be customised to meet customer requirements, from changing the search parameters in the platform (keywords, topics, sources, geography, languages) to the support offered (additional training, workshops, reporting, consultancy) to building fully bespoke visualisations and solutions via the API.
Customers can also choose to bring in further sources and primary data to house more intelligence together within the platform.
There are also a number of consultancy services to provide further analysis of clients data and to help ensure that the intelligence is actionable for wider audiences within the client's company.


Independence of resources Polecat supports some of the world's largest organisations and has bandwidth to support exponentially more users before any strain is expected upon the system. Polecat runs a high capacity platform distributed across 3 data centres, providing high levels of performance, resilience and redundancy.
For some of our largest enterprise customers we have hundreds of users globally accessing real time data 24/7, 365 days per annum.


Service usage metrics Yes
Metrics types Users are able to request detailed metrics through their named contact, for example on logins, new searches or changes made to existing searches, as well as data downloads.
Metrics include; no of users, no of logins, open rates (email), searches and dashboards most visited/engagement levels, last login dates, time in platform.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach All visuals are exportable through the user interface.
Polecat support teams can export data for clients, and provide this is a range of formats (csv, json, etc)
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability We offer 99.5% uptime on our product and classify any issues with the service into 4 different levels, as well as 3 different tiers of support. In the event of Severity 1 Issue, Tier 2 & 3 support is on call 24 hours a day. Any planned outage required outside of this shall be communicated and agreed beforehand with the customer. Guaranteed levels of availability is agreed with the customer depending on their project requirements and subsequent refunds if these are not met.
Approach to resilience Information available upon request.
Outage reporting Outage can be reported directly by customers to their named contact via the phone or via email, as well as to a support email or intercom chat. Polecat has an incident management policy that can be shared upon request outlining target restoration times on any outages as well as more detailed SLAs.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Each user is given a dedicated username and password. Restrictions on software usage and clearance can be amended as needed, for example ensuring some searches are only visible to certain users, or creating viewer-only users.
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications UK Government Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Change control and management processes, least privilege and duty separation.
Information security policies and processes Polecat has mandated information security, data protection and IT management processes.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes to the system are managed, tested and impact assessed bu our operations team. This includes hardware, software, and central configuration changes. Polecat follows best practice automated deployment and desired state management processes, providing through life configuration management.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threat / vulnerability assessment run constantly through automated tooling, and service assessment. When a vulnerability is found it is impact assessed by our operations team against our defence-in-depth infrastructure design. Urgent patches are manually tested on our sandbox environment and deployed immediately.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach The infrastructure is constantly monitored by a range of dedicated tooling monitoring all levels in the environment. Polecat has a dedicated operations team reviewing potential incidents.
Incident management type Supplier-defined controls
Incident management approach Polecat has defined processes for common events. Users can report suspected incidents to their Customer Service Manager over the phone or via email, in the in-app chat via the platform, or to a specific support email. All incidents are investigated, and where applicable a report provided.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £0 to £500000 per licence per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial RepVault Core for RepVault Enterprise license customers

Service documents

Return to top ↑