Polecat Reputation and Risk Intelligence
Polecat's intelligence platform ingests data across millions of sources and then applies algorithms to surface and analyse emerging trends, topics or stakeholders (media, social media, Influencers, Stakeholders, Governments, IGO's, NGO's, think tanks, health bodies, regulators and research institutes) across 234 countries. Polecat's platform eliminates resource needed to analyse big data.
- Real-time media monitoring & social listening (incl. NLA/broadcast)
- Stakeholder intelligence and influencer identification
- Campaign measurement and effectiveness evaluation
- Real-time reputation and crisis management
- Interactive and exportable visualisations
- API integration
- Geographic real-time email alerts and news briefs
- Competitor tracking and identification of Trends
- Reporting and consultancy
- Risk identification
- Effective horizon scanning across global sources
- Improve communications planning and campaign execution
- Navigate and report on stakeholder conversations and emerging trends
- Mitigate crises, spot emerging topics before they develop
- Report across multiple sources (media, social, online communities and websites)
- Face to face training, support and excellence in client partnerships
- Segment regionally and be kept up-to-date of local developments
- Utilise impact metric (authority of source, topic focus and relevance)
- Help shape your strategy or answer any questions of importance
- Deliver proactive intelligence that empowers teams with forward-focused data
£0 to £500000 per licence per year
- Education pricing available
- Free trial available
Polecat - risk intelligence
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||The platform is hosted online so there are no constraints to the buyer.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
We respond within 24 hours Monday-Friday 9am-5pm GMT. Response times out of hours may vary and take up to 48 hours.
Where service levels need to utilize crisis packages, response times may be agreed and contracted on a bespoke requirement.
Client Partners are allocated to each account and can be contacted by mobile for urgent issues
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.1 AA or EN 301 549|
|Web chat accessibility testing||
We use Intercom for our webchat, a known and widely used plugin.
Accessibility level and details can be found:
|Onsite support||Onsite support|
- Polecat offers x1 named Customer Support Manager (Technical Account Manager) for all subscriptions. This includes training, onboarding and ongoing support. There is also an in-app chat.
- x1 named Client Partner are included in enterprise subscriptions, helping with strategic applications of our technology and best practices.
- There is a larger team of analysts and data scientists that can help support.
- More specialised support (e.g. strategic workshops, consultancy, reporting) is available at an additional cost.
All clients have access to webchat during office hours and two support emails.
For teams requiring consultancy in terms of reporting and strategic workshops this is charged based on requirements and time by number and extent of reporting and consultancy daily rates.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||All customers are offered training, in person where possible or online. Polecat also offers an online Help and FAQ section, user guide and manual for our products.|
|End-of-contract data extraction||Data can be exported from the platform.|
At the end of the contract if the user does not wish to renew their contract the service will be shut off and the login will become void.
There is the option to export data at the end of the contract (subject to contractual arrangements).
Polecat will advise the client ahead of any end of contract date, so that the client and relevant users are aware of the termination of agreements.
A final review of service is also possible.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The platform is accessible via mobile applications though there is no specific mobile app for the platform.|
|Accessibility standards||WCAG 2.1 AA or EN 301 549|
|Accessibility testing||Range of screen readers, magnifiers and built in accessibility tooling on Windows and Mac|
|What users can and can't do using the API||Polecat offer a API allowing Polecat Intelligence to be integrated into customer and partner BI and LoB applications. The API is configured in the same manner as the core platform; through the configuration of topics and organisations the user wishes to monitor. Data can then be integrated with a range of tooling to support further analysis and decision processes.|
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||
The service can be customised to meet customer requirements, from changing the search parameters in the platform (keywords, topics, sources, geography, languages) to the support offered (additional training, workshops, reporting, consultancy) to building fully bespoke visualisations and solutions via the API.
Customers can also choose to bring in further sources and primary data to house more intelligence together within the platform.
There are also a number of consultancy services to provide further analysis of clients data and to help ensure that the intelligence is actionable for wider audiences within the client's company.
|Independence of resources||
Polecat supports some of the world's largest organisations and has bandwidth to support exponentially more users before any strain is expected upon the system. Polecat runs a high capacity platform distributed across 3 data centres, providing high levels of performance, resilience and redundancy.
For some of our largest enterprise customers we have hundreds of users globally accessing real time data 24/7, 365 days per annum.
|Service usage metrics||Yes|
Users are able to request detailed metrics through their named contact, for example on logins, new searches or changes made to existing searches, as well as data downloads.
Metrics include; no of users, no of logins, open rates (email), searches and dashboards most visited/engagement levels, last login dates, time in platform.
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
All visuals are exportable through the user interface.
Polecat support teams can export data for clients, and provide this is a range of formats (csv, json, etc)
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||We offer 99.5% uptime on our product and classify any issues with the service into 4 different levels, as well as 3 different tiers of support. In the event of Severity 1 Issue, Tier 2 & 3 support is on call 24 hours a day. Any planned outage required outside of this shall be communicated and agreed beforehand with the customer. Guaranteed levels of availability is agreed with the customer depending on their project requirements and subsequent refunds if these are not met.|
|Approach to resilience||Information available upon request.|
|Outage reporting||Outage can be reported directly by customers to their named contact via the phone or via email, as well as to a support email or intercom chat. Polecat has an incident management policy that can be shared upon request outlining target restoration times on any outages as well as more detailed SLAs.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Each user is given a dedicated username and password. Restrictions on software usage and clearance can be amended as needed, for example ensuring some searches are only visible to certain users, or creating viewer-only users.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||2-factor authentication|
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||UK Government Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Change control and management processes, least privilege and duty separation.|
|Information security policies and processes||Polecat has mandated information security, data protection and IT management processes.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All changes to the system are managed, tested and impact assessed bu our operations team. This includes hardware, software, and central configuration changes. Polecat follows best practice automated deployment and desired state management processes, providing through life configuration management.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Threat / vulnerability assessment run constantly through automated tooling, and service assessment. When a vulnerability is found it is impact assessed by our operations team against our defence-in-depth infrastructure design. Urgent patches are manually tested on our sandbox environment and deployed immediately.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||The infrastructure is constantly monitored by a range of dedicated tooling monitoring all levels in the environment. Polecat has a dedicated operations team reviewing potential incidents.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Polecat has defined processes for common events. Users can report suspected incidents to their Customer Service Manager over the phone or via email, in the in-app chat via the platform, or to a specific support email. All incidents are investigated, and where applicable a report provided.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£0 to £500000 per licence per year|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||RepVault Core for RepVault Enterprise license customers|