LaunchPad offers recruitment automation technology. Our online assessment, on-demand video interviewing, live video interviewing and scheduling tools can be used to efficiently engage and assess high volumes of candidates, while predictive analytics can be used to automate the decision making process to create a fair, efficient and engaging recruitment process.
- RECRUITMENT AUTOMATION- Deliver recruiter efficiency and a seamless candidate experience
- INTERACTIVE ASSESSMENTS- Text, video or image based assessments e.g. SJT
- AUTOMATED CANDIDATE FEEDBACK- Provide constructive feedback on assessment performance
- 3rd PARTY ASSESSMENT INTEGRATION- Create a 'best of breed' process
- RECORDED VIDEO ASSESSMENTS- Deliver recruiter efficiency and enhanced assessment
- BIAS REMOVAL ANALYTICS- Ensure assessments are fair, consistent and objective
- PREDICTIVE ANALYTICS- AI to automatically assess recorded video assessments
- AUTOMATED SCHEDULING- Enable candidates to schedule their own interviews
- LIVE VIDEO INTERVIEWING- Real time video assessments with recruiter tools
- ATS INTEGRATION- 30+ integrations available including SuccessFactors and Workday
- RECRUITMENT AUTOMATION- Supports faster and better hiring decisions
- INTERACTIVE ASSESSMENTS- Provides an engaging candidate experience
- AUTOMATED CANDIDATE FEEDBACK- Candidates can receive tailored feedback
- 3rd PARTY ASSESSMENT INTEGRATION- Seamless integrations with 3rd party applications
- RECORDED VIDEO ASSESSMENTS- Supports faster, better and fairer hiring decisions
- BIAS REMOVAL ANALYTICS- Ensures fair, consistent and objective recruitment decisions
- PREDICTIVE ANALYTICS- Supports faster, fairer and better recruitment decision making
- AUTOMATED SCHEDULING- Interviews arranged to suit candidates and recruiters
- LIVE VIDEO INTERVIEWING- Recruiters can make decisions in real-time
- ATS INTEGRATION- Seamless integrations with leading 3rd party applications
£10000 to £300000 per unit per year
7 7 3 0 0 9 7 4 7 7 8 4 1 6 6
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
Our software requires an internet connection and the ability to play video content.
Candidates require a smartphone or a webcam and microphone.
|System requirements||Web browser interface|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Candidate response within 1 hour (target 15 minutes).|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
Candidate Support - 24/7, Everyday (Email Support Only)
Customer Support - Business Days 9-6 UK Time (Email and Telephone Support)
Each client will work with a LaunchPad account manager Customer Success Executive
|Support available to third parties||Yes|
Onboarding and offboarding
We have an On-boarding and Success team that will build a customised plan that works with your timeline. They will follow an established process to ensure you get the best success out of our platform.
When off-boarding, we can provide custom reports to help get scoring and review data out of the LaunchPad platform.
|Other documentation formats||Microsoft Word|
|End-of-contract data extraction||Users can download reports from the platform that contain candidate data in relation to their status and scores.|
|End-of-contract process||When the contract has ended and not renewed, the account will be closed preventing any access to the data. After a period of time, the data will be deleted using our secure deletion approach.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The mobile and desktop services are identical.
The web service can be accessed using a browser. The mobile service requires a mobile application to be installed.
|Description of service interface||Users access our platform through a browser.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Users access our platform through a browser.|
|Accessibility testing||We use the standard laid out by W3 to test our accessibility.|
|What users can and can't do using the API||We have an API available so that third party applications can interact with ours. This is used to integrate with Applicant Tracking Systems, where users can create assessments, create candidates, invite them to assessments, request a playback link, receive scores and add comments with regards to the candidate and also manage details such as deadlines.|
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||The platform branding can be tailored to provide a unique and engaging candidate experience|
|Independence of resources||
We have extensive monitoring to track the loads that the application is under.
We proactively notify relevant staff members when the load is well below maximum and upgrade it where appropriate.
We ensure we are consistently well below our maximum capacity so that we can cope with any unexpected demand.
|Service usage metrics||Yes|
We provide service usage metrics to the account admin as follows:
Screening: campaign related metrics (answers, scores).
Video Interviewing: campaign related metrics (completion rate, time to complete, device used).
Live: campaign related metrics.
Verify: campaign related metrics (reviewer reliability, range of scores).
|Reporting types||Reports on request|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Other data at rest protection approach||Our data at rest is controlled within AWS that is CSA Compliant.|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Data can be exported in CSV formats for a variety of reports.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||Other|
|Other protection within supplier network||HTTPS for Web, SHA 256 for backend transfer|
Availability and resilience
Up-time commitment: We target at least 99. 9% system availability in any given month.
Sometimes scheduled maintenance is required resulting in planned system downtime. We aim to normally give at least 48 hours notice prior to scheduled downtime, but we may need to perform immediate emergency maintenance in situations where we are not able to give notice.
|Approach to resilience||
Our datacentre is hosted in Amazon AWS where we have a replica database synced with the database in use and ready to be used if the main database is unavailable.
Additionally, we take regular cloud backups and snapshots of the database as well as physical backups.
Planned outages are communicated in advance via e-mail and during the outage in our public availability dashboard.
Unplanned outages will be communicated via e-mail within 15 minutes and also through our public availability dashboard.
The communication includes regular updates about the progress.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Access to systems is strictly controlled based on job role and function.
Only staff who are directly supporting a customer account will have access to that customer account’s data.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
We strictly follow the policies and processes necessary for ISO 27001 certification as well as conforming to the requirements of the Data Protection Act 2018 (GDPR).
Our IT & Security Manager ensures we pursue a Continuous Improvement approach to data security and our Information Security Management System.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
As part of our change management process we track:
1. Any change to a service configuration, e.g. a Chef recipe update, a server patch, a software update, a backup restore.
2. Any change that constitutes a risk to availability to one or more components of our services, e.g. a server restart or a DNS change.
3. Any change to a third-party service we rely on, e.g a third party service configuration or template change, an AWS key update, an endpoint change.
For each change we perform a comprehensive risk assessment which includes risks to availability and security.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Launchpad uses Engine Yard, as a platform provider. Engine Yard monitors the official security page for Gentoo, at https://security.gentoo.org where vulnerabilities are listed.
Automatic tools fetch every announcement and trigger messages to allow dedicated engineers review the case. The first step on defining the priority of the internal ticket is: if the package is not installed by default in the platform, then the priority is set to Low. If the package is installed by default, then the SLA for delivering security fixes follows Gentoo’s own SLA, as listed on section ‘Dispatch / Severity Level’ of the document published on https://www.gentoo.org/support/security/vulnerability-treatment-policy.html.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Engine Yard actively monitors the LaunchPad platform and creates proactive tickets which instantly notify the LaunchPad technical team of potential compromises.
Additionally, LaunchPad has its own monitoring using a third party tool, New Relic is used to monitor the application activity and performance. Potential compromises will immediately notify the Launchpad technical team through a connection between New Relic and LaunchPad's messaging tool. If the alert is confirmed to be a potential compromise the technical team will respond as soon as notified.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||Available on request|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£10000 to £300000 per unit per year|
|Discount for educational organisations||No|
|Free trial available||No|