Datorama UK Ltd

Datorama Marketing Analytics Platform

Datorama’s Marketing Intelligence solution helps marketers understand the impact of their marketing on their business KPIs. We connect all marketing data sources together to form a single source of truth for more efficient reporting, insightful dashboards/visualisations, better decision making and total control over their marketing performance.


  • Prebuilt API connectors to marketing platforms and databases
  • Custom connector to bring in with ANY data source
  • Pre-built marketing data model to harmonise all data sources
  • Comprehensive suite of analytics applications
  • Security management providing controlled platform access, capability & data access
  • Visualisations, Automated reporting, KPI monitoring, actions centre
  • Easy to use Web based UI
  • Dashboards that can be templated and share easily


  • A single source of truth for all your marketing data
  • Increased productivity through each business user accessing the data
  • Marketing Campaign optimisation
  • Marketing efficiency savings
  • Time saved through automated reporting
  • Transparency into all media performance
  • Total control over your marketing efforts
  • Powerful insight from dynamic visualisations


£2000 per licence per month

Service documents

G-Cloud 9


Datorama UK Ltd

Phil Dance

0203 621 1644


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Platform is designed to be used on a supported self service basis with Datorama Client success function training business users who will then continue to work in the platform.

Managed service options are available if required.
System requirements Access to Datorama is through a web based UI

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Responses to non urgent tickets are usually within 72 hrs.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Support through allocated client success manager.
Techincal support is co-ordinated through your client success manager if required
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite training for platform fundamentals
Further training via online meeting or over the phone.
Supported by online materials + including knowledge base with Datorama platform
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction All data can be extracted directly from the software at all times, in a variety of formats
End-of-contract process User access will be disabled upon termination date.
Data extraction will need to have been done in advance.
The account is scheduled for deletion.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10+
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Responsive design provides mobile functionality.
The mobile app will typically be used to log in and monitor performance, rather than e.g. building dashboards.
Accessibility standards WCAG 2.0 AAA
Accessibility testing N/A - Standard software testing
What users can and can't do using the API Datorama provides a fully supported REST API for pulling data in real time from the application.
Users can perform all actions they have permission for, the same actions that they can do by using the UI.
API documentation Yes
API documentation formats
  • HTML
  • PDF
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Easy to use customisation for dashboards and visualisations.
White labelling of account to show specific logo
Applying their own business logic to measurements and data dimensions
Using custom CSS and JS /HTML to configure look and feel of dashboard pages.


Independence of resources The system architecture deploys automatic load balancing to manage user demand . In addition Datorama operates a Service Level Agreement.
Datorama will use commercially reasonable efforts to make the platform available with a Monthly uptime percentage of 99.9%. We have specified response times for issues.


Service usage metrics Yes
Metrics types User last log in
Number of log ins within defined time period
Reporting types
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data directly from the UI in a number of formats by clicking "export to …XLS/PPT/PDF etc" .

Alternatively, admin users can export their data directly from the data stream UI.

Users can also schedule flat file reports and query our reporting API
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • XLS
  • PPT
  • TSV
  • PNG
  • TXT
Data import formats
  • CSV
  • Other
Other data import formats
  • XLS
  • XML
  • TXT
  • HTML
  • TSV
  • JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Datorama operates a service Level agreement. Datorama will use commercially reasonable efforts to make the Datorama Platform available with a Monthly Uptime Percentage of at least 99.9%, in each case during any monthly billing cycle (the “Service Commitment”), excluding “scheduled maintenance window” and “Other Causes".
Approach to resilience The solution supports HA across the entire stack and utilizing industry best practices to monitor and proactive action when needed prior to any failures.
Outage reporting Datorama monitors all its infrastructure and service using active and passive checks (Zabbix, Newrelic, Pingdom, other propriety checks).
Datorama alerting system OpsGenie is based on the monitor tools mentioned and is fully integrated with those services/tools.

Datorama will notify business users via email of an ongoing issue or outage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Access to different parts in the platform can be controlled by applying restrictions or granting access. >> Admin: Can control Data Streams, Brands, Users, etc.
Editor: Can create Dashboards, pages, can be allowed access to Dimensions, Measurements and Media Cost Center.
Analyst: Can work with Dashboards, Pages, and change Date Ranges, can be allowed to save changes and change Filters.
Viewer: Can view Dashboards and Pages, and change the date ranges in the pages (without saving). >> All user permissions are controlled with a variety of checkboxes and filters that are controlled by the Admin of the account.
Access restriction testing frequency Less than once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 SII Quality & Certification Division (QCD)
ISO/IEC 27001 accreditation date 27/06/2016
What the ISO/IEC 27001 doesn’t cover NA
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Datorama has an information security policy in place. Datorama director of IT is responsible that the policy is followed
It covers
Statement of responsibility
The Internet and e-mail
Computer viruses
Access codes and passwords
Physical security
Copyrights and license agreements

A copy of the this document is available on request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach New systems are deployed with the latest updates, security fixes, and Datorama configurations and existing systems are decommissioned as customers are migrated to the new instances. This process allows Datorama to keep the environment up-to-date. Since customer applications run in isolated environments, they are unaffected by these core system updates.
Further, each component type is assigned to a unique network security group. These are designed to restrict access to the protocols required. e.g. applications running within an isolated dyno are denied access to Datorama management infrastructure as each is within its network-security group and access is not allowed between them.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Network-based intrusion detection systems (IDS) monitor network traffic and activity for intrusion and Datorama SaaS Information Technology SaaS team leverages multiple network and application monitoring tools to continuously scan for errors or suspicious activities. Datorama hosted environment is completely separate from Datorama corporate environment. Access is restricted to SaaS Operations personnel, and authentication requires a separate set of credentials.
Datorama clients access the Datorama environment via the public Internet. All data transfers from Datorama SaaS Solutions must use secure protocols; all data transfers to Datorama SaaS Solutions default to secure protocols.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Datorama has practices in place as part of its business continuity planning to assist management in identifying and managing risks that could affect the organization’s ability to provide reliable services to its clients. These practices are used to identify significant risks for the organization, initiate the identification and/or implementation of appropriate risk mitigation measures, and assist management in monitoring risk and remediation activities.
Datorama uses industry standard enterprise application management solution to monitor systems, trigger alerts and facilitate alerting and risk assessment.
24×7 monitoring of critical network events with intrusion detection system (IDS) gives the ability to identify unauthorized access
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We run security tests on a nightly basis with alerts being sent. Escalation procedures exist to ensure the timely communication of significant security incidents through the management chain and ultimately to any affected client.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £2000 per licence per month
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑