Datorama’s Marketing Intelligence solution helps marketers understand the impact of their marketing on their business KPIs. We connect all marketing data sources together to form a single source of truth for more efficient reporting, insightful dashboards/visualisations, better decision making and total control over their marketing performance.
- Prebuilt API connectors to marketing platforms and databases
- Custom connector to bring in with ANY data source
- Pre-built marketing data model to harmonise all data sources
- Comprehensive suite of analytics applications
- Security management providing controlled platform access, capability & data access
- Visualisations, Automated reporting, KPI monitoring, actions centre
- Easy to use Web based UI
- Dashboards that can be templated and share easily
- A single source of truth for all your marketing data
- Increased productivity through each business user accessing the data
- Marketing Campaign optimisation
- Marketing efficiency savings
- Time saved through automated reporting
- Transparency into all media performance
- Total control over your marketing efforts
- Powerful insight from dynamic visualisations
£2000 per licence per month
Datorama UK Ltd
0203 621 1644
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
Platform is designed to be used on a supported self service basis with Datorama Client success function training business users who will then continue to work in the platform.
Managed service options are available if required.
|System requirements||Access to Datorama is through a web based UI|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Responses to non urgent tickets are usually within 72 hrs.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Support through allocated client success manager.
Techincal support is co-ordinated through your client success manager if required
|Support available to third parties||Yes|
Onboarding and offboarding
Onsite training for platform fundamentals
Further training via online meeting or over the phone.
Supported by online materials + including knowledge base with Datorama platform
|End-of-contract data extraction||All data can be extracted directly from the software at all times, in a variety of formats|
User access will be disabled upon termination date.
Data extraction will need to have been done in advance.
The account is scheduled for deletion.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Responsive design provides mobile functionality.
The mobile app will typically be used to log in and monitor performance, rather than e.g. building dashboards.
|Accessibility standards||WCAG 2.0 AAA|
|Accessibility testing||N/A - Standard software testing|
|What users can and can't do using the API||
Datorama provides a fully supported REST API for pulling data in real time from the application.
Users can perform all actions they have permission for, the same actions that they can do by using the UI.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||
Easy to use customisation for dashboards and visualisations.
White labelling of account to show specific logo
Applying their own business logic to measurements and data dimensions
Using custom CSS and JS /HTML to configure look and feel of dashboard pages.
|Independence of resources||
The system architecture deploys automatic load balancing to manage user demand . In addition Datorama operates a Service Level Agreement.
Datorama will use commercially reasonable efforts to make the platform available with a Monthly uptime percentage of 99.9%. We have specified response times for issues.
|Service usage metrics||Yes|
User last log in
Number of log ins within defined time period
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||No|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||
Users can export their data directly from the UI in a number of formats by clicking "export to …XLS/PPT/PDF etc" .
Alternatively, admin users can export their data directly from the data stream UI.
Users can also schedule flat file reports and query our reporting API
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||Datorama operates a service Level agreement. Datorama will use commercially reasonable efforts to make the Datorama Platform available with a Monthly Uptime Percentage of at least 99.9%, in each case during any monthly billing cycle (the “Service Commitment”), excluding “scheduled maintenance window” and “Other Causes".|
|Approach to resilience||The solution supports HA across the entire stack and utilizing industry best practices to monitor and proactive action when needed prior to any failures.|
Datorama monitors all its infrastructure and service using active and passive checks (Zabbix, Newrelic, Pingdom, other propriety checks).
Datorama alerting system OpsGenie is based on the monitor tools mentioned and is fully integrated with those services/tools.
Datorama will notify business users via email of an ongoing issue or outage.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Access to different parts in the platform can be controlled by applying restrictions or granting access. >> Admin: Can control Data Streams, Brands, Users, etc.
Editor: Can create Dashboards, pages, can be allowed access to Dimensions, Measurements and Media Cost Center.
Analyst: Can work with Dashboards, Pages, and change Date Ranges, can be allowed to save changes and change Filters.
Viewer: Can view Dashboards and Pages, and change the date ranges in the pages (without saving). >> All user permissions are controlled with a variety of checkboxes and filters that are controlled by the Admin of the account.
|Access restriction testing frequency||Less than once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||SII Quality & Certification Division (QCD)|
|ISO/IEC 27001 accreditation date||27/06/2016|
|What the ISO/IEC 27001 doesn’t cover||NA|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
Datorama has an information security policy in place. Datorama director of IT is responsible that the policy is followed
Statement of responsibility
The Internet and e-mail
Access codes and passwords
Copyrights and license agreements
A copy of the this document is available on request.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
New systems are deployed with the latest updates, security fixes, and Datorama configurations and existing systems are decommissioned as customers are migrated to the new instances. This process allows Datorama to keep the environment up-to-date. Since customer applications run in isolated environments, they are unaffected by these core system updates.
Further, each component type is assigned to a unique network security group. These are designed to restrict access to the protocols required. e.g. applications running within an isolated dyno are denied access to Datorama management infrastructure as each is within its network-security group and access is not allowed between them.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Network-based intrusion detection systems (IDS) monitor network traffic and activity for intrusion and Datorama SaaS Information Technology SaaS team leverages multiple network and application monitoring tools to continuously scan for errors or suspicious activities. Datorama hosted environment is completely separate from Datorama corporate environment. Access is restricted to SaaS Operations personnel, and authentication requires a separate set of credentials.
Datorama clients access the Datorama environment via the public Internet. All data transfers from Datorama SaaS Solutions must use secure protocols; all data transfers to Datorama SaaS Solutions default to secure protocols.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Datorama has practices in place as part of its business continuity planning to assist management in identifying and managing risks that could affect the organization’s ability to provide reliable services to its clients. These practices are used to identify significant risks for the organization, initiate the identification and/or implementation of appropriate risk mitigation measures, and assist management in monitoring risk and remediation activities.
Datorama uses industry standard enterprise application management solution to monitor systems, trigger alerts and facilitate alerting and risk assessment.
24×7 monitoring of critical network events with intrusion detection system (IDS) gives the ability to identify unauthorized access
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||We run security tests on a nightly basis with alerts being sent. Escalation procedures exist to ensure the timely communication of significant security incidents through the management chain and ultimately to any affected client.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£2000 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|