Influencer Marketing Software Platform
Onalytica provides a platform which allows for Identification, Validation, Mapping, Management, Activation and Measurement of social media influencers.
- Real-time influencer insights feed
- Influencer network maps
- Alerts & notifications
- Influencer measurement charts
- Content matching feature
- Influencer search tool
- Save time understanding influencers
- Automate influencer outreach process
- Automate influencer validation
- Save time on influencer outreach
- Allow cross team approach to influencer marketing
£18000 to £200000 per unit per year
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|System requirements||Latest version of common browsers e.g Chrome, Edge.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||We manage requests via Intercom and respond to requests within 2 hours during office hours as standard.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.1 AA or EN 301 549|
|Web chat accessibility testing||We haven't done any testing with assistive technology users. We use Intercom's web chat facility which has been tested by Intercom.|
|Onsite support||Yes, at extra cost|
|Support levels||We provide support customising the service for clients (e.g. influencer tagging, topic search string writing and building dashboards). Technical support is not provided as all services are accessible through the browser.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We provide online training to new users as well as ongoing training sessions if needed. This is uncapped.|
|End-of-contract data extraction||Lists and reports can be exported directly from the app in csv format.|
|End-of-contract process||Users can extract reports and lists from the app themselves. If they require us to export lists and/or reports for them we reserve the right to charge for this if the request is for a large number of lists and custom reports.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Independence of resources||We regularly conduct performance tests to ensure that the performance and reliability of our app is not affected by spikes in usage from users. We have mechanisms in place to scale the resources allocated to our app to ensure optimal performance for all clients.|
|Service usage metrics||Yes|
|Metrics types||We track user sessions, unique user sessions, and which sections of our app are used and the journey between sections of our app.|
|Reporting types||Reports on request|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||Less than once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||AWS IAM roles for senior engineering personal (2FA enabled)|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Users can export data via .csv download.|
|Data export formats||CSV|
|Data import formats||
|Other data import formats||Excel|
|Data protection between buyer and supplier networks||Legacy SSL and TLS (under version 1.2)|
|Data protection within supplier network||Other|
|Other protection within supplier network||Amazon (ACL) Access Control List, Segmented networks|
Availability and resilience
Pro rata refund for downtime period.
|Approach to resilience||All services under Onalytica's control are architected for redundancy. AWS adds it's own layer of underpinning redundancy.|
Status page for planned maintenance.
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
Our management interface for our web application is deployed as a standalone application restricted to internal staff.
Our management interface to our cloud supplier (AWS) is protected by 2FA and tiered access to our engineering staff on a least privilege basis.
Support channels are managed by a third party (Intercom).
|Access restriction testing frequency||Less than once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Follow National Cyber Security Centre guidance.
|Information security policies and processes||
Development practices stipulate all data must be segregated between clients, encrypted in transit, and internal and external API's authenticated.
Access control to data services follow the principal of least privilege.
All connection data and API key's are managed and accessed via an encrypted store.
Mandatory code reviews ensure guidance is followed and implemented correctly.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Our AWS infrastructure is defined as code and all changes are tracked and reviewed in line with security guidelines in our source control system.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
Our services are for the most part managed by the AWS platforms- patches are applied automatically.
Where services are under our own control and not automatically patched by AWS we subscribe to the support feeds of the suppliers of our components and apply patches when recommended/advised.
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||
Our cloud provider (AWS) manages all protective monitoring of our internal (VPC) networks on our behalf.
For our own web facing services all requests are logged and we frequently check our logs suspicious activity.
We do not have dedicated monitoring / devops resource so incident response is next working day.
|Incident management type||Undisclosed|
|Incident management approach||
Any application incidents are tracked through our support ticketing system.
Users may report incidents either in-app (Intercom) or via email to our customer team.
We do not yet have an incident reporting procedure in place.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£18000 to £200000 per unit per year|
|Discount for educational organisations||No|
|Free trial available||No|