Onalytica

Influencer Marketing Software Platform

Onalytica provides a platform which allows for Identification, Validation, Mapping, Management, Activation and Measurement of social media influencers.

Features

  • Real-time influencer insights feed
  • Influencer network maps
  • Alerts & notifications
  • Influencer measurement charts
  • Content matching feature
  • Influencer search tool

Benefits

  • Save time understanding influencers
  • Automate influencer outreach process
  • Automate influencer validation
  • Save time on influencer outreach
  • Allow cross team approach to influencer marketing

Pricing

£18000 to £200000 per unit per year

Service documents

G-Cloud 11

841538010950383

Onalytica

Tom Ward

07955213012

tom.ward@onalytica.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints N/a
System requirements Latest version of common browsers e.g Chrome, Edge.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We manage requests via Intercom and respond to requests within 2 hours during office hours as standard.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing We haven't done any testing with assistive technology users. We use Intercom's web chat facility which has been tested by Intercom.
Onsite support Yes, at extra cost
Support levels We provide support customising the service for clients (e.g. influencer tagging, topic search string writing and building dashboards). Technical support is not provided as all services are accessible through the browser.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide online training to new users as well as ongoing training sessions if needed. This is uncapped.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Lists and reports can be exported directly from the app in csv format.
End-of-contract process Users can extract reports and lists from the app themselves. If they require us to export lists and/or reports for them we reserve the right to charge for this if the request is for a large number of lists and custom reports.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Service interface No
API No
Customisation available No

Scaling

Scaling
Independence of resources We regularly conduct performance tests to ensure that the performance and reliability of our app is not affected by spikes in usage from users. We have mechanisms in place to scale the resources allocated to our app to ensure optimal performance for all clients.

Analytics

Analytics
Service usage metrics Yes
Metrics types We track user sessions, unique user sessions, and which sections of our app are used and the journey between sections of our app.
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach AWS IAM roles for senior engineering personal (2FA enabled)
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can export data via .csv download.
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Other
Other protection within supplier network Amazon (ACL) Access Control List, Segmented networks

Availability and resilience

Availability and resilience
Guaranteed availability 99.95% uptime
Pro rata refund for downtime period.
Approach to resilience All services under Onalytica's control are architected for redundancy. AWS adds it's own layer of underpinning redundancy.
Outage reporting Email alerts.
Status page for planned maintenance.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Our management interface for our web application is deployed as a standalone application restricted to internal staff.
Our management interface to our cloud supplier (AWS) is protected by 2FA and tiered access to our engineering staff on a least privilege basis.
Support channels are managed by a third party (Intercom).
Access restriction testing frequency Less than once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Follow National Cyber Security Centre guidance.
https://www.ncsc.gov.uk/collection/saas-security?curPage=/collection/saas-security/saas-security-principles
Information security policies and processes Development practices stipulate all data must be segregated between clients, encrypted in transit, and internal and external API's authenticated.
Access control to data services follow the principal of least privilege.
All connection data and API key's are managed and accessed via an encrypted store.
Mandatory code reviews ensure guidance is followed and implemented correctly.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our AWS infrastructure is defined as code and all changes are tracked and reviewed in line with security guidelines in our source control system.
Vulnerability management type Undisclosed
Vulnerability management approach Our services are for the most part managed by the AWS platforms- patches are applied automatically.
Where services are under our own control and not automatically patched by AWS we subscribe to the support feeds of the suppliers of our components and apply patches when recommended/advised.
Protective monitoring type Undisclosed
Protective monitoring approach Our cloud provider (AWS) manages all protective monitoring of our internal (VPC) networks on our behalf.
For our own web facing services all requests are logged and we frequently check our logs suspicious activity.
We do not have dedicated monitoring / devops resource so incident response is next working day.
Incident management type Undisclosed
Incident management approach Any application incidents are tracked through our support ticketing system.
Users may report incidents either in-app (Intercom) or via email to our customer team.
We do not yet have an incident reporting procedure in place.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £18000 to £200000 per unit per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑