Mastodon C Ltd

Witan Looked After Children projections and data analysis

A suite of powerful analysis and simulation mathematical modelling tools that enable local authorities to utilise their data more effectively to accurately project the level and type of demand for Looked After Children (LAC) and model strategic future ‘what-if’ scenarios.


  • Accurate and fast insight into likely future demand for services
  • Evidence to support strategic decisions and planning
  • Understand knock on impacts of decisions across the service
  • Work with experts to validate, analyse, and project your data
  • Flexible and easy to update with new data and scenarios
  • Insight into the historical demand and costs of your services
  • Project policy changes that will affect service demand and provision
  • Enables evidenced options conversations between finance and service delivery managers
  • Concentrate on service configuration and let Witan model costs
  • Validate if your data is good enough for other analysis


  • Flexible data upload from line of service operational systems
  • Can utilise ONS or local authority population projections
  • Comprehensive data validation reporting to assure input data quality
  • Analysis and visualisation of historic demand features and trends
  • Projection of future demand using advanced machine learning models
  • Detailed demand projections as charts and CSVs of base data
  • Flexible scenario modelling functionality to explore what-if scenarios
  • Results reporting customised to strategic and operational audiences
  • Fast responsive expert technical and modelling helpdesk
  • Expert advice on service policy context and future strategy


£8250 to £24800 per licence per year

Service documents


G-Cloud 11

Service ID

8 9 1 8 5 0 2 5 7 0 3 5 2 2 1


Mastodon C Ltd

Bruce Durling

0203 397 8446

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints N/a
System requirements N/a

User support

User support
Email or online ticketing support Email or online ticketing
Support response times During office hours, the response time is within one business day. There are no weekend support hours.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels See above
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onboarding includes assessing available data and helping the client to set up the model. A data scientist from Mastodon C will work closely with the client to review user requirements, collect data and validate data.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data can be downloaded from the system. Usually in csv format.
End-of-contract process N/a

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices No
Service interface No
Customisation available Yes
Description of customisation New models can be added to the system for a fee. New data visualisation can be added to the system for a fee. New extensions to the model can be added to the system for a fee.


Independence of resources N/a


Service usage metrics Yes
Metrics types Usage reports are available on request.
Reporting types Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users receive all of their data at each step of the process. All data is always available to them.
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks Encryption of transmitted files.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Best effort.
Approach to resilience N/a
Outage reporting We'll alert customers by email if there is an outage.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels N/a
Access restriction testing frequency Less than once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We are congruent with ISO 270001 principles.
Information security policies and processes See above

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach N/a
Vulnerability management type Undisclosed
Vulnerability management approach N/a
Protective monitoring type Undisclosed
Protective monitoring approach N/a
Incident management type Undisclosed
Incident management approach N/a

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £8250 to £24800 per licence per year
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑