Checkealos

User experience insights platform - Checkealos

All-in-one platform for user experience feedback, easy analysis of feedback, creating highlight clips, easy reporting of recommendations and easy sharing. Offers both quantitative and qualitative testing.

Helps organisations understand customer behaviour, attitudes, preferences, experiences and expectations through user experience testing, AB testing, multi-variate testing, competitor analysis and surveys.

Features

  • Moderated and unmoderated usability testing
  • AB testing
  • Multivariate testing
  • Quantitative and qualitative studies
  • Set up your own research participants for feedback
  • Easy project analysis, reporting and sharing
  • Easy to cut issue highlight video clips
  • Screen interaction and audio feedback recording
  • Get feedback across desktop, mobile and tablets
  • Cloud storage capacity increased as needed

Benefits

  • Standardise and unify all user research and customer insights.
  • Test 100's of users in their natural context
  • Test without geographical limitations
  • Obtain core usability metrics: efficiency, effectiveness and satisfaction
  • Qualitative and quantitative analysis
  • Statistically significant results to help decision making
  • Run unlimited studies as needed
  • Built for agile and lean service development
  • Unlimited play and sharing of issue highlight video clips
  • Unlimited play and sharing of full feedback videos

Pricing

£15000 per licence

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

899782836809262

Checkealos

Sreeramen Ramaswamy Santhanam

07579403138

sreeramen@checkealos.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Planned maintenance and deployments will be conducted with advance notice to prevent any unexpected disruptions.
System requirements
  • Java6 and above version free software is needed for recording
  • Native Android recorder app to be downloaded for screen recording
  • Native iOS recorder app to be downloaded for screen recording

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical /Emergency < 1 hour ; High < 2 hours ; Medium < 3 hours; Low < 48 hours

Non-critical questions will only be answered during weekdays.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible None
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels Critical /Emergency < 1 hour ; High < 2 hours ; Medium < 3 hours; Low < 48 hours. Non-critical questions will only be answered during weekdays.

£1000/day charge applied for in-person support.

An account manager will be assigned for every account.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started On-boarding workshop happens with every subscription purchased. We also provide online and webcasts based training. On-demand onsite training and support could be requested as needed.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data stored as PDF reports and videos. So users get CSV, PDF and MP4 files.
End-of-contract process Buyers will choose to terminate contract or renew for another annual period. Existing projects would be completed.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Works well on both devices. All aspects are available both on Desktop and Mobile.
API No
Customisation available Yes
Description of customisation Software-as-a-service (SaaS) allows
- Analysis report customisation to suit their reporting needs and branding
- Use buyer's own research participants panel instead of what Checkealos supply.
- Use buyers's UX analysts or researchers to complete analysis instead of what Checkealos supply.
- Adjust the usage of web server and cloud hosting as per needs
- Requesting Checkealos end-user feedback panel
- Requesting Checkealos analyst panel
- Multi-language testing
- Number of named accounts
- Number of simultaneous live studies publication

Buyer or administrator within buyer can request changes.

Scaling

Scaling
Independence of resources We consistently monitor and upgrade based on demand on processing and storage to ensure availability and reliability. This way we guarantee least possible impact. We have dedicated account manager provided for the clients.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Using CSV or Spreadsheet formats.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 99.97% available. We help to address any availability issue and resolve it immediately. We would have maintenance downtime hours for which we would plan and inform earlier. No refunds would be offered.
Approach to resilience This is available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels We use SSL certificate which provides in-transit data protection.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We have in-house experts continuously monitoring and reporting. We do penetration testing for our software.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach - The status, location and configuration of service components (both hardware and software) are tracked throughout their lifetime.
- Changes to the service are assessed for potential security impact. Then managed and tracked through to completion.
Vulnerability management type Supplier-defined controls
Vulnerability management approach - Relevant sources of information relating to threat, vulnerability and exploitation techniques are monitored by the service provider
- The severity of threats and vulnerabilities is considered within the context of the service and this information is used to prioritise the implementation of mitigations.
- Using a suitable change management process, known vulnerabilities are tracked until mitigations have been deployed
Protective monitoring type Supplier-defined controls
Protective monitoring approach - The service generates adequate audit events to support effective identification of suspicious activity
- These events are analysed to identify potential compromises or inappropriate use of your service
- Prompt and appropriate actions taken to address incidents
Incident management type Supplier-defined controls
Incident management approach - Incident management processes are in place for the service and are actively deployed in response to security incidents
- Pre-defined processes are in place for responding to common types of incident and attack
- A defined process and contact route exists for reporting of security incidents by consumers and external entities
- Security incidents of relevance to you will be reported in acceptable timescales and formats

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £15000 per licence
Discount for educational organisations Yes
Free trial available Yes
Description of free trial One time trial with five end-user credits.

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑