User experience insights platform - Checkealos

All-in-one platform for user experience feedback, easy analysis of feedback, creating highlight clips, easy reporting of recommendations and easy sharing. Offers both quantitative and qualitative testing.

Helps organisations understand customer behaviour, attitudes, preferences, experiences and expectations through user experience testing, AB testing, multi-variate testing, competitor analysis and surveys.


  • Moderated and unmoderated usability testing
  • AB testing
  • Multivariate testing
  • Quantitative and qualitative studies
  • Set up your own research participants for feedback
  • Easy project analysis, reporting and sharing
  • Easy to cut issue highlight video clips
  • Screen interaction and audio feedback recording
  • Get feedback across desktop, mobile and tablets
  • Cloud storage capacity increased as needed


  • Standardise and unify all user research and customer insights.
  • Test 100's of users in their natural context
  • Test without geographical limitations
  • Obtain core usability metrics: efficiency, effectiveness and satisfaction
  • Qualitative and quantitative analysis
  • Statistically significant results to help decision making
  • Run unlimited studies as needed
  • Built for agile and lean service development
  • Unlimited play and sharing of issue highlight video clips
  • Unlimited play and sharing of full feedback videos


£15000 per licence

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

8 9 9 7 8 2 8 3 6 8 0 9 2 6 2



Sreeramen Ramaswamy Santhanam


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Planned maintenance and deployments will be conducted with advance notice to prevent any unexpected disruptions.
System requirements
  • Java6 and above version free software is needed for recording
  • Native Android recorder app to be downloaded for screen recording
  • Native iOS recorder app to be downloaded for screen recording

User support

Email or online ticketing support
Email or online ticketing
Support response times
Critical /Emergency < 1 hour ; High < 2 hours ; Medium < 3 hours; Low < 48 hours

Non-critical questions will only be answered during weekdays.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat accessibility testing
Onsite support
Yes, at extra cost
Support levels
Critical /Emergency < 1 hour ; High < 2 hours ; Medium < 3 hours; Low < 48 hours. Non-critical questions will only be answered during weekdays.

£1000/day charge applied for in-person support.

An account manager will be assigned for every account.
Support available to third parties

Onboarding and offboarding

Getting started
On-boarding workshop happens with every subscription purchased. We also provide online and webcasts based training. On-demand onsite training and support could be requested as needed.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data stored as PDF reports and videos. So users get CSV, PDF and MP4 files.
End-of-contract process
Buyers will choose to terminate contract or renew for another annual period. Existing projects would be completed.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Differences between the mobile and desktop service
Works well on both devices. All aspects are available both on Desktop and Mobile.
Service interface
Customisation available
Description of customisation
Software-as-a-service (SaaS) allows
- Analysis report customisation to suit their reporting needs and branding
- Use buyer's own research participants panel instead of what Checkealos supply.
- Use buyers's UX analysts or researchers to complete analysis instead of what Checkealos supply.
- Adjust the usage of web server and cloud hosting as per needs
- Requesting Checkealos end-user feedback panel
- Requesting Checkealos analyst panel
- Multi-language testing
- Number of named accounts
- Number of simultaneous live studies publication

Buyer or administrator within buyer can request changes.


Independence of resources
We consistently monitor and upgrade based on demand on processing and storage to ensure availability and reliability. This way we guarantee least possible impact. We have dedicated account manager provided for the clients.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Using CSV or Spreadsheet formats.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.97% available. We help to address any availability issue and resolve it immediately. We would have maintenance downtime hours for which we would plan and inform earlier. No refunds would be offered.
Approach to resilience
This is available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
We use SSL certificate which provides in-transit data protection.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have in-house experts continuously monitoring and reporting. We do penetration testing for our software.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
- The status, location and configuration of service components (both hardware and software) are tracked throughout their lifetime.
- Changes to the service are assessed for potential security impact. Then managed and tracked through to completion.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
- Relevant sources of information relating to threat, vulnerability and exploitation techniques are monitored by the service provider
- The severity of threats and vulnerabilities is considered within the context of the service and this information is used to prioritise the implementation of mitigations.
- Using a suitable change management process, known vulnerabilities are tracked until mitigations have been deployed
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
- The service generates adequate audit events to support effective identification of suspicious activity
- These events are analysed to identify potential compromises or inappropriate use of your service
- Prompt and appropriate actions taken to address incidents
Incident management type
Supplier-defined controls
Incident management approach
- Incident management processes are in place for the service and are actively deployed in response to security incidents
- Pre-defined processes are in place for responding to common types of incident and attack
- A defined process and contact route exists for reporting of security incidents by consumers and external entities
- Security incidents of relevance to you will be reported in acceptable timescales and formats

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£15000 per licence
Discount for educational organisations
Free trial available
Description of free trial
One time trial with five end-user credits.

Service documents

Return to top ↑