Idea Spotlight - Accredited Cloud
Idea Spotlight is your Global Home for Ideas - where you capture, evaluate and select the best Ideas to implement and grow; a single place to curate ideas, trends and themes, across the organisation and beyond, whether you are looking to Improve, Innovate, Compete or Reward.
- Create business challenges: problem statements or questions to your audience
- Crowd-source ideas from internal and external users
- Build flexible idea forms & canvases to capture valuable information
- Configure unique workflows for developing, evaluating and selecting ideas
- Engage your audience with a full suite of social features
- Utilise the extensive Evaluation Toolkit to select the right ideas
- Integrate with the Enterprise stack including Microsoft Office365 and SharePoint
- Gain deep insight data analytics & visualisations, reporting and dashboards
- Spotlight.ai to connect People, Ideas and Problems
- Mobile optimised with a complementary native app for online/offline access
- Engage staff in helping to solve complex organisational challenges
- Uncover quick-wins, cost-savings and innovative new ideas
- Boost employee engagement and productivity
- Improve transparency and encourage collaboration
- Best practice advice, training and support from innovation experts
- Simple system management and administration
- AI tools surfacing the right ideas to the right people
- Secure cloud hosting to protect data
- Simple and quick to setup - no software installation
- Excellent ROI with help from industry experts
£8.50 to £60 per user per year
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
There is no pre-requisite infrastructure, software or hardware required to use Idea Spotlight. There are no plugins or additional installations required on any device (e.g. Java). The only requirement is access to an internet-enabled device (desktop, tablet or mobile).
- Internet Explorer v11
- Microsoft Edge (latest)
- Firefox (latest)
- Chrome (latest)
- Safari (latest)
|Email or online ticketing support||Email or online ticketing|
|Support response times||We respond to tickets within 4 hours of receipt during UK working hours (Mon - Fri, 9am - 6pm).|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
Standard support includes a dedicated Wazoku Customer Excellence Consultant to support the client through their initial onboarding experience, whether this is their first step into Idea Management, or augmenting their existing strategy and capabilities.
Technical support is also provided free of charge throughout the contract through an 24/7 online portal and CX Representative during UK business hours.
Additional support is available throughout the life of the contract with a dedicated Customer Success Manager on hand to provide guidance an support to ensure the success of your Idea Management programme.
|Support available to third parties||Yes|
Onboarding and offboarding
• Dedicated Customer Excellence Consultant to guide the client through an iterative onboarding process to fully understand business needs and goals.
• Progress clients from scoping, through training, launch planning and launch, to Business as Usual and future strategy and success planning.
• Comprehensive and interactive training to make the client the expert – engaging sessions to learn by using the platform
• Consultancy and best practice to help build scalable innovation initiatives and idea management and business process workflows.
• Guidance on strategies to ensure the platform achieves desired goals. Setting out the path for the platform and innovation initiative's growth and development within the organisation.
• Audience engagement planning – expertise to ensure the platform is well adopted and utilised on an ongoing basis.
• Technical integration / API support where required to make the most of platform extensions.
• Full project schedule provided and managed throughout to ensure launch timelines and outcome milestones are met.
|End-of-contract data extraction||
Throughout the life of the contract, System Admins can export platform data including ideas, comments, votes, user information, evaluation information.
Upon contract termination, clients are provided a full data export of all client data in a CSV format.
There are no additional fees at contract end.
Upon contract termination, all data can be provided to customer in a CSV format. All data is then removed from Wazoku servers.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Some admin functions that require more detailed configuration are not available on mobile devices.
All end user functions are available on the mobile.
In addition, we offer a native Idea App (iOS and Android) to support adding/editing/voting/commenting on Ideas with online and offline support.
|What users can and can't do using the API||
The API allows users of Idea Spotlight to add, edit, manage and delete content (i.e. ideas, challenges, social) within the platform.
Authentication is through user tokens. Once authenticated users can manage users, manage challenges, add/edit ideas, comment/vote on ideas, manage conversations and utilise the site wide search function.
There are some rate limits in place but these limits can be negotiated on request.
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||Yes|
|Description of customisation||
Idea Spotlight's user interface can be fully personalised and branded, to make it seamless fit within existing internal or external systems. The platform can be configured for a unique registration and login experience.
The platform has built-in tools to allow the organisation to build and maintain their home page, communities & community home pages, idea capture forms, challenge workflows and evaluation criteria.
The platform supports language localisation that permits organisations to select the languages supported for the application interface, as well as Admin tools permit managers to provide user generated content, such as Challenge description, statuses, categories, etc, in different languages.
|Independence of resources||
We employ multiple redundancies for our core services.
We constantly monitor our service and proactively alter the available resources in order to cope with increases in demand.
|Service usage metrics||Yes|
A full analytics portal is provided to system admins including reporting and data analysis on the full range of idea management and innovation metrics.
Challenge Managers have their own challenge-based analytics to provide insight into specific challenges, including engagement, social, financial and time-based metrics.
All users have access to an analytics dashboard that provides information about the platform, including leaderboards and gamification leaderboards.
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Scale, obfuscating techniques, or data storage sharding|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
Admin users can export content including ideas, comments, votes, user information, evaluation information, in a CSV format at any time through the platform. The level of data that can be exported is determined by the admin user's permissions (i.e. a System Admin can export all data, but a Community Admin can only export the data for their community).
Media and attachments can be downloaded by any user given at any time.
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||Other|
|Other protection within supplier network||Internal traffic between different components of the platform is sent unencrypted. This traffic is transmitted via private, virtualised networks, which are secured at the network layer by our hosting partner.|
Availability and resilience
99.9% system uptime SLA across a rolling 3 month reporting period, excluding scheduled and notified maintenance work.
In the event that the Availability Percentage is not achieved, the charges for the period in question will be reduced by the appropriate proportion:
99.5% - 100% = 0%
98.5% - 99.4% = 2%
96.5 – 98.4% = 4%
<96.4 = 8%
|Approach to resilience||Available on request|
|Outage reporting||Outages are reported via email to nominated system administrators, or via service unavailability messages within the service / API.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Our recommended authentication method is through SAML2.0 Single Sign On.|
|Access restrictions in management interfaces and support channels||Access is restricted based on defined user roles.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
|Description of management access authentication||We recommend SAML2.0 Single Sign On.|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||22/01/2019|
|What the ISO/IEC 27001 doesn’t cover||Anything outside the provision of managed hosting, cloud computing, network and colocation services.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials Plus|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
Wazoku have written Data Classification, Data Breach and Disaster Recovery policies - all of which are available on request. Our reporting structure is as follows:
• Simon Hill, CEO
• Rosemarie Diegnan, Chief Strategy & Product Officer and Data Protection Officer
• Chris Bailey, Technical Director
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Wazoku operates an Agile methodology, including full peer-review and security review as part of the software development life cycle.
All developers contribute to the automated test suite comprising unit and integration tests, which are automatically run against all code. Passing the test suite is a prerequisite to the code progressing in the SDLC. The test suite is peer-reviewed and regularly probed to ensure it is testing appropriately.
Wazoku has a dedicated QA team to complete automated and manual testing. Manual tests uncover issues automated tests don't and allow us to address issues before they reach the production environment.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
We run internal (quarterly) and external (annually) vulnerability scans and penetration tests. Actions resulting from these tests are incorporated into our roadmap and and development work required is prioritised.
We run monthly OS level updates against all virtual machines in all environments to ensure that the software they run and the packages they hold are up to date. In cases where a high-level vulnerability is released we will run the upgrade as soon as a patch is made available and we can ensure that any remedial action required will have the minimum effect on active customers.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We collect all system logs to a central aggregation service. This allows us to identify and respond to peaks in traffic as well as inconsistencies in service response and use.
We make use of industry leading intrusion detection systems and review their output and recommendations daily.
We pride ourselves on responding immediately to intrusion events, both with remedial action and notifying customers.
|Incident management type||Supplier-defined controls|
|Incident management approach||
We have a process for incident management outlined in our information security documentation. Users can report incidents through our Helpdesk software or to a representative of our dedicated Customer Success team. Incident reports would be provided for initial contact, regular updates and post mortem. This information would be available through email contact of key persons and through wider reports made available to clients.
Full Incident Response Plan documentation is available on request.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£8.50 to £60 per user per year|
|Discount for educational organisations||No|
|Free trial available||No|