Kinseed

Flare Digital Signage Suite

Flare provides modern, cutting-edge digital signage at a fraction of the cost of traditional signage solutions. Utilising secure cloud technology and an extensible API, turn any existing monitor, screen or large scale display into a responsive, gorgeous digital signage platform.

Features

  • Digital Signage
  • External marketing signage
  • Internal corporate / office signage
  • Live data dashboards
  • Remote administration through any web browser

Benefits

  • Low cost, simple hardware deployment
  • Modern web-based administration interface
  • Extremely rapid content updates
  • Easily and seamlessly manage any number of screens
  • Connect to a myriad of services to display live content
  • Engage with viewers through social interactions
  • Increase customer/employee engagement with rich content
  • Reduce the need to print paper communication - save money
  • Enable central vs local control of content publishing
  • Modern Comms channel

Pricing

£15 to £30 per device per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

914641764738164

Kinseed

Dr. Pal Bhusate

+447810816231

pal.bhusate@kinseed.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Flare signage requires an existing screen to deploy (this can be separately arranged and installed)
System requirements
  • HDMI Connector
  • Standard 3-pin power socket
  • WiFi or RJ-45 Ethernet

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Initial response within 30 minutes to confirm ticket has been logged and is being investigated. Initial engineer response is dependent on SLA - but usually within 24 hours.

IT should be noted that 24/7 support, based on agreed SLAs for different business units and services - all at a negotiable flat rate
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels 24/7 support availability - initial tickets and incidents raised through telephone or email channels, onsite support available, covered under license and support cost of product. Onsite cost and SLA are based on customer's specific requirements
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Initial setup and tutorials are provided by the team, along with extensive documentation. Live support through the tool itself is always available, as well as the opportunity to arrange face-to-face training sessions.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction All data contained in the service will be archived and sent to the customer either digitally or through physical media, as appropriate.
End-of-contract process At the end of the contract, digital signs will continue to display content, with an on-screen overlay indicating "UNLICENSED COPY OF PIXELNEBULA FLARE". After a period of time, these devices will become inactive, and once data is extracted and "handed back" to the customer, the accounts will be shut down and removed from the system.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Flare uses a responsive design for all administration screen elements, allowing users to more easily access functions on screen based on their device size - Phone, Tablet, or Desktop
API Yes
What users can and can't do using the API Using the API available through flare, users can:
- Connect to external data sources to bring in live data to digital signs
- Automatically populate content on flare from external systems, triggering specific display slides or content to appear on specific triggers from external systems
- Manage the functionality of the system, turning remote devices on or off, or administering user access
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation Flare can be customised to meet customer needs, including:
- Branded templates, allowing users to create digital signs with your specific branding, without having to open Photoshop, Illustrator, or other complex packages
- Connection to custom external services, such as twitter feeds, RSS feeds, weather reports, tube status, and more
- Design of custom "slide types", allowing for specific common slide types used by your organisation to be replicated easily and simply in future.

Scaling

Scaling
Independence of resources Each instance of flare is hosted entirely independently of other users and organisations. The design of flare is exceptionally process and memory efficient - but if resources are strained, our cloud solution allows us to ramp up memory, processing power and storage space instantly and transparently to end users.

Caching on remote devices ensures downtime or network speed constraints will not affect live viewing of content on digital signage displays.

Analytics

Analytics
Service usage metrics Yes
Metrics types Metrics on administrative users, uptime for devices, status changes and transactional interactions.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Pixelnebula

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach N/A
Data export formats Other
Other data export formats N/A
Data import formats
  • CSV
  • Other
Other data import formats
  • Standard image formats
  • Standard video formats

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% uptime guarantee
Approach to resilience Redundant and failover connections allow central management system to remain highly resilient, while on-device caching ensures even if the system "goes down" centrally, digital signs will continue to display content as long as the screen is kept turned on.
Outage reporting Email alerts to key customer contacts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels User access management is administered through a simple to use central security console, allowing administrators to choose role-based security levels for all users, monitor access, and restrict / remove unnecessary accounts.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QMS International
ISO/IEC 27001 accreditation date 22/09/2017
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification Yes
Who accredited the ISO 28000:2007 QMS International
ISO 28000:2007 accreditation date 22/09/2017
What the ISO 28000:2007 doesn’t cover N/A
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Cyber Essential Certificate no.: 3869795257607138
  • ICO Certificate ZA178776

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Regular reviews and checks with third party advisors and bodies, along with quarterly internal operational reviews - focusing on security processes, analytics and vulnerability assessments.
Information security policies and processes All customer information is encrypted at rest and in transit. All employees and staff are fully trained on security considerations and a regular review / audit of our end to end security exposure is conducted.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All service components are managed and tracked through from specific technical data to traceability matrices. Any changes implemented on the service move through a development, stage and pre-production environment lifecycle, before ever touching live data / systems.
Vulnerability management type Supplier-defined controls
Vulnerability management approach All changes to the system undergo rigorous regression tests, along with a suite of automated black-box and white-box testing methodologies. Alongside this, regular spot checks and planned testing / vulnerability assessment activities are performed at frequent, random intervals, to identify specific unpatched vulnerabilities.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Access control and transactional logs are monitored on a regular basis, and specific exception activities (incorrect passwords followed by one correct, etc) are automatically flagged to central management consoles, allowing the team to investigate quickly and effectively.
Incident management type Supplier-defined controls
Incident management approach Most common incidents are quickly resolved using pre-defined processes and controls. In the event of a user experiencing an issue, a ticket is raised with support (through email or phone call), and a member of the engineering team is immediately assigned to investigate, remediate, and determine route cause (along with appropriate low level fixes to avoid repeat issues).

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £15 to £30 per device per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial 30 days free trial of 3 screen devices

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑