KPI Management & Dashboards
If you need to manage your Key Performance Indicators (KPIs) more effectively and make decisions based on the output, Spider Strategies® Spider Impact® can link measures to goals, objectives and initiatives/projects. The output can be presented as aggregated dashboards, reports/charts, online briefings and as documents in multiple formats.
Features
- Key Performance Indicator (KPI) Management
- Goal Setting both for KPIs and Objectives
- Dashboard Building with Structured Elements
- Dashboard Sharing to External Devices (no need to sign on)
- Alerts, both e-mail and internally
- Mobile Enabled
- Free Online Training and Support
- Balanced Scorecards
Benefits
- Manage and view your KPIs from any location
- Write notes and kick off tasks related to changes
- Build a system within days, including dashboards
- View and share dashboards external to the system
- Publish pixel-perfect reports in Word, PDF and PowerPoint
Pricing
£20 to £125 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 1 8 1 6 3 6 3 0 2 4 7 3 3 3
Contact
Intrafocus Limited
Clive Keyte
Telephone: 07786230792
Email: clivekeyte@intrafocus.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None for the Public Cloud-based service. For a Private Cloud-based service there is a minimum server configuration requirement
- System requirements
-
- Access to the Internet for the Public Cloud-based service
- Minimum server configuration for the Private Cloud-based service
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within normal UK business hours, we respond within an hour
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
A UK business hours helpdesk is provided as part of the service. Software support follows a typical 3-tier process of 1st-line, 2nd-line and 3rd-line support. 'Getting Started' support is provided in the form of 2 x 1-hour online training sessions. A named account manager is allocated for the first three months of service followed by a general ticketing system. There are a set of online training videos and a comprehensive 'category' online user guide.
Formal on-site training is available for administrators if required. This is chargeable at a standard day rate. For large implementations, a one-day training session is recommended - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A 'Getting Started' package comes with the service and consists of:
- Two one-hour online training sessions
- Online video guides
- A comprehensive 'category-based' online user guide
- A named account manager for the first three months of service - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The application has an 'export' function to various document formats including MS-Excel for any 'metric' type data.
- End-of-contract process
-
At the end of the contract, there are no additional costs. Enough time is provided for users to extract their data and then for security reasons the application and all associated data is deleted.
The backend database can be provided as a zip file if required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The software application is device-responsive, so the interface and function adjust automatically to best suit the device and screen size.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The workload on our servers is monitored continuously and adjusted to provide a scalable customer experience.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Through the application itself - That is; measures can be added
Also through SQL calls to the database - this is limited to read-only with a selection of SQL calls - Reporting types
- API access
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Spider Strategies®, Inc. Software solution services available: Spider Impact®
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- Physical access control. Only members of Spider Strategies’ support team have physical access to the server.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There is a 'Send To' function that allows users to export their data to Word, PowerPoint, PDF and where applicable Excel
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Word
- PowerPoint
- Data import formats
-
- CSV
- Other
- Other data import formats
- Direct from various source databases
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Transported data encrypted with SSL using SHA-2 and 2048-bit encryption
- Data protection within supplier network
- Other
- Other protection within supplier network
- All system components reside together on the same server. A customer's data is stored in a MySQL database in an unencrypted state.
Availability and resilience
- Guaranteed availability
-
Service levels are based on the severity of problems reported:
Severity 1 - Critical Impact - One business day
Severity 2 - Major Impact - One business day
Severity 3 - Minor impact - Two business days
Severity 4 - No Impact - Three business days
No Error (e.g. functionality question) - Two business days
A complete service level guide is available if required. We do not offer financial refunds - Approach to resilience
- Available on request
- Outage reporting
-
Planned outages information is sent out via e-mail prior to the event
Users are informed about unplanned outages via e-mail
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Username AND Password
- Access restrictions in management interfaces and support channels
-
Users of the application are defined as one of three categories:
Power User - full control of the interface
Communication User - no control of the management interface, update access for metrics
Viewer - view only access - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Username AND Password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- The CIO personally oversees all security measures and risk mitigation.
- Information security policies and processes
- Security is the responsibility of the CIO and a small support team.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes are evaluated and tested in non-production environments before implemented in a customer environment.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Historically, we have gained knowledge of vulnerabilities from web-based information sites. This year (2019), we are implementing vulnerability scanning software to provide us with faster information. Patches are regularly applied quarterly and are applied within a day for a severe situation.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We monitor both system performance and visual inspection of the systems. We have never experienced an incident but would respond immediately.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users contact us via email or web. We utilize a 3rd party Help Desk system (ZenDesk) for tracking and managing issues. Follow-ups and resolutions to issues are provided via ZenDesk tickets. We also provide an account manager who will respond to emergencies via a telephone query.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Intrafocus makes every attempt to source materials and uses suppliers that have published responses to climate change. - Covid-19 recovery
-
Covid-19 recovery
Intrafocus has managed to steer through the Covid-19 pandemic well. Although our consultancy services were negatively affected, our software sales were good and indeed enable many organisation to track KPIs related to their pandemic recovery - Tackling economic inequality
-
Tackling economic inequality
We have a published response to Modern Slavery and Human Trafficking: https://www.intrafocus.com/modern-slavery-act/
As a small business, we are in a privileged position where we can choose to take on clients who we believe have a good response to economic inequality. - Equal opportunity
-
Equal opportunity
All of our staff and suppliers are brought on board with a view to providing equal opportunity - Wellbeing
-
Wellbeing
Well-being is a prime consideration for intrafocus. Indeed, we undertook a survey on this topic and published the results which can be seen here: https://www.intrafocus.com/2017/03/uk-workforce-undervalued/ and a further article here:
https://www.intrafocus.com/2018/10/employee-health-and-wellbeing/
Pricing
- Price
- £20 to £125 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Upon request: A 30-day fully functional dedicated cloud-based system for as many users as required.
There is a free-to-view public system available as well, this is restricted to view-only activities. See below for the link - Link to free trial
- For the public open version: https://www.intrafocus.com/quickscore-preview/ . To order a dedicated trial: https://www.intrafocus.com/free-trial/ .