ESP Market Research Analysis
ESP-Consult transforms calls for evidence and public consultation analysis and reporting for public sector organisations. It uses a blend of human and artificial intelligence, automation, and natural language processing to analyse respondents' views accurately and quickly at scale, identifying thematic insights and presenting reports for senior briefings.
Features
- Automated import
- Natural Language Processing
- File parsing
- Cloud processing at scale
- Automated reporting
- Real Time data processing
- Large Language Models
Benefits
- Complete solution to analyse and report public consultations
- Automatically and accurately recognise and prioritise themes
- Automated reporting: Structured outcomes to meet policy team requirements
- Scalability and adaptability to variable volumes of responses
- Deliver 40% savings compared with manual analysis
- Government-tested purpose built machine learning NLP
- Design of online and offline consultations to support pressured teams
- Remove bias whilst retaining decision making control
- Privacy assured through Anonimisation of all responses
- Purpose built, proprietary langiage models which enable quick mobilisation
Pricing
£30,000 to £100,000 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 2 3 2 0 0 0 9 5 4 4 1 0 6 0
Contact
LIVEWIRE CONSULTANCY
Alex Granat
Telephone: 07957592229
Email: alex@livewireconsultancy.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- Structured requirements for policy outcomes
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Monday-Friday 9am - 5pm Initial response best endeavour of one hour
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- We actively assist our customers in developing accessible consultations. We work with customers to pilot consultation with a variety of people with special requirements including autism, carer-assistance and sight impaired.
- Onsite support
- Onsite support
- Support levels
- We apply measures according to the impact of the incident to you. This allows us to categorise incidents from Priority 1 to Priority 4. Example Support Levels: PRIORITY 1 - CRITICAL Priority 1 incidents are likely to critically impact your ability to conduct business. We’ll do our best to respond to a Priority 1 incident within 1 hour. PRIORITY 2 - HIGH IMPACT DISRUPTION Priority 2 incidents are high-impact problems that interrupt your organisation, but there’s still capacity to continue to be productive. We’ll do our best to respond to a Priority 2 incident within 4 hours. PRIORITY 3 - MINOR IMPACT DISRUPTION Priority 3 incidents are medium-to-low impact problems that comprise of limited loss of non-critical business functionality. We’ll do our best to respond to a Priority 3 incident within 8 hours. PRIORITY 4 – INFORMATIONAL REQUEST Priority 4 issues include requests that do not fall within the Priority 1 – Priority 3 classifications. We’ll do our best to respond to a Priority 4 incidents within 24 hours.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite/Online Training options are included in the price. See the service document for details.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- At the end of the contract (or as specified), all data supplied to the client is transferred to the customer. Any resulting data created or derived is delivered in a flat file.
- End-of-contract process
- We will export the requested reports covering the stored data. Access to the systems and insights will be disabled. In accordance with data retention policies, the database will be purged of all customer data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- SFTP, Egress, and direct API are generally used as the service interface. However, we can deliver customer-specific requirements as long as they are compliant with our license and security policies.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Bi-directional data transfer
- Accessibility testing
- N/A as the service interface is used by internal IT users.
- API
- Yes
- What users can and can't do using the API
- A RESTful API option is available. Due to our security policy and legal obligations, setup and changes are not available through the API.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Report structures, templates and formats, Conditional Logic for responses are customisable during the onboarding stage.
Scaling
- Independence of resources
- Each implementation is a separate virtual entity. Also, users can provide a sandbox within their environment, thereby eliminating any outside dependencies.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We deliver customised metrics that communicate the overall performance of the matching, analysis and commercial/operational impacts. Ambiguities and decisions are captured in a shared RAID log.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Reports can be exported in HTML, PDF and CSV format or in a pre-agreed data structure. Matched data is exported in a delimited ASCII file/Microsoft Excel format.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Microsoft Excel
- Mircosoft PowerBI
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Online consultation portal API
- Direct email forwarding
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99% guaranteed availability
- Approach to resilience
- Complete failover to a near-real-time mirrored site. Details available on Request.
- Outage reporting
- Email alerts/telephone. Each client has a designated project owner who will react and communicate directly in the event of outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Roles-based access. Details available on request
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 01/12/2019
- What the ISO/IEC 27001 doesn’t cover
- Details available on request.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Full suite of policies are available on request
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- ISO 27001 Process information available on request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- ISO 27001 Process information available on request.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- ISO 27001 Details available on request
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- ISO 27001 Details available on request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
We prioritise creating new businesses, new jobs and new skills.
1. help new, small organisations to grow, supporting economic growth and business creation. We work through charities to provide free mentorship to new business leaders.
2. - Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors: We operate in data science/AI, where demand for our skills are far higher than the supply. We work with universities to train data science degree apprentices. Our third apprentice is in their final year and actively involved in delivering our public sector services. When they approached us, they didn't have an English GCSE. We sponsored them through the course to enable them to commence the degree.Equal opportunity
Reduce the disability employment gap: We seek to recruit disabled or otherwise disadvantaged people as analysts. We have influenced our public sector clients to facilitate us to test the accessibility of questionnaires with people with special needs such as autism, cerebral palsy and those in care.
Pricing
- Price
- £30,000 to £100,000 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No