Skip to main content

Help us improve the Digital Marketplace - send your feedback

DISPLAYNOTE TECHNOLOGIES LIMITED

Launcher

Collaboration software for use with touch or non-touch screens in meeting rooms. Windows only interactive panel interface, allowing users to access and launch any video conferencing tools, apps and network drives. Data is wiped from the system and reset after each session.

Features

  • Launch video-conferencing platforms from main display.
  • Quick access to apps, web links and drives from screen.
  • Lockdown your system preventing unwanted access to windows system.
  • Security removes cached data, app sign out and close.
  • Connect with mobile for quick call launch or OneDrive access.
  • Calendar event privacy hides all but organizer and time.
  • Export licence and customized settings to other devices.
  • Customize appearance, logo and images with custom content.
  • Calendar automatically accepts or declines meetings upon availability.

Benefits

  • Works with Teams, Zoom, Webex, Lifesize, GoToMeeting,Google & more.
  • Leverages existing room equipment.
  • Fewer IT help requests and callouts.
  • More control over meeting room security.
  • More digitally inclusive meeting spaces.
  • Less time setting up for conference calls.
  • No personal data left behind.
  • Fewer technical difficulties with more confidence with technology.

Pricing

£350 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at lianne.cassidy@displaynote.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 5 2 5 5 6 6 2 3 1 3 8 6 0 4

Contact

DISPLAYNOTE TECHNOLOGIES LIMITED Lianne Cassidy
Telephone: +44 (0) 2890 730 480
Email: lianne.cassidy@displaynote.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Launcher is a desktop application that operates across a wide range of interactive or non-interactive displays. It does not require high-performance processing power.

Minimum hardware specification is as follows:

 System: Intel Core i3 (8th Gen.) processor, 8GB RAM 64GB storage
 Network: Ethernet or WI-FI (2Mbps and above)
System requirements
  • Minimum OS: Windows 10 version 1809
  • Recommended OS: Windows 10 version 1909

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 24 hours between Monday-Friday 9am-5pm (GMT)
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
After licence purchase, you'll be introduced to an account manager and customer success manager to support installation, setup and training. Technical support and engineer support will be available at no additional cost.

You'll be given access to an end user product academy, detailing setup, training and internal promotion. Including FAQs, demo videos, promo resources and product updates. This is also at no additional cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
After purchasing a licence, you are sent your licence key, download link to the software, product academy and support center. A virtual onboarding session will be offered to review next steps of download, install and configuration process.
Customization and training will also be included for both the IT admin setting up the service and end users.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Launcher application stores the user data entered at activation stage and nothing more. No user data is collected or stored when using the application.
You have the right to ask for a copy of any of your personal data held by Us (where such data is held). Under the GDPR, no fee is payable, and we will provide any and all information in response to your request free of charge. Please contact us for more details at privacy@displaynote.com.
End-of-contract process
At the end of licence subscription, the software will no longer function. Displaying a licence error message. There is no additional cost to cancel a subscription.

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Users can download a Launcher app if they wish to connect to the Launcher interface via their mobile. This gives the main display access to their personal OneDrive and Calendar.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Launcher is an interactive overlay that sits on a touch or non-touch display. Designed to give access and launch third party apps, video conferencing platforms and other tools.
Accessibility standards
None or don’t know
Description of accessibility
Tbc
Accessibility testing
N/A
API
No
Customisation available
Yes
Description of customisation
Background image and company logo can be customised from a gallery of images or a custom image added.
Shortcut apps, weblinks and drives can be selected with the title, colour and image customised. Name of room and location can be customised

Scaling

Independence of resources
The system is made to scale as demand increases. Additionally, customer data is separated from other organisations immediately upon activation and software use.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Launcher application just stores the user data entered at activation stage. There is no user data collected or stored when using the Launcher application. We only store/process license activation data, and that data is subject of DisplayNote’s Privacy Policy and Terms and Conditions
Data export formats
Other
Other data export formats
Export data process not applicable
Data import formats
Other
Other data import formats
Data Import process not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We negotiate a service level agreement on a case by case basis in agreement with the organisation.
Approach to resilience
We use Microsoft Azure as our datacentre, all physical security measures are described by Microsoft on the following page: https://docs.microsoft.com/en-gb/azure/security/fundamentals/physical-security.
Additionally, we have a vulnerability detection mechanism at source code level to warn us about new vulnerabilities affecting our code.
All physical devices used for development are covered by Falcon Pro from Crowdstrike that guarantees the security at that level.
Outage reporting
Incidents are managed mainly from two inputs, from support channel or from automated service status measurements. We use both a public dashboard and email alerts if a service outage needs reporting.

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
Users can specify a PIN code to limit access to settings and windows system.
Access restrictions in management interfaces and support channels
Not Applicable
Access restriction testing frequency
At least once a year
Management access authentication
Other
Description of management access authentication
We are following a policy of Least Privilege, giving access to administrators that are managing each project and just with the access that’s strictly needed.

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
We have ISO27001-like procedures and measures in place, but we are not certified
Information security policies and processes
As an organisation, we have strict security and authorization measures so that information is only accessed by the expected personnel.

We have vulnerability detection mechanisms at source code level to warn us about new vulnerabilities affecting our code.
All physical devices used for development are covered by Falcon Pro from Crowdstrike that guarantees the security at that level.
When a security issue is discovered we inform all parts affected, create a fix and deploy them immediately.

We use Microsoft Azure as our datacentre, all physical security measures are described by Microsoft on the following page: https://docs.microsoft.com/en-gb/azure/security/fundamentals/physical-security

The information regarding storage security is provided here: https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/storage-security-baseline

Privacy policy is - https://www.displaynote.com/privacy-policy/

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All software development is carried out via issue management and continuous integration tools.

Our software has unit and integration tests that are triggered at an automated level on each attempt to change the software. After that we have a stringent QA process that follows a per-feature assessment to guarantee everything is behaving as expected.
We follow all recommendations from Microsoft and we are enrolled on periodical security seminars through our Microsoft customer success services.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We follow all recommendations from Microsoft and we are enrolled on periodical security seminars through our Microsoft customer success services.
Additionally, we have vulnerability detection mechanism at source code level to warn us about new vulnerabilities affection our code.
All our physical devices used for development are covered by Falcon Pro from Crowdstrike that guarantees the security at that level.

We have monitoring over all our services using Microsoft Insights with alerts configured by email, instant messaging and by phone to warn responsible people and have them action immediately.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have monitoring over all our services using Microsoft Insights with alerts configured by email, instant messaging and by phone to warn responsible people and have them actioned immediately.
Incident management type
Supplier-defined controls
Incident management approach
Incidents are managed mainly from two inputs, from support channel or from automated service status measurements. Depending on the critical level of these incidents are escalated from support to technical management department passing through lead product developers.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Covid-19 recovery

Covid-19 recovery

Launcher gives all users access to video conferencing solutions, improving the post-Covid hybrid working model. Assisting in improving the meeting room setup to ensure all users can communicate and contribute effectively. Regardless of whether they're working from home or in office.

Pricing

Price
£350 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
A free Launcher trial lasts for 14 days and gives a user full access to the software. Once the trial has ended, no automatic payment is taken, the software will simply no longer run.
Link to free trial
https://store.displaynote.com/launcher/?origin=trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at lianne.cassidy@displaynote.com. Tell them what format you need. It will help if you say what assistive technology you use.