Horsefly Analytics
With Horsefly, you get labour market intelligence based upon data that's extensively and rigorously cleaned and validated to ensure timely and accurate insights every time - with global reach and granular definition.
Features
- Real time supply and demand analytics and employer competitor data.
- Longitudinal data view trends and identify events that impact forecasting.
- Career path projections to see potential and likely job transitions
- Diversity data includes ethnicity breakdown and gender gap data
- Cost of Living to help define optimal talent hiring locations
- Compensation reports including average salary for any role and location
- Contractor day rates for any given role, skills and location
- Identify top universities for graduate or emerging talent markets
- Natively translated job titles and keywords for optimised attraction strategies
- Heat-maps and visualisations of candidate data and density by location
Benefits
- Widest global data reach covering more countries than any other
- Most diverse data sources integrated for an accurate view
- User-friendly interface designed to pull powerful insights, instantly
- Data is refreshed and validated daily for up-to-date market analysis.
- Real-time labour market data from more than 60 countries
- Access to 170,000+ towns/cities, and millions of job postings
- Data to accurately identify skill gaps, ensuring optimal workforce planning
- Identify sources of top talent to create a winning strategy
- Compilation of millions of job postings provides an accurate picture
- See which universities are producing future leaders for your company.
Pricing
£27,500 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 3 6 7 9 5 3 7 0 6 8 5 1 7 9
Contact
Ai Recruitment Technologies
Steve Bebbington
Telephone: 0207 193 0220
Email: steve@horseflyanalytics.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Horsefly is a robust and intuitive cloud system. It is subject to ongoing maintenance in order to optimise the user experience. Users are given advance notice of any such maintenance, and the work is undertaken at a specified time to limit any potential disruption.
- System requirements
- Browser version
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
9 to 5 (UK time), Monday to Friday - 1 hour
All other times - within 24 hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- We have not conducted interface testing with users of assistive technology.
- Onsite support
- Yes, at extra cost
- Support levels
- We provide a tiered range of support options from our UK-based customer support centre. All in-bound calls are answered promptly within 60 seconds and undergo a comprehensive case management process. The first line of support is our customer service centre which receives all in-bound emails and support tickets. This level 1 support tier will be able to troubleshoot and resolve most issues within 1 hour. If the issue is not capable of resolution at first line support, then it is escalated to second line support who will undertake a detailed investigation to diagnose the problem and recommend a solution. Second line support personnel also have access to a specialist engineer support service if required. If second tier cannot resolve the customer's issue, then it is escalated further for root cause analysis and fix. At all stages in the process, the customer is kept regularly updated and informed about progress by email, telephone call, and/or web-conference as appropriate.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Full on-site and online training available.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- A report is issued by the Customer Success Team.
- End-of-contract process
- Access to the platform is provided on a revolving subscription basis. Upon expiry of the contract, access is removed and final user statistics will be supplied.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- With 1 trillion+ data points, Horsefly's talent analytics platform provides real-time data from multiple national & international employment resources, millions of social media candidate profiles, private sector recruitment portals and government sources. Utilising our intuitive web based interface, search on any combination of job titles, skills and locations to instantly view detailed supply &demand data for target markets. Other data Horsefly provides includes contractor rates, job titles and candidate experience level data, gender gap and ethnicity data. Horsefly undertakes extensive procedures to clean and validate data, ensuring accuracy that data can be relied on when making key decisions.
- Accessibility standards
- None or don’t know
- Description of accessibility
-
Non-text content is only for visual formatting. This would allow it to be ignoredby assistive technology. Where the customer’s hardware and/or browser allows,Horsefly will adapt when switched to assistive colours.
Horsefly is responsive and, without assistive technology, text can be zoomed to 200 percent without loss of content or functionality. Where supported by hardware and/or browser, Horsefly will allow speech to text input on all textboxes. - Accessibility testing
- We have not conducted interface testing with users of assistive technology.
- API
- No
- Customisation available
- Yes
- Description of customisation
- Reports can be customised to meet the requirements of users within certain parameters.
Scaling
- Independence of resources
- Real time monitoring of server loads with pre-set alerts on critical components, for example, CPU load, memory load etc. Two servers are in use at any one time to ensure load balance
Analytics
- Service usage metrics
- Yes
- Metrics types
- User search
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- PDF, PNG, JPG.
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.98% uptime with scheduled and notified maintenance schedules.
- Approach to resilience
- Available upon request.
- Outage reporting
- API - Fail Notifications, Email and Text Alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Permissions to management interfaces and support channels regulated based on role, organisational unit and appropriate need for access. All user activity is recorded and logged for audit and security purposes.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- AWS provides several security capabilities and services to increase privacy and control network access. These include: Network firewalls built into Amazon VPC, and web application firewall capabilities in AWS WAF let you create private networks, and control access to your instances and applications; encryption in transit with TLS across all services; and, connectivity options that enable private, or dedicated, connections from your office or on-premises environment.
- Information security policies and processes
- We have several IS policies in place that are tailored to industry standards. These are mainstreamed throughout the company and compliance is measured through established internal controls and procedures, all of which are fully documented. Further details are available upon request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our hosting provider maintains documented operational procedures forboth infrastructure operations and customer-facing support functions.Newly provisioned infrastructure under goes appropriate testing procedures to limit exposure to hardware failure, whilst documented procedures and configuration version controls provide protection from errors during configuration. Changes to configuration are controlled by a defined technical change management policy including impact risk assessment, customer sigh off and back out planning.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our operational management team ensure that we keep up to date with industry specific security alerts and advice through multiple for a and sources (industry press, clients, UK National Cyber Security Centre) and action taken as required to maintain the security and integrity of our technology or operational processes.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
In accordance with our Cyber Essentials accreditation (Certification No.0d8e6a06-2f13-4834-8386-2f49992b9c80), we apply mechanisms and trained specialists to analyse threats, vulnerabilities, and potential impacts which are associated with business activities. This allows us to
• Detect and correct any malicious behaviour
• Facilitate a rapid and effective response to recover from any identified incident or threat - Incident management type
- Supplier-defined controls
- Incident management approach
-
Responses to incidents consist of a 5 step data security breach process:
(i) Identification and Assessment;
(ii) Containment and Recovery;
(iii)Risk Assessment;
(iv) Notification; and,
(v) Evaluation and Response.
Users can report incidents via email, telephone and web chat.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Equal opportunity
Covid-19 recovery
Through our propriety labour market analytical algorithms, we are uniquely placed to help local communities to manage and recover from the impact ofCOVID-19 by supporting our clients in the creation of employment, re-training and other return to work opportunities for those left unemployed by COVID-19,particularly new opportunities in high growth sectors (MAC 1.1) and supporting people and community recovery (MAC 2.2).
Research published by the Office for National Statistics (ONS) in Dec 2020 highlighted that Black and South Asian were adversely impacted by a factor of 2.5 than for people of White ethnicity for a variety of social, economic and environmental factors.
Partly as a response to the ONS' findings, we developed a specific Ethnicity, Diversity, DE&I Data Platform and Diversity dataset within our SAAS functionality to enable employers to scrutinise their prospective labour market demographics through the prism of this dataset to specifically ensure that they were achieving their goals of developing diverse recruitment shortlists.
These actions contributed to economic recovery from COVID-19 by amplifying through data analysis the demography of target recruitment pools that were not only representative but, in doing so, ensuring that employers actively implemented diverse recruitment practices from BAME and other under-represented groups who were, as the ONS demonstrated in their research findings, were disproportionately impacted by COVID-19 in both health and employment outcomes.Equal opportunity
We are a signatory and active participant of the Tech Talent Charter, an industry initiative founded in 2017 in recognition that ensuring diversity and inclusion in the technology market requires a collective effort across companies and sectors. We implement our commitment to equal opportunity and diversity by having a senior executive personally responsible for delivering on our Charter commitments. These include:
- Adoption of an inclusive recruitment and promotion process and practices to support the growth and retention of a diverse workforce (modelled on the TTC Toolkit);
- As a recruitment technology SaaS provider, we utilise our unique 360o market perspective to engage with employers/clients to improve their inclusion and diversity recruitment by adopting inclusive recruitment and promotion processes and practices. - In September of each calendar year we contribute anonymised and aggregated employment diversity information to the TTC Community Interest Company to support industry benchmarking of performance and for publication in the annual Diversity in Tech report.
Taken as a whole, these activities demonstrate our understanding and resultant actions to tackle inequality in employment, skills and pay, through the under-representation of females, in the technological sector relevant to this contract(MAC 6.1).
Pricing
- Price
- £27,500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No