Skip to main content

Help us improve the Digital Marketplace - send your feedback

Ai Recruitment Technologies

Horsefly Analytics

With Horsefly, you get labour market intelligence based upon data that's extensively and rigorously cleaned and validated to ensure timely and accurate insights every time - with global reach and granular definition.

Features

  • Real time supply and demand analytics and employer competitor data.
  • Longitudinal data view trends and identify events that impact forecasting.
  • Career path projections to see potential and likely job transitions
  • Diversity data includes ethnicity breakdown and gender gap data
  • Cost of Living to help define optimal talent hiring locations
  • Compensation reports including average salary for any role and location
  • Contractor day rates for any given role, skills and location
  • Identify top universities for graduate or emerging talent markets
  • Natively translated job titles and keywords for optimised attraction strategies
  • Heat-maps and visualisations of candidate data and density by location

Benefits

  • Widest global data reach covering more countries than any other
  • Most diverse data sources integrated for an accurate view
  • User-friendly interface designed to pull powerful insights, instantly
  • Data is refreshed and validated daily for up-to-date market analysis.
  • Real-time labour market data from more than 60 countries
  • Access to 170,000+ towns/cities, and millions of job postings
  • Data to accurately identify skill gaps, ensuring optimal workforce planning
  • Identify sources of top talent to create a winning strategy
  • Compilation of millions of job postings provides an accurate picture
  • See which universities are producing future leaders for your company.

Pricing

£27,500 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve@horseflyanalytics.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 3 6 7 9 5 3 7 0 6 8 5 1 7 9

Contact

Ai Recruitment Technologies Steve Bebbington
Telephone: 0207 193 0220
Email: steve@horseflyanalytics.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Horsefly is a robust and intuitive cloud system. It is subject to ongoing maintenance in order to optimise the user experience. Users are given advance notice of any such maintenance, and the work is undertaken at a specified time to limit any potential disruption.
System requirements
Browser version

User support

Email or online ticketing support
Email or online ticketing
Support response times
9 to 5 (UK time), Monday to Friday - 1 hour

All other times - within 24 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
We have not conducted interface testing with users of assistive technology.
Onsite support
Yes, at extra cost
Support levels
We provide a tiered range of support options from our UK-based customer support centre. All in-bound calls are answered promptly within 60 seconds and undergo a comprehensive case management process. The first line of support is our customer service centre which receives all in-bound emails and support tickets. This level 1 support tier will be able to troubleshoot and resolve most issues within 1 hour. If the issue is not capable of resolution at first line support, then it is escalated to second line support who will undertake a detailed investigation to diagnose the problem and recommend a solution. Second line support personnel also have access to a specialist engineer support service if required. If second tier cannot resolve the customer's issue, then it is escalated further for root cause analysis and fix. At all stages in the process, the customer is kept regularly updated and informed about progress by email, telephone call, and/or web-conference as appropriate.
Support available to third parties
No

Onboarding and offboarding

Getting started
Full on-site and online training available.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
A report is issued by the Customer Success Team.
End-of-contract process
Access to the platform is provided on a revolving subscription basis. Upon expiry of the contract, access is removed and final user statistics will be supplied.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
With 1 trillion+ data points, Horsefly's talent analytics platform provides real-time data from multiple national & international employment resources, millions of social media candidate profiles, private sector recruitment portals and government sources. Utilising our intuitive web based interface, search on any combination of job titles, skills and locations to instantly view detailed supply &demand data for target markets. Other data Horsefly provides includes contractor rates, job titles and candidate experience level data, gender gap and ethnicity data. Horsefly undertakes extensive procedures to clean and validate data, ensuring accuracy that data can be relied on when making key decisions.
Accessibility standards
None or don’t know
Description of accessibility
Non-text content is only for visual formatting. This would allow it to be ignoredby assistive technology. Where the customer’s hardware and/or browser allows,Horsefly will adapt when switched to assistive colours.
Horsefly is responsive and, without assistive technology, text can be zoomed to 200 percent without loss of content or functionality. Where supported by hardware and/or browser, Horsefly will allow speech to text input on all textboxes.
Accessibility testing
We have not conducted interface testing with users of assistive technology.
API
No
Customisation available
Yes
Description of customisation
Reports can be customised to meet the requirements of users within certain parameters.

Scaling

Independence of resources
Real time monitoring of server loads with pre-set alerts on critical components, for example, CPU load, memory load etc. Two servers are in use at any one time to ensure load balance

Analytics

Service usage metrics
Yes
Metrics types
User search
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
PDF, PNG, JPG.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.98% uptime with scheduled and notified maintenance schedules.
Approach to resilience
Available upon request.
Outage reporting
API - Fail Notifications, Email and Text Alerts.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Permissions to management interfaces and support channels regulated based on role, organisational unit and appropriate need for access. All user activity is recorded and logged for audit and security purposes.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
AWS provides several security capabilities and services to increase privacy and control network access. These include: Network firewalls built into Amazon VPC, and web application firewall capabilities in AWS WAF let you create private networks, and control access to your instances and applications; encryption in transit with TLS across all services; and, connectivity options that enable private, or dedicated, connections from your office or on-premises environment.
Information security policies and processes
We have several IS policies in place that are tailored to industry standards. These are mainstreamed throughout the company and compliance is measured through established internal controls and procedures, all of which are fully documented. Further details are available upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our hosting provider maintains documented operational procedures forboth infrastructure operations and customer-facing support functions.Newly provisioned infrastructure under goes appropriate testing procedures to limit exposure to hardware failure, whilst documented procedures and configuration version controls provide protection from errors during configuration. Changes to configuration are controlled by a defined technical change management policy including impact risk assessment, customer sigh off and back out planning.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our operational management team ensure that we keep up to date with industry specific security alerts and advice through multiple for a and sources (industry press, clients, UK National Cyber Security Centre) and action taken as required to maintain the security and integrity of our technology or operational processes.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
In accordance with our Cyber Essentials accreditation (Certification No.0d8e6a06-2f13-4834-8386-2f49992b9c80), we apply mechanisms and trained specialists to analyse threats, vulnerabilities, and potential impacts which are associated with business activities. This allows us to
• Detect and correct any malicious behaviour
• Facilitate a rapid and effective response to recover from any identified incident or threat
Incident management type
Supplier-defined controls
Incident management approach
Responses to incidents consist of a 5 step data security breach process:
(i) Identification and Assessment;
(ii) Containment and Recovery;
(iii)Risk Assessment;
(iv) Notification; and,
(v) Evaluation and Response.
Users can report incidents via email, telephone and web chat.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Covid-19 recovery
  • Equal opportunity

Covid-19 recovery

Through our propriety labour market analytical algorithms, we are uniquely placed to help local communities to manage and recover from the impact ofCOVID-19 by supporting our clients in the creation of employment, re-training and other return to work opportunities for those left unemployed by COVID-19,particularly new opportunities in high growth sectors (MAC 1.1) and supporting people and community recovery (MAC 2.2).
Research published by the Office for National Statistics (ONS) in Dec 2020 highlighted that Black and South Asian were adversely impacted by a factor of 2.5 than for people of White ethnicity for a variety of social, economic and environmental factors.
Partly as a response to the ONS' findings, we developed a specific Ethnicity, Diversity, DE&I Data Platform and Diversity dataset within our SAAS functionality to enable employers to scrutinise their prospective labour market demographics through the prism of this dataset to specifically ensure that they were achieving their goals of developing diverse recruitment shortlists.
These actions contributed to economic recovery from COVID-19 by amplifying through data analysis the demography of target recruitment pools that were not only representative but, in doing so, ensuring that employers actively implemented diverse recruitment practices from BAME and other under-represented groups who were, as the ONS demonstrated in their research findings, were disproportionately impacted by COVID-19 in both health and employment outcomes.

Equal opportunity

We are a signatory and active participant of the Tech Talent Charter, an industry initiative founded in 2017 in recognition that ensuring diversity and inclusion in the technology market requires a collective effort across companies and sectors. We implement our commitment to equal opportunity and diversity by having a senior executive personally responsible for delivering on our Charter commitments. These include:
- Adoption of an inclusive recruitment and promotion process and practices to support the growth and retention of a diverse workforce (modelled on the TTC Toolkit);
- As a recruitment technology SaaS provider, we utilise our unique 360o market perspective to engage with employers/clients to improve their inclusion and diversity recruitment by adopting inclusive recruitment and promotion processes and practices. - In September of each calendar year we contribute anonymised and aggregated employment diversity information to the TTC Community Interest Company to support industry benchmarking of performance and for publication in the annual Diversity in Tech report.
Taken as a whole, these activities demonstrate our understanding and resultant actions to tackle inequality in employment, skills and pay, through the under-representation of females, in the technological sector relevant to this contract(MAC 6.1).

Pricing

Price
£27,500 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve@horseflyanalytics.com. Tell them what format you need. It will help if you say what assistive technology you use.