Be the brand experience ltd
Be the brand - SeeDynamic
Automated Content Checking application allowing companies to consistently check content against their own defined & managed rules and requirements.
Features
- Automatically check content using easily created rules
- Get ARI & Flesch Readability scores for content
- Ensure content uses the correct fonts
- Automatically spell check content
- Check for barred and restricted words in content
- Provide guidance on high risk words or phrases
- Ensure that mandatory inclusions are included in content
- Check the correct regulated footers are present
- Check the correct product disclosures are present in content
- Use tags to run different rules for different content types
Benefits
- Increase content approval rates
- Eliminate common errors
- Free up skilled resources
- Avoid unnecessary review cycles
- Manage you own rule sets
- Meet current company and industry regulations
- Save money on content review & approval
- Quickly adapt to changes in regulations
- Mitigate risks for bus marketing and compliance teams
- Deliver "right first time" content to final compliance review
Pricing
£425 an instance a month
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at ross@be-thebrand.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
4 6 1 7 8 9 8 1 0 3 6 5 1 1 2
Contact
Be the brand experience ltd
Ross Jenner
Telephone: 020 7199 0370
Email: ross@be-thebrand.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Can be used with Be the brand - Digital Asset Management and also with other systems via API
- Cloud deployment model
- Public cloud
- Service constraints
- No constraints.
- System requirements
-
- Compatible browser
- Internet connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We aim to respond within the hour (Mon-Fri, 9am – 5pm), with acknowledgement and any further questions.
All support requests will be logged for reference. - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard support is unlimited and is included in the monthly fees.
Full application documentation is available to all users, any errors or suspected bugs can be reported by System Administrators via email
Technical resources are available if needed but support generally tends to be configuration based. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- A Getting Started Guide is included in the system interface for new users and all product documentation is available online via a link in the system.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- No data is stored in the system but rules that have been built can be exported.
- End-of-contract process
- At contract end the account will become deactivated.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
The SeeDynamic API is built to allow you to easily and quickly embed SeeDynamic’s content review features in your own application, or create an integration between SeeDynamic and any other application. This API is the same one we use to power SeeDynamic!
The API is a RESTful interface, providing programmatic access to the features and data in the system. This provides predictable URLs for accessing resources and uses built-in HTTP features. The API accepts JSON or form-encoded content in requests, and returns JSON content in all of its responses, including errors. Only the UTF-8 character encoding is supported for both requests and responses. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Clients can fully control an configure rules within the system and how they are applied to different content types.
They can also add additional users and manage user access.
Scaling
- Independence of resources
- Using AWS cloud infrastructure and best practices to enable real time scaling of the system based on demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
File upload
Number of times rules are run
Rules that generate the most insights - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Rules that have been created can be exported.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.5% SLA covering availability with a service credit equivalent to the proportion of fees incurred during the downtime.
- Approach to resilience
- The application is hosted on AWS public cloud and we leverage the available resilience functionality provided.
- Outage reporting
- Email alerts to our support team report any outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
The system has 2 user roles. Admin & User.
Each user type has predefined access to the system. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Security governance is a board level responsibility of the Chief Technology Officer. IT Security Policy and other related policies are in place and checks are carried out via weekly and monthly procedures to ensure compliance. Team briefings are carried out to ensure that IT security is discussed and communicated to all team members.
- Information security policies and processes
- We have our own IT Security policy which is based on ISO27001 but not accredited. It is reviewed by clients regularly. It includes procedures and controls to ensure that the policies are followed.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes are tracked using our internal change and issue management system. Each change is tagged with a branch, so that it is clear which branch a change must be carried out in. In our development environment we use a system for build and continuous integration. We also have a source control system in place. Changes are tested on our development environment, before being packaged into a release. Once a release is finalised it is then available to update on our staging and live environments.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The system is built using containers, these are built daily and include all relevant patches and fixes. These are then deployed to production environments periodically or when a priority security vulnerability is identified.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Security scanning in place, centralised malware protection in place, intrusion/bad request attempts alerting in place, sending through to our alerting dashboard, that is monitored and managed by our DevOps team. There is auto blocking in place to ban IP addressed that are submitting suspicious requests.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Incidents are logged on our internal issue tracking system and managed from there. Incidents that cannot be resolved immediately by the first point of contact will be assigned to the technical team to action.
All incidents will be recorded in terms of symptoms, basic diagnostic data, and information about the issue and services affected. Incidents are reported to the Client Manager or by calling the Be the brand experience and are logged on our tracking system.
If the issue is a High Priority Security Incident, the client is notified by phone and email within 3 hours.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Be the brand is committed to achieving Net Zero. We have already achieved this is both Scope 1 & 2 of the GHG protocol and we are working towards scope 3.
All be the brand products aid companies reduce the use of printed materials thus aiding our clients achieve their Net Zero goals
Pricing
- Price
- £425 an instance a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Users can sign up for a free single user account, there is a limit of 20 submissions per month for a free account.
- Link to free trial
- https://bethebrand.com/plans
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at ross@be-thebrand.com.
Tell them what format you need. It will help if you say what assistive technology you use.