Skip to main content

Help us improve the Digital Marketplace - send your feedback

Be the brand experience ltd

Be the brand - SeeDynamic

Automated Content Checking application allowing companies to consistently check content against their own defined & managed rules and requirements.

Features

  • Automatically check content using easily created rules
  • Get ARI & Flesch Readability scores for content
  • Ensure content uses the correct fonts
  • Automatically spell check content
  • Check for barred and restricted words in content
  • Provide guidance on high risk words or phrases
  • Ensure that mandatory inclusions are included in content
  • Check the correct regulated footers are present
  • Check the correct product disclosures are present in content
  • Use tags to run different rules for different content types

Benefits

  • Increase content approval rates
  • Eliminate common errors
  • Free up skilled resources
  • Avoid unnecessary review cycles
  • Manage you own rule sets
  • Meet current company and industry regulations
  • Save money on content review & approval
  • Quickly adapt to changes in regulations
  • Mitigate risks for bus marketing and compliance teams
  • Deliver "right first time" content to final compliance review

Pricing

£425 an instance a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ross@be-thebrand.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 6 1 7 8 9 8 1 0 3 6 5 1 1 2

Contact

Be the brand experience ltd Ross Jenner
Telephone: 020 7199 0370
Email: ross@be-thebrand.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Can be used with Be the brand - Digital Asset Management and also with other systems via API
Cloud deployment model
Public cloud
Service constraints
No constraints.
System requirements
  • Compatible browser
  • Internet connectivity

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond within the hour (Mon-Fri, 9am – 5pm), with acknowledgement and any further questions.

All support requests will be logged for reference.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard support is unlimited and is included in the monthly fees.

Full application documentation is available to all users, any errors or suspected bugs can be reported by System Administrators via email

Technical resources are available if needed but support generally tends to be configuration based.
Support available to third parties
No

Onboarding and offboarding

Getting started
A Getting Started Guide is included in the system interface for new users and all product documentation is available online via a link in the system.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
No data is stored in the system but rules that have been built can be exported.
End-of-contract process
At contract end the account will become deactivated.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
The SeeDynamic API is built to allow you to easily and quickly embed SeeDynamic’s content review features in your own application, or create an integration between SeeDynamic and any other application. This API is the same one we use to power SeeDynamic!

The API is a RESTful interface, providing programmatic access to the features and data in the system. This provides predictable URLs for accessing resources and uses built-in HTTP features. The API accepts JSON or form-encoded content in requests, and returns JSON content in all of its responses, including errors. Only the UTF-8 character encoding is supported for both requests and responses.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Clients can fully control an configure rules within the system and how they are applied to different content types.
They can also add additional users and manage user access.

Scaling

Independence of resources
Using AWS cloud infrastructure and best practices to enable real time scaling of the system based on demand.

Analytics

Service usage metrics
Yes
Metrics types
File upload
Number of times rules are run
Rules that generate the most insights
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Rules that have been created can be exported.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.5% SLA covering availability with a service credit equivalent to the proportion of fees incurred during the downtime.
Approach to resilience
The application is hosted on AWS public cloud and we leverage the available resilience functionality provided.
Outage reporting
Email alerts to our support team report any outages.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
The system has 2 user roles. Admin & User.
Each user type has predefined access to the system.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Security governance is a board level responsibility of the Chief Technology Officer. IT Security Policy and other related policies are in place and checks are carried out via weekly and monthly procedures to ensure compliance. Team briefings are carried out to ensure that IT security is discussed and communicated to all team members.
Information security policies and processes
We have our own IT Security policy which is based on ISO27001 but not accredited. It is reviewed by clients regularly. It includes procedures and controls to ensure that the policies are followed.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes are tracked using our internal change and issue management system. Each change is tagged with a branch, so that it is clear which branch a change must be carried out in. In our development environment we use a system for build and continuous integration. We also have a source control system in place. Changes are tested on our development environment, before being packaged into a release. Once a release is finalised it is then available to update on our staging and live environments.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The system is built using containers, these are built daily and include all relevant patches and fixes. These are then deployed to production environments periodically or when a priority security vulnerability is identified.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Security scanning in place, centralised malware protection in place, intrusion/bad request attempts alerting in place, sending through to our alerting dashboard, that is monitored and managed by our DevOps team. There is auto blocking in place to ban IP addressed that are submitting suspicious requests.
Incident management type
Supplier-defined controls
Incident management approach
Incidents are logged on our internal issue tracking system and managed from there. Incidents that cannot be resolved immediately by the first point of contact will be assigned to the technical team to action.

All incidents will be recorded in terms of symptoms, basic diagnostic data, and information about the issue and services affected. Incidents are reported to the Client Manager or by calling the Be the brand experience and are logged on our tracking system.

If the issue is a High Priority Security Incident, the client is notified by phone and email within 3 hours.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Be the brand is committed to achieving Net Zero. We have already achieved this is both Scope 1 & 2 of the GHG protocol and we are working towards scope 3.
All be the brand products aid companies reduce the use of printed materials thus aiding our clients achieve their Net Zero goals

Pricing

Price
£425 an instance a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Users can sign up for a free single user account, there is a limit of 20 submissions per month for a free account.
Link to free trial
https://bethebrand.com/plans

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ross@be-thebrand.com. Tell them what format you need. It will help if you say what assistive technology you use.