Skip to main content

Help us improve the Digital Marketplace - send your feedback


InterWorks Curator

InterWorks Curator lets you seamlessly integrate your analytics into one platform for a better data & end user experience. Curator is designed to take your UX/UI capabilities to the next level by building beautiful content to increase user adoption & engagement.


  • Single integration & reporting layer across multiple BI technologies
  • Full UX/UI beautification & customisation
  • User journey organisation & planning
  • Content curation & best practice management
  • Custom filtering & enterprise analytics experience


  • Single source of truth across multiple technologies
  • Unlock the potential of UX/UI using Curator as the vehicle
  • Create a managed user experience throughout your existing content
  • Enable core content to be easily identified & used
  • Increase end user adoption
  • Create a seamless single portal for all your reporting needs


£7,500 to £50,000 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

4 8 4 2 7 6 1 7 0 6 4 6 8 9 9


Telephone: 07531541276

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Power Bi

Most other BI Vendors accessible via API
Cloud deployment model
Private cloud
Service constraints
Unless agreed otherwise, clients will be responsible for delivering their own upgrades with InterWorks Supporting.
System requirements
  • Linux or Windows - Curator requires its own standalone server
  • At least 4 CPU
  • Ports open for web traffic (80 and 443)
  • A disaster recovery plan
  • If connecting with Tableau enable REST & MetaData API's
  • 8GB of RAM
  • 20GB of disk space

User support

Email or online ticketing support
Email or online ticketing
Support response times
Typically 1-4hrs dependant on priority level as defined by our Curator terms of service SLAs.

Weekend support is defined by our Curator terms of service SLA's.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Our web chat is accessible via our Assist service -
Web chat accessibility testing
Service is currently deployed across UK, EMEA, APAC & US
Onsite support
Yes, at extra cost
Support levels
Support options: (included in licence fee agreement)


• Local Business Hour Support • Software
• Installation
• Styling Guidance


• Priority Support
• Software
• Installation
• Styling Guidance
• Global support queue
• Critical Weekend Support
• Scheduled Weekend Support
Support available to third parties

Onboarding and offboarding

Getting started
We aim to make Curator as easy to use as possible. This means you can easily install on your own - but we’re here to help if you need our assistance. We’ll schedule an overview call to highlight the latest-and-greatest features, but throughout your Curator journey, our whole team is just one email away.

Our team of experts are here to support at each step of the process:
• Curator software installation and setup analytics connections such as Tableau
• SSO configuration and sample content setup
• Design review and style guidance
• Training and handoff
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
No data is hosted in the solution directly only presented, that would be stored in the underlying solutions such as Tableau or Power BI.
End-of-contract process
Should you wish to not continue with Curator then the software licence will expire and the service will no longer be available. In the rare scenario this happens we will have a call to discuss off-boarding.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Compatible operating systems
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Service interface
User support accessibility
None or don’t know
What users can and can't do using the API
What users can and can't do using the API

Sign In / Out Create, Query, Update, Delete Site(s) Query Views for Site Create, Query, Update, Delete Project Publish Workbook Add Tags to Workbook Query Views for Site, Workbook Query View Image Query View Preview Image Query Workbook and connections Get Workbook Revisions Query Workbook Preview Image Query Workbooks for Site, User Download Workbook, Revision Update Workbook and Connection Delete Workbook Remove Workbook Revision Delete Tag from Workbook Publish, Query Datasource Query Datasource Connections Get Datasource Revisions Download Datasource and Revisions Update Datasource and Connection Delete Datasource Remove Datasource Revision Create Group Add User to Group, Site Get Users in Group, Site Query Groups Query User On Site Update Group, User Remove User from Group, Site Delete Group Get Datasource, Workbook Revisions Download Datasource, Workbook Revision Remove Datasource, Workbook Revision Add Datasource Permissions Add Project, Default, Workbook Permissions Query Datasource, Project, Default, Workbook Permissions Delete Datasource Permission Delete Project, Default, Workbook Permission Query Job Create, Query, Update, Delete Schedule Query Extract Refresh Tasks Create, Query, Update, Delete Subscription Add Datasource to Favorites Add View, Workbook to Favorites Delete Datasource, View, Workbook from Favorites Get Favorites for User Publish Datasource, Workbook Update
API documentation
API documentation formats
  • HTML
  • Other
API sandbox or test environment
Customisation available
Description of customisation
Description of customisation

At an individual dashboard level, users can (subject to permissions) edit existing dashboards and publish their own versions of previously created content. Users can also filter existing content and save that custom view as their own. Users can subscribe to specific views on a schedule of their choosing. Overall look and feel: clients can code their own wrapper in which to embed their analytics applying their own imagery, CSS etc (admin level) Functionality: clients can use the APIs to create additional bespoke functionality that Tableau does not deliver natively (admin level) Custom portals: we have developed custom portals that do both of the above out of the box, providing a rapid, affordable way of providing a look and feel that is consistent with that of the organisation as well as a range of often-requested additional functions with the flexibility to add more relatively easily. (admin level)


Independence of resources
The first step is the choice of environment (dedicated on premise or cloud server, hybrid or public) which controls the range of possibilities for resource contention. Outside of the environment decision Tableau Server has a good range of built in dashboards for monitoring performance. InterWorks also has its own additional monitoring solution which provides broader analytics on usage of the processors, RAM, disk, network, processes, query times, user contention so that if there is a performance impact administrators can see exactly what the environment was like at that specific point in time and provide the most effective resolution.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
There are multiple ways for end-users to export data from Curator. The current Dashboard data-exports all utilize Tableau's standard export functionality with some optional overrides. Check out all the areas below for all available data exports you can find in Curator.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF
Data import formats
  • CSV
  • ODF
  • Other

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Hosted using a 3rd party, typically Amazon Web Services or Azure, with all of its associated resilience.
Approach to resilience
Hosted using a 3rd party, typically Amazon Web Services or Azure, with all of its associated resilience.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
SAML Kerberos Active Directory OpenID
Access restrictions in management interfaces and support channels
Management Interfaces and support channels are secured using roles applied to users to maintain the separation of ability of users. The system is designed to allow only specific and absolutely necessary users the ability to alter authentication and authorisation. Default permission for new users is always set to deny all access until it is specifically granted by and administrative account.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Given our role as data analysts we take data security very seriously. We do have an internal security governance policy but this is not currently one that is accredited to an external standard. We have never had a security incident or breach.
Information security policies and processes
We have a detailed IT Policy (Security and Internet) which we can make available on demand. The key points of which are: Roles and responsibilities - the policies are established, monitored and breaches investigated by the directors, but at a core level everyone has a responsibility for security. Monitoring - we reserve the right to monitor employee use of IT resources, tracking and remote wipe software is installed on all devices Damage and loss - defined actions in the event of damage or loss of equipment Misuse and vandalism Specific guidelines concerning encryption and security admin policies of portable devices, memory sticks, mobile phones, laptops, AV software, email attachments, commitments in emails, IM systems, licensing of software, and password policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
At the individual install level, any changes to content published to Tableau Server is tracked through the built in version control so that if a user amends or updates a particular dashboard then they have the capacity to roll back to prior versions. In terms of the release of software updates to the Tableau Server (Hybrid-Cloud) Platform, Tableau operates a cadence where updates made available 4 times per year, on a quarterly basis. It is the responsibility of the customer to implement and test the software updates in their own implementation.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Tableau Security team cares deeply about the security of our products and the data that our customers entrust to us. We will thoroughly investigate any reported vulnerability that jeopardizes either. Once a vulnerability is fully investigated and its content addressed, we will work with you to disclose the vulnerability in a way that acknowledges your work and protects our customers. All security-related notifications will be announced to our customers via the Security Bulletins community page: This page also details our response to Internet-wide vulnerabilities that impact Tableau products, release notes about security bug fixes and disclosed vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
In relation to Tableau Platform, there is no specific Protective Monitoring standard in place. Customers who implement the Tableau Server (Hybrid-Cloud) Platform are encouraged to ensure the implementation and security infrastructure are aligned with any internal policies and regulations.
Incident management type
Supplier-defined controls
Incident management approach
User reported incidents go to our support desk for triage. If the support desk cannot resolve it immediately it is escalated to the correct specialist within the team. Incidents discovered by our team would be notified directly to the client. Minor issues would usually be resolved then alerted. Major issues would be alerted first and then the focus would move on to resolution. Incidents are reported via email We use an industry-leading ticket-tracking platform that conforms to the ITIL standard.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

We endeavour to do our best in fighting climate change and have made an active effort to switch our delivery to remote working vs onsite delivery where possible, thus reducing our travel & impact on the environment.


£7,500 to £50,000 a licence a year
Discount for educational organisations
Free trial available
Description of free trial
InterWorks will provide a guided evaluation of the Curator solution, showcasing any required features or functionality.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.