Geospatial Insight (WaInsight)
WaInsight is Walulel’s Geospatial Intelligence Platform. It enables Residential Real Estate market participants to understand the quality of every neighbourhood, postcode or zip-code, so that you can confidently make the location decisions that matter by comparing; contrasting; analysing and predicting spatial datasets and outcomes.
Features
- Self Managed Interactive Web Map
- Managed Data Service
- Data-Enabled Web Mapping
- Customer Relationship Management
- Self Service Spatial Modelling
- Remote Access GIS
- Near Real Time Data Provision
Benefits
- A Single Source of Truth Data Repository
- Access Propietary and Sourced Data
- Market Real Assets Simply at Low Cost
- Access Location Data from a Single Secure Access Point
- Visualise Spatial Data Impacts
- Understand Spatial Data Agglomerations
- Understand Local Expressed Preferences
Pricing
£25 to £3,000 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 3 7 6 6 9 8 5 4 7 2 8 6 4 9
Contact
WALULEL
Nash Adjaye
Telephone: 07488558136
Email: niiashie@walulel.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Community cloud
- Service constraints
- Managed Data only currently, geographically, applies to the London Region. New Regions carry a 60-day lead time
- System requirements
-
- Internet connection speed of 1 Mbps
- Chromium, Safari or Firefox browser with ad/pop-up blocker disabled
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Enquiries received Monday - Friday during UK business hours (8:00am - 5:00PM) are generally acknowledged the same day. Outside these hours, we generally respond the following day.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- We have not done any web chat testing with assistive technology users.
- Onsite support
- Yes, at extra cost
- Support levels
-
We make every possible effort to respond to support incidents in accordance with the time-frames defined below. Initial response times and follow-up response times vary based on the Customer Success Package a customer has purchased.
These response times are as follows:
P1: 4 Hours
P2: 1 Business Day (12 Business Hours)
P3: 2 Business Days (24 Business Hours)
All Customer Success Package include the access to our "webchat support desk" and a telephone support where needed from 9am to 6pm, Monday to Friday (GMT).
Customer Success is charged at £80 per hour or part thereof for agent's time incurred in resolving an issue attributable to the Customer.
A technical account manager or cloud support engineer can be made available by seperate negotiation. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
WaInsight provides online training and getting started with our service guidance documentation.
WaInsight also has a Help Center with a lot of helpful articles, and videos on how to navigate the dashboard and get the most out of our platform.
Additional training sessions and / or on-site support may be purchased for an additional cost. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Personal data is stored with the Data Processor until the Data Controller requests that the data are erased or returned. Data will be removed from Walulel's servers upon customer's request. Data can be extracted as an CSV file, with deletion confirmation provided thereafter.
- End-of-contract process
- Customers may renew the contract at the end of each year. Otherwise at the end of the contract, Walulel will purge all customer data from our systems by request. It is the customer's responsibility to remove the Walulel code from their site, otherwise there is nothing else required, paid or otherwise, to be done at the end of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Full data query facilities are accessible using the API for on Geographic Output Are aper request
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Users can configure statistical disclosure control rules and rule parameters.
Users can input their own data variables using the interface or the API.
Users can customise search intelligence geography and parameters.
Users can filter data and dynamically select which visualisations are available.
Users can provide their own real assets for marketing with user generated content.
Scaling
- Independence of resources
- Surveillance is done 24x7x365 on the performance of the platform. The platform is made to survive spikes of data from across the customer base without affecting the performance of others
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data download is available in CSV (for Excel), and HTML preview.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Walulel will maintain its systems and operations to ensure all WaInsight customers have access to the Included Services 99.95% of the time. All customers have access to an SLA, and Walulel will exercise its best efforts to meet the standards set forth in this SLA. In the event of Walulel's failure to meet the standards in any given month, a service credit in the amount of 5% of the pro-rated annual subscription fees for the applicable month will be issued for Customer and available for future subscription fees.
- Approach to resilience
- Software can be replicated behind a load balancer. Each instance is protected from overload by intrinsic software controls limiting memory use and maximum concurrent requests.
- Outage reporting
- Customers will be notified via email notifying them of the outage, when the outage is resolved, and any additional pertinent findings.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
We restrict access to management interfaces and support channels by:
Eliminating default entry points; utilising encrypted authentication controls; API controlled timeout functions and targeted use throttling. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We approach Security Governance with the emphasis on ensuring our data and other digital assets are held in the most secure manner they can be. We replicate in real-time, we encrypt data at rest and in transit. We restrict access to the viable minimum and we strictly adhere to best practices.
- Information security policies and processes
- Access to servers (production or otherwise) require MFA. All data at rest and in transit, is encrypted (AES256). We use code audit and review for all security related development. We design in security features from the ground up and ensure that all passwords are hashed with SHA-256 and encrypted with a salt.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our configuration and change management processes are designed to meet ISO27001 standards.
We record client configuration details, including knowledge base materials in our Client Service Desk system. Change management follows a documented process that adheres to modern best practice and includes a user forum and a published product roadmap.
We also sandbox test changes in a simulated representative of end-user configuration (i.e. a factory test). This takes place before the formal release cycle to ensure that potential security impacts are identified. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use external third parties to perform penetration testing on a regular basis. We also use internal industry standard scanners to perform bi-monthly vulnerability tests. We monitor all major security lists to ensure we are notified of any threats in a timely manner.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We use proactive monitoring of the platform. In addition, the system provides Logs and Audit Logs to assist with monitoring and user behaviour. Audit logs comprise HMAC checksums to assure validity of data at rest. Furthermore, any collection of sensitive information by staff is only permitted on authorised devices.
In the event of a potential compromise our board level security officer is notified as well as the potentially affected clients. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We have a number of processes to deal with common events.
Users can report incidents via email, telephone or online through our issue tracking system. We then issue service tickets, graded by priority and categorised problem. Depending on severity, the Change Management cycle may be engaged or altered.
We endeavour to ensure continued service until a release cycle provides a formal resolution.
We also provide reports and root cause analysis reports via email.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Clarified in Call-Off Contract - Covid-19 recovery
-
Covid-19 recovery
Clarified in Call-Off Contract - Tackling economic inequality
-
Tackling economic inequality
Clarified in Call-Off Contract - Equal opportunity
-
Equal opportunity
Clarified in Call-Off Contract - Wellbeing
-
Wellbeing
Clarified in Call-Off Contract
Pricing
- Price
- £25 to £3,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- The free version of the service is a fully functional but time limited trial