KorePRM® (Product Relationship Management-as-a Service) with WikiKore®
Kore is the first ever Product Management-as-a-Service platform providing end-to-end product governance. Our set of digital tools provide a controlled environment for creating, managing and monitoring all types of products and services - from ideation to withdrawal.
Features
- End-to-end lifecycle management of products & processes
- Golden source of all metadata, documents, processes
- Rule engine with configurable controls and business logic
- Granular audit trail of all events, decisions, changes of status
- Dashboards, reporting and analytics
- Permission-based, with the ability to set delegated authorities
- Ability to create visibility perimeters for separate business units
- Global taxonomy for product description, KPIs and reports
- Connectivity with internal and external data sources (APIs/file ingestion)
- User journey enriched by AI/ML algorithms
Benefits
- Turn-Key SaaS platform with embedded/constant R&D
- Single source of truth increasing efficiency and reducing manual processes
- Unlimited controls and embedded business logic reduce risks/process inconsistency
- Clear set of authorities and delegation for robust/defendable approval processes
- Allows real-time governance of data, documents, processes, people authorities
- Hyper-configurable, with drag-and-drop features, adaptable to any product, business, process
- Governance adaptable to meet any external regulation or internal policy
- A platform for connectivity with internal and external data sources
- Modular, for quick implementation and incremental adoption
- Light-touch IT engagement and low cost/time to adoption
Pricing
£15 to £250 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 8 2 8 7 7 3 7 4 4 8 0 4 7 6
Contact
KORE LABS LIMITED
Sabrina Del Prete
Telephone: 0780 241 4515
Email: finance@korelabs.co
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Incident: Level 1 - Critical - response time 2 hours/restoration time 4 hours
Incident: Level 2 - Blocking - response time 4 hours/restoration time 8 hours
Incident: Level 3 - Non-Blocking - response time 2 business days/restoration time 5 business days
Incident: Level 4 - Outside of SLA - no SLA
Service Request: Level 4 - Outside of SLA - no SLA
Change Request: No SLA, timescales agreed on a case by case basis.
Out of office hours monitoring and response to critical incidents. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Our customer is right at the centre of our Support & Service Management Approach
We provide a blend of technical and industry expertise to support with both how the system works and how you work with the system. We are with you every step of the way from a pre-pilot to get the ball rolling, to developing a deeper sandbox for you to try more things out, developing a Minimum Viable Product, onboarding, going live, rolling out and beyond.
At a high-level the role of each of the client-facing teams is:
- Client management: Leads all aspects of a prospective and client relationship through the the ‘land and expand’ client lifecycle
- Technical sales support: Ensures all technical aspects of the product are delivered to the client from sandbox through to product implementation (integration and configuration)
- Customer success: Provides the ongoing support to the client and enables the training, adoption and product usage. Plays a key role in expanding the client relationship.
We offer 4 tiers of support levels depending on the clients size and requirements: Embedded, Gold, Silver and Bronze.
Cost is all included in the agreement. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Our customer is right at the centre of our Support & Service Management Approach
We provide a blend of technical and industry expertise to support with both how the system works and how you work with the system.
We are with you every step of the way from a pre-pilot to get the ball rolling, to developing a deeper sandbox for you to try more things out, developing a Minimum Viable Product, onboarding, going live, rolling out and beyond.
A team of experts to support you at all stages of your journey including:
- Client Manager
- Customer Success Manager
- Delivery Manager
- Service Desk
Kore Labs will provide up to 10 in-person hours of support for any additional configuration support of the Kore Labs Platform following completion of the On-Boarding process.
Kore will provide up to 5 in-person hours of training to Admin Users in relation to usage of the functions that aid the configuration of the Kore Labs Platform. This will take place in the form of two virtual sessions at a pre-arranged time & date, recording will be made available. Additional queries can be supported through our Customer Success mailbox. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- PPT
- End-of-contract data extraction
- At the end of the contract, data can be extracted and made available to the client, in line with the data portability requirement under the GDPR provisions. This is a manual process. If the contract has expired and Kore is mandated to destroy data in cloud services, this data is encrypted, the key is destroyed and then the environments and data is wiped.
- End-of-contract process
- We will discuss requirements with the client on an ad hoc basis. There is no cost included in the cost of contract - any additional cost will depend on the client requirements.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Application follows responsive design layout and principles to support mobile and tablet devices.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
The Supplier Platform offers integration capabilities via an enquiry API in order to query products according to required criteria and to retrieve product information and attributes. The query of data in scope of this Enquiry API is as below:
• Product query: query products and filter by status, business unit or a configurable product feature
• Product data: retrieve product information such as name, code, description status or any configurable product feature.
Access to the API is subject to additional API licence costs, API support & maintenance costs and the policies:
• Authentication will be via provided Client ID and secret with Read access to query information via a Service account
• The service level for the API will be in alignment with the existing SLA.
• The Supplier may update or modify the APIs from time to time. In general updates to the API will be non-breaking. A non-breaking change (e.g adding an additional data field to the API) refers to a change that can be integrated without causing disruption
• In the event that a breaking change must be deployed, the previous version of the API will be supported for up to 6 months from implementation. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Kore is highly configurable, modular and designed to guide users through a consistent product roadmap without constraining them. Configurable product taxonomy, monitoring templates, rule engine, controls and product lifecycle management (and other admin options) are designed for non-technical product SMEs. The provision of simple forms and drag and drop functionality is out of the box, without the need for bespoke customisation. 95% of Kore’s features are configurable and do not require code customisation. Typically, it takes 4 to 12 weeks to adopt Kore
Scaling
- Independence of resources
- Client environments are single tenant with auto-scaling enabled, designed for performance and resilience.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide KPIs as part of Customer Success quarterly review
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Using the PRM User Interface - manual Import/Export (Report export (pptx, pdf, csv))
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PPTX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- PPTX
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
High Availability:
Availability of the Kore Labs Platform will be in accordance with the following conditions:
• Databases will be replicated in near real time across zones, with automatic fail over.
• Application cluster: Automatic Kubernetes node reprovisioning within Region
• Disk storage replicated across 2 Zones - Approach to resilience
-
All environments are defined and deployable as IaC (Infrastructure-as-code).
Key technologies:
- Google Cloud Platform
- Kubernetes (GKE)
- Gitlab, Gitops, CI/CD
- Terraform
- FluxCD
- PostgreSQL
Hosted by default on GCP London or any Google cloud location. - Outage reporting
- Our Security Incident Management process is compliant with ISO27001 standards. Timely communication and ongoing updates to the customer's stakeholders (defined during the customer onboarding phase) will be made through the channels agreed with the customer by the Customer Success team or Delivery Manager in charge.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
In line with the Access Management Policy, which is compliant with
ISO27001 standards, user activity and access are role and permissions-based.
Kore Labs employs the principle of least privilege - any additional access beyond what is essential for job functions requires explicit authorisation from the appropriate authority. Regular reviews of access rights are conducted to ensure alignment with current roles and responsibilities. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Citation ISO Certification Limited (Certificate number 451172024)
- ISO/IEC 27001 accreditation date
- 20/02/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Our Information Security Policy and linked policies, procedures and standards, demonstrate Kore Labs’ Information Security Management System (ISMS), as well as highlight principles in safeguarding the company’s assets.
We recognise that security threats are constantly evolving; Kore Labs will use best endeavours to follow the most current industry security best practices and principles in order to stay cyber secure and resilient, in compliance with ISO27001.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Every change is effectively a release. Before changes are applied to the production like environment, they undergo thorough documentation, multiple peer reviews, risk reviews as well as receive the approval from relevant line managers, following the assessment of potential business impacts and risks. This is to prevent vulnerabilities and ensure compliance with security standards.
Measures implemented to maintain version control, record changes, communicate details to relevant stakeholders, update associated documents, and review information classification.
Regular checks conducted to detect unauthorised changes and confirm the accuracy of implemented modifications. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Kore Labs' agreed enterprise patch management solution (Intune) must be used for patching all our endpoint devices, which must be centrally managed with automated patch implementation to devices i.e. require no end user interaction.
The enterprise patch management solution is to be centrally managed with automated patch implementation to devices.
Patching must take place using a risk based approach (outlined within the section titled “Patching Timescales”). - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- In compliance with ISO27001, we developed a Montioring, Logging & Alerting Standard and Incident Management Policy. Logging and monitoring mechanisms are critical in preventing, detecting, and minimising the impact of a data compromise. Thus, Kore Labs’ security incident response / management is an organised approach to addressing and managing a security incident, breach, or attack, and its aftermath.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Kore Labs’ security incident response / management is an organised approach to addressing and managing a security incident, breach, or attack, and its aftermath. It is also compliant with ISO27001 standards.
All incidents are recorded within an incidents log. The CTO is ultimately responsible for collating incidents logs, providing a report of incidents as part of our periodic / regular risk meetings, which discuss information security reporting.
On a monthly basis, a report of all the incidents that have occurred is compiled, and the top-rated incidents are reported into the appropriate committee(s).
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our service provision will prioritise renewable energy sources, reduce carbon emissions, promote sustainable practices, and innovate eco-friendly solutions. It will promote transparency, sustainability, and responsible practices by facilitating the integration of sustainable design principles and providing lifecycle assessments. It will promote responsible sourcing practices throughout the supply chain and help comply with regulatory compliance.Covid-19 recovery
Our service provision continues to support Covid-19 recovery by ensuring safety protocols, facilitating remote work and collaboration, enabling contactless transactions, promoting health awareness, and fostering community resilience. It will also enable transparency to help identify potential disruptions. While the direct impact on the virus itself might be limited, a product governance platform can be a valuable tool for businesses navigating the complexities of the Covid-19 recovery.Tackling economic inequality
Our service provision will address economic inequality by supporting transparency and efficiency in financial services, improving trust, equality and resilience, offering affordable access, promoting financial literacy, creating job opportunities, supporting small businesses, and advocating for fair wages and policies. It will promote transparency, support decision-making processes, make data available for identifying disparities which can in turn inform and influence policy changes and targeted initiatives to address the issues.Equal opportunity
Our service provision will contribute to equal opportunity in several ways by focusing on inclusivity and accessibility throughout a product’s lifecycle. It will encourage the use of design principles that consider a wide range of user abilities and needs. It will promote diversity and inclusion in the supply chain, and encourage sourcing practices that support diverse suppliers, including minority-owned businesses or those with strong disability inclusion programs. Our service provision is designed to meet accessibility standards, ensuring everyone can access and use its features regardless of ability. It will promote transparency and communication.Wellbeing
Our service provision will enhance wellbeing through mental health support, promoting work-life balance, facilitating access to healthcare, encouraging healthy lifestyles, fostering social connections, and prioritising user satisfaction and safety. It will ensure safe product design and use by monitoring for potential product defects, tracking compliance with safety regulations, and using data to inform product improvements. It will promote ethical sourcing and worker wellbeing throughout the supply chain. The platform can facilitate user control over their data and privacy settings. This empowers users to manage how their data is collected and used by the product.
Pricing
- Price
- £15 to £250 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
We provide a 6-week free Sandbox access with the following outcomes:
- Report against determined measures of success
- Stakeholder Demos
- Support for Business Case
- Understand of potential user cases to help form roll-out plans
- Configuration of dedicated sandbox environment according to identified use case