Property sales, planning and construction market tracker
Tracks, analyses and reports national home movements, residential and commercial construction, and planning sales status. Combines market-leading sources, including Zoopla Property Group, Whenfresh, Glenigan, and GreenStreet to track over 85% of UK activity, including pre-movers, pricing, discounting, and geo-demographic trends. Predicts underlying causes in market behaviours with live dashboard reporting.
Features
- Powered by UK’s largest property network, unique, exclusive data source
- Combines planning and construction data including Glenigan, Zoopla and GreenStreet
- Identifies when properties are listed, sold, rented and premove
- Insights into national and regional planning and construction projects
- ML Causation Analysis to understand underlying reasons for market changes
- AI matching technology to deliver accurate outputs
- Output in standard formats
Benefits
- Analyse planning, construction and home moving trends
- Deep insights into the planning, construction home move cycle
- Identify changes in market behaviour and predict their underlying causes
- Filter and compare market sectors and regional behaviours.
- Current and accurate data feeds updated monthly
- Customisable reporting including live PowerBI dashboards
Pricing
£0.03 to £0.20 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 0 3 8 2 3 7 3 5 5 8 7 1 7 4
Contact
LIVEWIRE CONSULTANCY
Alex Granat
Telephone: 07957592229
Email: alex@livewireconsultancy.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- We provide an optional product to that integrates seamlessly with our customers' internal systems.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- Secure FTP or another secure portal for data exchange
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Monday-Friday 9am - 5pm
Initial response best endeavour of one hour - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We apply measures according to the impact of the incident to you. This allows us to categorise incidents from Priority 1 to Priority 4.
Example Support Levels:
PRIORITY 1 - CRITICAL
Priority 1 incidents are likely to critically impact your ability to conduct business. We’ll do our best to respond to a Priority 1 incident within 1 hour.
PRIORITY 2 - HIGH IMPACT DISRUPTION
Priority 2 incidents are high-impact problems that interrupt your organisation, but there’s still capacity to continue to be productive. We’ll do our best to respond to a Priority 2 incident within 4 hours.
PRIORITY 3 - MINOR IMPACT DISRUPTION
Priority 3 incidents are medium-to-low impact problems that comprise of limited loss of non-critical business functionality. We’ll do our best to respond to a Priority 3 incident within 8 hours.
PRIORITY 4 – INFORMATIONAL REQUEST
Priority 4 issues include requests that do not fall within the Priority 1 – Priority 3 classifications. We’ll do our best to respond to a Priority 4 incidents within 24 hours. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite/Online Training options are available.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- At the end of contract, ownership of all data supplied to the client is transferred to the customer. Any resulting data created or derived is delivered in a structured file or data table.
- End-of-contract process
- We will export requested reports covering the stored data. Access to the systems and insights will be disabled. On final agreement, the database will be purged of all customer data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- SFTP is generally used as the service interface. However, we are able to deliver customer-specific requirements, as long as compliant with our license and security policies
- Accessibility standards
- None or don’t know
- Description of accessibility
- Bi-directional data transfer
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- A RESTful API option is available. Due to our security policy and legal obligations, setup and changes are not available through the API.
- API documentation
- Yes
- API documentation formats
-
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users customise matching sources and criteria
Data output fields and format
Scaling
- Independence of resources
- Each implementation is a separate virtual entity. Also, users can provide a sandbox within their environment, thereby eliminating any outside dependencies.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We deliver customised metrics that communicate the overall performance of the matching, analysis and commercial/operational impacts.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- DT Dynamics Ltd
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Reports can be exported in HTML, PDF and CSV format or in a pre-agreed data structure. Matched data is exported in a delimited ASCII file/Microsoft Excel format.
- Data export formats
-
- CSV
- Other
- Other data export formats
- ASCII delimited
- Data import formats
-
- CSV
- Other
- Other data import formats
- ASCII delimited
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99% guaranteed availability
- Approach to resilience
- Complete failover to a near-real-time mirrored site. Details available on Request.
- Outage reporting
- Email alerts/telephone. Each client has a designated project owner who will react and communicate directly in the event of outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Roles-based access
Details available on request - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 01/12/2019
- What the ISO/IEC 27001 doesn’t cover
- Details available on request
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- UK Government Passport Office (HMPO) Letter of Assurance
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Available on request
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
ISO 27001
Process information available on request. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
ISO 27001
Details available on request - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
ISO 27001
Details available on request - Incident management type
- Undisclosed
- Incident management approach
- N/A
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
We prioritise creating new businesses, new jobs and new skills. 1. help new, small organisations to grow, supporting economic growth and business creation. We work through charities to provide free mentorship to new business leaders. 2. - Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors: We operate in data science/AI, where demand for our skills are far higher than the supply. We work with universities to train data science degree apprentices. Our third apprentice is in their final year and actively involved in delivering our public sector services. When they approached us, they didn't have an English GCSE. We sponsored them through the course to enable them to commence the degree.Equal opportunity
Reduce the disability employment gap: We seek to recruit disabled or otherwise disadvantaged people as analysts. We have influenced our public sector clients to facilitate us to test the accessibility of questionnaires with people with special needs such as autism, cerebral palsy and those in care.
Pricing
- Price
- £0.03 to £0.20 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Limited test versions are available - subject to discussion on a case-by-case basis,