Montala Limited (ResourceSpace DAM)

ResourceSpace Digital Asset Management software

Montala is the company behind ResourceSpace, an open source Digital Asset Management software for your organisation's marketing and other digital assets, typically including photos, videos, illustrations, audio and other media. The software facilitates easy categorisation of, and access to, digital assets via a simple "self serve" web based user interface.

Features

  • Powerful and fast search with intelligent ordering
  • Very configurable and easy to add your brand
  • Permissions management to model complex access requirements
  • Enterprise integration, e.g. LDAP, SSO, Active Directory
  • Workflow and version control to model processes and track history
  • In depth reporting capability - live analytics
  • Completely configurable metadata schema
  • File conversion for thousands of file types
  • 24/7 priority support
  • ISO27001 certification

Benefits

  • Easy access to digital assets using powerful search tools
  • Preview and convert thousands of different file formats
  • Access digital content when on the move via responsive UI
  • Control access to sensitive assets
  • Live analytics - see how assets are used
  • Build custom workflow processes to suit your organisation
  • Open source, so license free, reducing the overall service cost
  • Full featured API means your developers can integrate existing systems
  • Full on-boarding and training service included
  • Our technical support team standing by to assist

Pricing

£238 to £938 an instance a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@resourcespace.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

7 1 5 5 3 8 2 3 3 2 9 0 8 2 4

Contact

Montala Limited (ResourceSpace DAM) Peter Gough
Telephone: 01367 710245
Email: info@resourcespace.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
There are no specific constraints.
System requirements
Any reasonably up to date web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our response times are detailed under section 2.4 Priorities from our Terms & SLA, which you may review on the following link;

https://www.resourcespace.com/terms
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
We have three tiers that affect the hosting performance and storage levels, but also the service as follows:

- Team Cloud (£3,150 + VAT per annum) - 20 hours support per year, bug fixes free, 4 hours training and onboarding/reconfiguration per year.

- Business Cloud (£6,850 + VAT per annum) - 35 hours support per year, bug fixes free, 8 hours training and onboarding/reconfiguration per year.

- Enterprise Cloud (£11,250 + VAT per annum) - 50 hours support per year, bug fixes free, 10 hours training and onboarding/reconfiguration per year.

All services come with access to our Customer Success team which are effectively account managers for our services. A designated team member is provided for the onboarding and training process.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We include on-boarding and training in all our packages.

With our comprehensive on-boarding process - our Customer Success team works with your organisation to design a custom metadata schema, determine user groups and permissions.

We schedule remote one to one remote training for administrators using Zoom. Each session around an hour in length, typically spread over 1 to 2 weeks allowing time for private learning and practice. These can also be carried out on-site if you are able to cover travel costs.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
We provide an online utility to download the data in full. This online function is password protected and available for 3 months from service end.
We can also ship the data on a physical medium and would charge only the cost of the media and shipping for this service.
End-of-contract process
We provide a full download of the system and files. As the software is open source, your organisation is free to move this to another vendor or host in-house.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All functions are available but the layout is optimised for mobile. For example, the top menu becomes a drop down menu to optimise use of space.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
All core functions can be accessed via the API, for example, search, metadata tagging, download, upload, and so on.
The API is RESTful and therefore familiar to many developers.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The vast majority of the system elements can be customised, such as colours, brand/logo, metadata fields, resource types, all aspects of permissions/access, which features are enabled (and to who), and so on. Configurability is a core differentiator for ResourceSpace.

Scaling

Independence of resources
We offer CPU segregation between customers and guarantee minimum CPU allocation. Our top package includes an entirely dedicated very high performance server, ensuring no disruption from other users.
Bandwidth is second to none with multiple GigE and 10 GigE uplinks spread across two separate sites.

Analytics

Service usage metrics
Yes
Metrics types
The analytics function of ResourceSpace allows for detailed reporting on a variety of system actions, broken down by user group and filtered by a number of different options. You can add reports generated to your dashboard for easy access.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
We provide a few options:
- Bulk download in ZIP or TAR format of the assets themselves
- CSV download of asset metadata
- SQL download of the complete asset database (for migration)
Data export formats
  • CSV
  • Other
Other data export formats
  • SQL
  • ZIP, TAR
  • XML
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
RSA key secured SSH for data transfer between servers.

Availability and resilience

Guaranteed availability
We guarantee recovery in 3 hours, 24/7.
We have no global refund policy but these have been worked in to specific customer contracts. The typical approach is to give free contract extensions (e.g. 1 day contract extension for every 30 minutes of outage).
Approach to resilience
Each server is configured with RAID 10 for data redundancy on the production system. We can recover to a second server at a geographically separate site quickly as we have a full RAID 5 standby copy synchronised every hour at a minimum. We have additional offsite and offline backups (the specific details of those are intentionally confidential).
Outage reporting
We have internal monitoring and dashboard display. We announce outages to customers via e-mail alerts. As we have the monitoring data this is something we can make available to customers on request.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
For ResourceSpace itself, the management interface can be accessed via a number of different SSO / SAML providers, or at a more basic level via LDAP. Furthermore basic username/password authentication is provided as a default - this is always over a secured TLS connection.
For our customer extranet used for the provision of support, e-mail and password is used to gain access over a TLS secured connection.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
SAML and LDAP

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcumus ISOQAR
ISO/IEC 27001 accreditation date
19/06/2017
What the ISO/IEC 27001 doesn’t cover
All operations of our business are covered by this certificate (it extends to the full business).
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
SecurityMetrics
PCI DSS accreditation date
02/07/2017
What the PCI DSS doesn’t cover
Our PCI DSS certification relates to online payments for our service only, and states that we do not handle credit card information (we use a separately certified payment supplier).
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our full Information Security Policy is available online. Here is an overview.

We have implemented the following:

- Implementation of a sensitive information control policy including compliance with regulations under the Data Protection Act 1998 to protect client, partner, supplier, our own and personal employee information which is not in the public domain.
- Implementation of an Information Security Risk Assessment Process that assesses the business harm likely to result from a security failure and the realistic likelihood of such a failure occurring in the light of prevailing threats and vulnerabilities, and controls currently implemented.
- Development and implementation of a Business Continuity Plan to counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters.
Defined security controlled perimeters and access to controlled offices and facilities to prevent unauthorised access, damage and interference to business premises and information.
- Provision of information security awareness guidance for all company employees.
- Set up a Senior Management Team that supports the continuous review and improvement of the company ISMS.
- Implemented incident management and escalation procedures for reporting and investigation of security incidents for ISMS management review and action.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our Change Management Procedure is available on request.
We fully track all changes to IT assets using our in-house system build around ISO27001 requirements.
All significant changes are risk-assessed for potential security impact and preventative measures taken as part of our Continuous Service Improvement Process (CSIP).
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our full Information Security Risk Assessment and Management Procedure is available on request.
The Company maintains a Risk Register which contains worksheets related to the ongoing risk analysis of its information in order to assess the business harm likely to result from a security failure. We assess the realistic likelihood of such a failure occurring in the light of prevailing threats and vulnerabilities, and the controls currently implemented.
Potential threats are received via subscription to mailing lists relevant to the packages in question. Patches are deployed immediately for critical updates.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our full Information Security Incident Management Procedure is available on request.
All information security incidents must be reported as quickly as possible to the Information Security Manager so that they may conduct an information security analysis, as required, then prioritise, investigate and manage in a timely manner and that detail(s) of the root cause(s) and any corrective action(s) are tracked in the Security Incident Log.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our full Information Security Incident Management Procedure is available on request, which defines the process for common security events.
Reporting is via our in-house Incident Log, part of our intranet.
The Information Security Manager will analyse the incident reports, (types, volumes and costs of incidents etc), identify root causes and planned improvement actions and prepare summary reports for the Company ISMS Management Review team identifying any relevant trends, ISMS performance and any further recommendations for action.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

We fully offset all carbon produced in the delivery of our services and in addition plant trees for each service provided to ensure we are climate positive.
Covid-19 recovery

Covid-19 recovery

Our software, being web based, facilitates remote working. To aid with the COVID 19 recovery efforts we increased our free Cloud offering to 100GB so that organisations could quickly sign up with us and allow asset sharing with those outside of the office.
Tackling economic inequality

Tackling economic inequality

We are committed to ensuring that there is no slavery or human trafficking in our supply chains or in any part of our business. This statement sets out our current risk analysis and the steps we have taken to deliver on our commitment:
https://www.montala.com/policies?432
Equal opportunity

Equal opportunity

Our recruitment is subject to our equal opportunities policy:
https://www.montala.com/policies?48
Wellbeing

Wellbeing

Montala is committed to encouraging and maintaining good employee relations within a working environment which fosters team working and encourages employees to give of their best. Everyone in the Company and those who have dealings with the Company has a responsibility to maintain good working relationships and not use words or deeds that may harm the wellbeing of others. In addition to the obligations placed upon both employers and employees by the Equality and Human Rights legislation, everyone has the right to be treated with consideration, fairness, dignity and respect. This contributes to a workplace environment in which individuals feel safe and can work effectively competently and confidently:
https://www.montala.com/policies?45

Pricing

Price
£238 to £938 an instance a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We include a fully functional access-all-areas instance with 100GB of storage and no time limit.
Link to free trial
https://www.resourcespace.com/free

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@resourcespace.com. Tell them what format you need. It will help if you say what assistive technology you use.