Grant Thornton - Place Analytics
Place Analytics provides deep and rapid insight into the performance of places and the levers that fundamentally affect them.
It distils thousands of data sets on people, businesses, markets and the environment and provides insight through an intuitive interface.
It provides a comprehensive evidence base for strategic and investment decisions.
Features
- Access 5,000 cleansed, current data sets and prprietary KPIs
- Easily build bespoke spatial/catchment areas
- Easily build dashboards
- Algorithms enable places with similar characteristics to be indentified
- Share dashboards with colleagues across your organisation
- Easily upload your own data
Benefits
- Segment and visualise key datasets relating to a place
- Analysis data across a range of spatial levels
- Benchmark any location on a consistent basis
- Set baseline information for future comparison and reporting
- Visualise relative strengths and weaknesses of places
- Understand relative performance of a local economy
- Identify traits and characteristics of different section of the community
- Align your services to the characterisics of a local economy
- Access population projections
- Asset, network and resource optimisation
Pricing
£15,000 to £50,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 4 9 8 8 0 3 3 8 0 2 5 8 9 6
Contact
Grant Thornton UK LLP
Public sector bids team
Telephone: 0207 728 3311
Email: publicsector.bids@uk.gt.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- N/A
- System requirements
- Works with all latest internet browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Responses are usually within 24 hours depending on the nature of the question
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Level 1 - phone and email;
Level 2 - analyst support via phone;
Level 3 - on site support. We provide analyst or technical support and this is based on a daily rate priced as per the rate card - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Users receive onsite and online training as well as comprehensive user document - written and video.
We also provide monthly training sessions for all users and other quarterly user community activity.
Users can also directly contact one of our analysts or account managers for direct support. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Online training
- End-of-contract data extraction
- User provided data is returned using a CSV and is deleted from our servers.
- End-of-contract process
-
The service is switched off and users can no longer access it.
There are no additional costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile version provides cut-down functionality
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Through regular performance monitoring and balancing
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide details on usage by the organisation based on number of log ins
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- They request the export via the account management team
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- No data passes from the buyer's network to the cloud service
- Data protection within supplier network
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- N/A
- Approach to resilience
- Available on request
- Outage reporting
- Clients are notified via email alerts if there are any service outages
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access is granted using RBAC
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyds Risk Quality Assurance
- ISO/IEC 27001 accreditation date
- 28/06/2015
- What the ISO/IEC 27001 doesn’t cover
- Audit and Tax services
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- IS27001 and Cyber Essentials Plus
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Grant Thornton have implemented a Change and Release Management (CARM) process, based on the ITIL Service standard that complies with best practice.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
The external network is subject to monthly vulnerability testing, or in response to specific threats, using a CREST accredited third party. Where a high-level vulnerability is identified, the Incident Management process is utilized to quickly resolve the issue and identify any security breaches.
The results of each scan are recorded within the IS Service desk system and reviewed by the senior IS Managers to organise the resolution of any identified issues. All remediation is conducted through the Change And Release Management (CARM) process. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All network events are recorded for use as part of an investigation in the event of an incident. Systems administrators monitor firewall and security software for alerts and respond accordingly. Network logs are maintained as part of the IS Security controls and the Document Management System logs all account activity within an audit log that is inviolate which can only be accessed by the systems administrator.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident Management procedures have been implemented as part of both the ISO 20000 and 27001 certifications. All people can report Information Security incidents through the IS Service desk or Grant Thornton House main reception which is supported by the Grant Thornton facilities provider on a 24-hour basis.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our environmental actions will focus on our three major carbon sources:
1) Business travel
2) Waste generation and disposal of non-recyclable waste; and
3) Gas usage for heating offices, electricity use, air-conditioning and IT.
METHOD
For each call off from the framework we will propose, as a minimum, to:
- identify specific targets an individual client (or collaboration of AOs) has and how they can be integrated into our work
- agree our approach collaboratively: does the project require significant co-location and/or travel, or can the project be completed via remote or hybrid working? Our default is to reduce unnecessary travel and emissions to the minimum feasible and we will suggest ways for doing so that will not reduce quality or delivery
- use local capability to reduce travel and commute time: we have 27 offices across the UK and will use suitably qualified local teams wherever practical
Pricing
- Price
- £15,000 to £50,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No