Immersive space and immersive classroom cloud software
A web-based CMS solution for immersive spaces and immersive classroom installations, i.e. Igloo. It uses the system's browser, scaling content perfectly to match the space. The use of web-based animation and much more allows branded and engaging content to be created and edited remotely through an easy-to-use online interface, cost-effectively.
Features
- User-friendly CMS for content creation
- Content preview
- System adapted for you installation space
- Custom feature development
- Options to embed video, animated charts, Imagery and more
- Control screens and lesson/presentation from your mobile device
- Fully browser allowing for remote content creation
- UK cloud hosted solution
Benefits
- Quick and easy to use, saving time and money
- Easily create flexible content from anywhere (browser based accessible online)
- Templates created for specific needs
- Create engaging content that benefits from web animation
- Great for engaging classroom lessons or events
- Works from the browser, adapting to your space
- Audience collaboration and interaction functionality
- Share content between locations
- Direct users for additional web-based learning
Pricing
£400 a unit a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 7 8 0 7 9 2 7 4 7 4 4 3 0
Contact
Feel Created LTD
Ian Long
Telephone: 01924 802 185
Email: hello@feelcreated.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- The system will have occasional security and system updates, though these are, wherever possible performed out of standard business hours
- System requirements
-
- Browser support on your immersive space solution
- Initial testing for suitability
- Set-up for space specific scaling
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We aim to respond to all queries within 2 hours and action timeframes as specified below, during normal working days (Monday - Friday, 9am to 5pm). Requests made on a weekend would be responded to as soon as possible.
Severe / Urgent Priority Issue:
8 Hours (within normal working hours. A key contact would also be supplied for such eventualities)
Medium Priority Issue:
2 Working Days
Low Priority Issue:
5 Working Days - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
As standard, support is offered including security patch updates within the cloud hosting and support aspect of the services
Additional levels of support are available with 'general purpose' hours can be purchased at an additional cost - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Onsite or online training can be provided detailing through system use will be provided, subject to the chosen package. Where hosting is performed online, the session will be recorded and made available to your team, once edited.
Additionally, documentation will also be supplied for use at a later date, if required. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Requests can be made with a copy of data in CSV format, SQL and and client owned specific media being available.
- End-of-contract process
- Should you choose to end the service, all relevant content will be packaged and supplied to your team via a chosen method, following completion of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Administration of the system and content creation (though not advised for the best experience) can be completed on mobile devices.
Specific functionality for users to engage with the immersive space outputted side is available. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
-
The system is web-based with created content being outputted and scaled to the immersive space location.
A CMS is available for content creation and administrative user management - Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Industry-standard tools are used to test areas of the system for accessibility.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The system is set up for users to be able to create engaging content for their immersive space. Specific branded blocks are created for this but the user can control numerous aspects including the content chosen for each slide.
System administrators can also create other admin user accounts for the system.
Scaling
- Independence of resources
-
Systems are hosted within their own areas / for their immersive space areas specific to them.
Solutions are hosted on an optimised cloud server solution with load balancing which can be scaled to match requirements.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Standard Google analytics can be supplied as part of the set-up, if required
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
-
All data on our servers is encrypted at rest and in transit, by default. All data that is stored on our servers is encrypted at the storage layer using the Advanced Encryption Standard (AES) algorithm, AES-256.
Additionally, all back-up media is encrypted. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users would be required to contact us to export data and any uploads to the system.
- Data export formats
-
- CSV
- Other
- Other data export formats
- SQL
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Images
- Via standard interface text editing options
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- As standard, a server's hosting will be available 99.95% of the time, excluding any Excused Downtime details which can be found in our terms document but, for instance, include time for scheduled maintenance.
- Approach to resilience
-
Systems are housed within a Google Cloud infrastructure with load balancing being in place, along with DNS being served over Cloudflare for additional performance and security benefits.
Additionally, the data center environment undergoes a SSAE-18 examination at least annually and are ISO 27001:2013 certified.
Firewalls are also configured and regular back-ups, in place, should the need arise.
Our server provider has intrusion detection or intrusion prevention systems which are used to monitor and/or protect the network.
The server provider network undergoes regular penetration tests and security patches are regularly applied to ourhosting environments. We will also regularly run system updates for security and performance patches, with the frequency subject to your chosen service level. Strict procedures are followed and back-ups put in place prior to performing any updates with instant rollback points being triggered, should an issue be identified.
We also have a disaster recovery policy in place and on hand to revert to should the need arise. - Outage reporting
-
Our server provider has systems in place to notify us of any outages and we have separate 'uptime' monitoring in place, which emails us, should the system be identified as being down.
In the event of any system outage, our disaster recovery policy would be followed and clients notified and updated at the relevant stages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Management of content can only be completed through the CMS which requires users to be registered with a username and password (strong password enforced). Additional multi-factor authentication can be enabled, as required and following consultation between the client and our team.
Support is requested through standard means and our project management tool which requires users to have formal access. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are Cyber Essentials certified and have policies in place surrounding security that all employees are required to adhere to.
- Information security policies and processes
-
Our information security document is in place. This contains the various policies for aspects relating to information security and is provided to all staff members to review. Staff members are required to agree to the policy with failure to follow the guidelines, potentially resulting in disciplinary action.
Any breaches of protocol must be reported to the directors of the business who will take any necessary action.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
- Core development code is managed using GIT repositories with revisions management being in place based on individual activities
- Hosting logs are directly stored for 30 days and can be retrieved for up to 12 months as standard.
- Where changes are made to the overall system, a structured approach is used to process from a development version (local and cloud options) of the system through to staging for client approval, before final release to the live environment - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
All server solutions are fully managed and held with an ISO 27001:2013 certified supplier. Security patches are regularly applied with back-ups being regularly put in place.
Direct system security patches are regularly released and applied to the system as part of the ongoing maintenance and hosting service. The frequency patches are applied here is subject to the chosen level of service.
Potential threats are identified via the industry standard routes. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Active file change monitoring is active on system installs with notifications of any changes being sent to our team for review.
Should a vulnerability be identified we would follow our disaster recovery policy.
We aim to respond to all queries within 2 hours, Monday-Friday, 9am-5pm
Severe / Urgent Priority Issue:
8 Hours, within normal hours.
Medium Priority Issue:
2 Working Days
Low Priority Issue:
5 Working Days
Additionally, the server instances have firewalls configured based on the principle of least privilege, where firewalls only allow approved applications, protocols, and services required to meet business needs. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Active monitoring of file changes and uptime monitoring is in place for all managed systems. Should any suspicious activity or downtime be experienced we would follow our policy steps to identify any causes and resolve the situation as soon as possible. Should the situation be ongoing a key contact will reach out and keep you informed of any ongoing activities and the expected resolution timeframe.
A key contact will be supplied, along with access to our project management tool for clients to log any requests.
If required, a report will be provided following any incident, with information surrounding the cause.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We're committed to operating as a carbon-neutral supplier (through our own calculations) with a long-term target to become formally accredited. We offset unavoidable carbon through Ecologi's carbon offsetting scheme and we plant trees every month too. We advise our clients to reduce the carbon footprint of their website builds by request and hosting websites on our green hosting service.Tackling economic inequality
We are committed to working with local suppliers where necessary. We also offer work experience placements or internships and are committed to utilising apprenticeship schemes as possible.Equal opportunity
At Feel Created, we are fully committed offering equal opportunities in the workplace. We believe that all individuals deserve to be treated with respect and fairness, and our policies reflect this ethos. We provide equal employment opportunities to all applicants and employees without regard to age, disability, gender, gender reassignment, marital or civil partnership status, pregnancy or maternity, race, color, nationality, ethnic or national origin, religion or belief, or sexual orientation. We are committed to fostering a culture where everyone's talents are valued, and opportunities are available to all on the basis of merit and potential.Wellbeing
Feel Created acknowledges its responsibility to safeguard the health, safety, and wellbeing of everyone impacted by its operations, whether on its own property or at client sites. Our approach to wellbeing includes:
Mental Health Awareness
Recognising the growing importance of mental health awareness we will provide support to our team as needed. We also encourage our team to break away from their screens and go for walks or have walking meetings within the National Trust grounds of our office environment.
Regular Check-Ins
Employee wellbeing is an integral part of our performance management. Regular one-on-one meetings and check-ins prioritise wellbeing alongside performance objectives and goal setting.
Healthcare and general benefits
We have established a scheme for our employees to be able to reclaim money against healthcare expenses, such as the purchase of glasses, dental care and other treatments. The scheme also gives access to discounts at various shops.
In addition, we actively review our approach to health and safety to ensure our commitments to wellbeing are met.
Pricing
- Price
- £400 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- No