Skip to main content

Help us improve the Digital Marketplace - send your feedback

Juniper Education Services Limited

Sonar Tracker

A powerful tool helping schools improve pupil outcomes through intuitive data input and comprehensive assessment of attainment. Its reporting/analysis capabilities offer insights, facilitating effective support and intervention strategies. With a holistic view including a comprehensive MAT perspective, it identifies attainment, progress, and disparities among key groups, helping implement targeted interventions.

Features

  • Real-time reporting for attainment and progress
  • Record pupil observations
  • Multi-Academy Trust data and analysis
  • Statutory Assessment data and reporting
  • Assessment types: formative, summative, tests, targets
  • Parent Reporting
  • Analytics Dashboard
  • National benchmarking to compare schools across England

Benefits

  • Enter data easily to reduce unnecessary workload on teachers
  • Customise objectives, subjects and tests to suit your school
  • Synchronise with your MIS via Wonde
  • Support decision making with timely and accurate data
  • View all your schools’ attainment and progress using Multi-School
  • Identify opportunities for CPD within your school or Trust
  • Target interventions ensuring resources and efforts are channelled precisely
  • Improve pupil outcomes, target key groups, focus your interventions

Pricing

£657.00 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@junipereducation.org. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 6 1 6 7 8 3 9 9 8 9 5 1 9 8

Contact

Juniper Education Services Limited Aimee Hardy
Telephone: 03452008600
Email: tenders@junipereducation.org

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service Level Agreements (SLAs) vary from 1 hour to 4 weeks, contingent upon query priority, ranging from P1 High Priority to Low. P1 issues, necessitating immediate attention, demand a swift resolution within an hour, ensuring critical operations aren't disrupted. In contrast, lower priority concerns categorised as Low may allow for a more lenient timeframe of up to 4 weeks for resolution, accommodating less urgent matters without compromising service quality. This tiered approach enables efficient resource allocation and timely response according to the criticality of each query, optimising operational efficiency and customer satisfaction.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We use a 3rd party website chat provider
Onsite support
Yes, at extra cost
Support levels
At the heart of our service lies a commitment to empowering your success through a comprehensive support infrastructure. Our primary support tier, known as 1st line support, adeptly handles everyday queries and basic troubleshooting through our accessible Online Knowledge Base. Users find instant solutions and guidance, ensuring seamless operations.

Moreover, our dedicated agents stand ready to provide personalised assistance via phone or ticketing system, guiding users through 'how-to' queries and deeper troubleshooting with care and expertise. For more complex technical challenges, our 2nd line support steps in, leveraging advanced expertise and detailed investigation. This tier, accessible through escalation, ensures that even the most intricate issues are addressed efficiently, maintaining high standards of customer satisfaction and support quality.

Our tiered support system is designed to meet diverse needs promptly and accurately, delivering the right level of expertise precisely when it's needed. With us, you can rest assured that your concerns will be met with dedication and proficiency, ensuring smooth operations and maximising the value of our solutions for your organisation.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Upon purchasing our product, we prioritise a seamless onboarding journey to unlock its full potential. Our dedicated Customer Success Managers (CSMs) serve as personalised guides, closely collaborating with customers to understand their unique goals. They offer expert advice and support tailored to individual needs, ensuring optimal utilisation of the product maximising practical and effective use of Sonar. Giving back teacher/pupil time in the classroom is at the forefront of all we do.

Customers also benefit from our extensive knowledge base, accessible through Help Articles. These resources provide comprehensive guidance, including step-by-step instructions and troubleshooting tips, to address common queries and challenges effectively.

For those seeking structured learning, we provide both standard and bespoke online training programs. Our standard modules offer foundational insights into product features, while bespoke training allows customisation to meet specific needs, ensuring relevance and practical application. We are committed to delivering a tailored onboarding experience that empowers customers to succeed from day one.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Before contract conclusion, users can request data extraction from our system. Following the contract end, the account remains active for an additional 90 days, ensuring ample time for data retrieval. We prioritie communication with schools to ensure they are aware of this timeline and offer assistance with the data export process before any deletion occurs. This proactive approach aims to facilitate a smooth transition for users, enabling them to access and retain their data seamlessly. By engaging with schools and providing support throughout this period, we strive to ensure that users can effectively extract their data and transition to alternative platforms or storage solutions as needed. This commitment to proactive communication and assistance reflects our dedication to customer satisfaction and data security.
End-of-contract process
To initiate subscription cancellation, users must provide 90 days' notice before their renewal date. Upon submission and acceptance of the cancellation form, users retain access to the software and our support resources until the final day of their subscription. Our support team remains available to assist with data extraction if needed.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All web based products from Juniper Education are built using responsive design principals. The only difference between the web versions and mobile versions is adaptation of the presentation to a smaller screen size. All features and capabilities are therefore the same across platforms.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Users have extensive options for customising Sonar Tracker to suit their specific needs and preferences. Subjects can be tailored and tracked within the system to match your curriculum offerings. During onboarding, our team collaborates closely with schools to configure subjects for each phase and assessment type, even aligning bespoke curriculum frameworks if needed.

Schools can adapt the assessment methodology and grading system to align with their preferred practices. Our team work with schools to configure the best assessment method, ensuring that Sonar Tracker accurately reflects your grading procedures. Sonar Tracker supports a variety of assessment types, from summative to formative assessments.

We understand the importance of security and role-based access. Therefore, we personalise Sonar Tracker to align with each Schools organisational structure. Through careful configuration of feature availability and user permissions, we ensure that each staff member has appropriate access to features and data, enhancing efficiency and data security.

Overall, our customisable approach ensures that Sonar Tracker can adapt to the unique needs of each school, empowering educators to effectively track student progress and improve outcomes.

Scaling

Independence of resources
Sonar Tracker employs a robust infrastructure and advanced load-balancing techniques to deliver consistent performance, supported by 24/7 monitoring. Regardless of user demand, its efficient server management and scalable architecture dynamically allocate resources, preventing any single user or group from monopolising them. Proactive monitoring detects demand fluctuations, automatically adjusting resource allocation to maintain optimal performance. Continuous optimisation and redundancy measures further safeguard against downtime, ensuring seamless user experiences even during peak periods. This approach guarantees uninterrupted access and utilisation of Sonar Tracker, regardless of concurrent demand levels.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other
Other data at rest protection approach
We ensure robust protection of data at rest through multiple layers of security measures. Internal user access is safeguarded via VPN access and active directory login protocols, ensuring only authorised personnel can access sensitive information. All communication traffic utilises TLS/SSL encryption, guaranteeing secure transmission of data. Additionally, data is encrypted at rest using Transparent Data Encryption (TDE), which provides real-time encryption and decryption of the database, associated backups, and transaction log files. These comprehensive security measures ensure that data remains safeguarded against unauthorised access or interception, maintaining confidentiality and integrity even when stored within our system.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users can export their data swiftly using intuitive in-app features. Trusts can easily export data to CSV format by simply clicking an in-app button. Similarly, schools can effortlessly generate exportable reports in PDF format with just a click of an in-app button. These streamlined processes ensure that users can access and utilise their data efficiently, whether they need detailed CSV files for further analysis or polished PDF reports for presentations or sharing purposes.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • CTF
Data import formats
Other
Other data import formats
CTF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
Internal user access requires VPN access and active directory login to this VPN. All traffic uses TLS/SSL to communicate.

Availability and resilience

Guaranteed availability
In the event of service interruption, our commitment is to swiftly minimise impact. Our dedicated team promptly address any issues and work to restore normal service, ensuring minimal disruption to operations. Throughout the resolution process, transparent communication remains paramount. We provide regular updates on our efforts and status of actions taken to address the underlying cause, keeping you informed every step of the way.

Urgent (P1) : Complete system failure. system wide inability to perform any key activities, i.e. send messages, take a register, access the system, complete payroll. Response 1hr, Resolution 8hrs

High: A key system is not functioning, causing high impact to the operating system. There is no work around or manual process. All users unable to run a key report, problem in key area is time sensitive statutory returns, payroll run. Response 4hrs, Resolution 5 days.

Normal: An issue that impacts noncritical activities but is time critical the issue can be resolved by a workaround or manual process. Unable to run a report, calculation discrepancy, unexpected behaviour of an area of the system. Response 8hrs, Resolution 4weeks.

Low: An issue that has low impact and has a suitable workaround available. It is not time critical. Response 8hrs.
Approach to resilience
SQL Database employs Log Based Backups as a crucial safeguard to enhance resilience in the face of any data-related issues. This approach continuously captures transaction logs, serving as a comprehensive record of database changes. In the event of unforeseen incidents or failures, these logs enable efficient recovery to a specific point in time. Log Based Backups provide granular control over data recovery processes, allowing for precise restoration to minimise downtime and mitigate potential losses.

Our datacenter setup is designed with resilience in mind, although specific details are available on request. We adhere to government cloud security principles, particularly the second principle of 'Asset protection and resilience'. This principle emphasises safeguarding data assets and ensuring service resilience against disruptions or threats. Our commitment to resilience extends beyond technological measures to encompass robust operational protocols and disaster recovery plans, ensuring continuity of service and data integrity for our users. By leveraging Log Based Backups and adhering to security principles, we offer enhanced data protection and reliability, instilling confidence in our users regarding the availability and integrity of their critical data assets.
Outage reporting
Downtime incidents are swiftly communicated via in-product messaging, ensuring immediate awareness for our users. We prioritise thorough tracking and resolution by meticulously creating Zen Desk tickets, which are shared with the customer for accurate tracking by both Juniper support and the customer's records.

Our outage reporting system is robust, aiming to minimise disruption. Immediate email alerts are sent to our support and infrastructure teams when an outage is anticipated or occurs. This triggers a swift verification process to determine the issue's nature and scope. Once verified, we promptly communicate with customers, often through updates on our dedicated status page (Status Updates – Sonar Tracker), providing real-time information and progress reports. Additionally, direct email communication ensures all affected parties are promptly informed.

Our commitment to transparency means we provide regular updates until the issue is fully resolved, empowering customers to manage their activities with minimal disruption. This multi-channel approach ensures timely and comprehensive communication regarding any outages, enabling users to stay informed and prepared.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access permissions are meticulously tailored to roles and responsibilities, conforming to the principles of Role-based Access Control (RBAC). Authentication procedures and login procedures rigorously verify permissions, ensuring alignment with organisational structures.

Encryption measures are deployed to prevent unauthorised access and uphold data integrity. Access logs meticulously track user activities, enabling prompt detection of unauthorised access attempts or suspicious behaviour.

Our commitment to data security extends to regular training for all staff members, emphasising critical importance of data within the software. Training reinforces adherence to access restrictions across management interfaces and support channels, fostering a culture of vigilance and compliance throughout.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Juniper Education, adopts a proactive approach to remediation. It begins with a thorough assessment of existing protocols and vulnerabilities, identifying gaps and areas for improvement. Swift action follows, with the establishment of tailored security measures aligned with industry best practices. Robust policies and procedures are implemented, bolstering defences and mitigating risks effectively. Continuous monitoring and audits ensure ongoing compliance and readiness to adapt to evolving threats. By prioritising security as a foundational element, Juniper Education fosters a culture of resilience, safeguarding sensitive data and maintaining trust among stakeholders.
Information security policies and processes
At Juniper, cybersecurity oversight is led by a board-level member dedicated to ensuring the security, resilience, and reliability of our products, data, and services. This executive collaborates closely with Juniper's internal IT, software engineering teams, and the Data Protection officer to enforce daily adherence to established processes. These processes include subjecting all code changes to thorough scanning for vulnerabilities before release and ensuring that security test cases are integrated into testing protocols for changes or new features.

Furthermore, all security-related changes and tests are meticulously documented within Jira, Juniper's Agile development SDLC tool. In the unfortunate event of a cybersecurity incident, Juniper's Incident Management process is promptly activated, enabling swift and effective response and resolution. This dedicated oversight ensures that cybersecurity remains a top priority across all aspects of Juniper's operations, safeguarding our systems and data against potential threats.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Juniper employs an Agile-based methodology to support and enhance the SONAR solution, leveraging industry-standard tools like Jira and Confluence to manage changes and configurations. Requests are meticulously logged in Jira and prioritized, then integrated into development sprints for thorough testing and release to Production.

During the Quality Assurance (QA) phase, dedicated QA teams craft test cases that encompass security-related aspects of applied changes. Infrastructure provisioning is streamlined through Terraform, while software deployments are orchestrated via Pipelines (Azure DevOps). Multiple layers of user approvals are mandated for all changes, ensuring stringent oversight and adherence to established protocols throughout the development lifecycle.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Juniper partners with an esteemed external security provider for monthly network scans, covering comprehensive assessments for common vulnerabilities, including TLS versions. Identified CVE issues are promptly addressed through monthly patching routines. Furthermore, our staff undergo regular security training sessions, which encompass monthly phishing simulations. Results from these simulations are meticulously recorded, and remediation measures are promptly implemented for staff members requiring further cybersecurity training. This proactive approach ensures the continual enhancement of our network security posture and fosters a culture of awareness and preparedness among our team members.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All traffic within SONAR undergoes stringent scrutiny, swiftly detecting malicious activity. Our firewall takes action, automatically blocking malicious traffic alerting our IT team.

Adhering to rigorous patch management, ensuring our solutions receive monthly updates, including critical security patches for the underlying operating system. Our vigilance is augmented by collaborative efforts with renowned security entities. We continuously monitor and analyse emerging threats, enabling proactive threat mitigation measures.

Our dedicated team is poised to respond promptly, committing to addressing reported incidents within one hour during business hours. This proactive approach underscores unwavering commitment to maintaining the integrity and security of our systems.
Incident management type
Supplier-defined controls
Incident management approach
Juniper boasts a dedicated Incident Management team comprised of skilled professionals from IT, Operations, and Support departments. In the event of an incident, this agile team convenes to swiftly address and triage the situation.

Effective communication protocols with customers and third parties are promptly established and executed to ensure transparency and timely resolution.

This cohesive and proactive approach ensures that incidents are promptly addressed with the utmost efficiency and transparency, reaffirming our commitment to delivering exceptional service and support to our valued customers.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our organisation maintains a firm commitment to environmental stewardship, sustainability, and carbon reduction, underscored by our comprehensive Environment & Sustainability policy. As part of this commitment, we have implemented a range of strategic initiatives to reduce our energy consumption. Notably, the installation of Passive Infrared Sensors (PIR) to most of our offices, which has proven instrumental in energy conservation. Furthermore, we actively promote recycling practices and employ responsible waste disposal methods to mitigate our environmental footprint. In nurturing a culture of environmental responsibility within our organisation, we foster internal communications and actively engage our employees to encourage eco-friendly behaviours and practices. We have a primarily remote or hybrid workforce, and online meetings are our default, deliberately chosen to reduce the amount of travel required from our dispersed employees. We regularly review our employee location heatmap to minimise travel generally, and to ensure opportunities for employment and progression are not limited by geography. This collective effort is a reflection of our unwavering dedication to environmental preservation and sustainability.

Covid-19 recovery

Our organisation places paramount importance on both pandemic resilience and the assurance of a secure working environment for our entire workforce, meticulously adhering to local health guidelines and government mandates. Our comprehensive strategy encompasses the facilitation of remote and hybrid working arrangements wherever feasible, complemented by rigorous enhancements to our cleaning protocols. Sanitiser and masks are always available in all of our office locations. Furthermore, we actively encourage employees to avail themselves of vaccination opportunities, prioritising their health and safety. To address prospective challenges, we persistently invest in fortifying our technological infrastructure, bolstering the organisation's capacity to support remote work and collaboration. Our commitment extends to ongoing employee training initiatives, designed to prepare our workforce for any potential future adjustments. Within our organisation, our Human Resources department diligently oversees policy adjustments, affording paramount consideration to the welfare of our employees. We are dedicated to fostering a culture of transparent communication, maintaining a continuous dialogue with our employees to grasp their concerns and requirements. We carry out regular satisfaction surveys, linked to our 5 core Values, and our HRIS has a daily pulse Happy/Neutral/Sad survey which is reviewed weekly. We constantly review our provision of a secure and steadfast work environment, simultaneously ensuring the uninterrupted flow of our business operations. We feel adaptability and preparedness are essential.

Tackling economic inequality

Our organisation actively participates in apprenticeship programs. We are currently sponsoring an employee who is in the process of completing their Chartered Manager Degree Apprenticeship and have Apprenticeship opportunities planned for 2024. As part of our commitment to employee development, the organisation conducts routine training reviews to identify areas for improvement among our employees. We strongly advocate for employee training and frequently enter into training agreements with our employees to facilitate their ongoing professional growth. The provision of employee training is viewed as an investment in the advancement, cultivation, and overall prosperity of both our employees and the organisation. It yields a more proficient and engaged workforce, enhances productivity, and positions us favourably in the competitive landscape. We have introduced a ‘Juniper Minimum Wage’ for our employees, which ensures that everyone earns a Full Time Equivalent of £22,000pa – higher than the current National Living Wage rate. This company-specific rate will be reviewed annually, and our aim is always to meet and exceed the National Living Wage rate. 5 Our organisation is dedicated to promoting diversity and inclusion throughout its supply chain. We have implemented specific policies, such as Equal Opportunities & Diversity, Conduct & Standards, Bullying & Harassment, Safeguarding Policy which actively promote the participation of a wide variety of businesses. We diligently adhere to a transparent and equitable procurement process, with a clear emphasis on merit-based decisions that factor in supplier cost and availability. Our approach is rooted in objectivity and considers the qualifications and capabilities of suppliers without bias. We are aware of the importance of addressing any unconscious bias, and remain committed to ensuring that our supplier selection process is impartial, based solely on merit and the ability to meet our requirements. The Facilities team actively seek RAMs/Risk assessments and manage these processes with external contractors.

Equal opportunity

Our organisation is dedicated to promoting diversity and inclusion throughout its supply chain. We have implemented specific policies, such as Equal Opportunities & Diversity, Conduct & Standards, Bullying & Harassment, Safeguarding Policy which actively promote the participation of a wide variety of businesses. We diligently adhere to a transparent and equitable procurement process, with a clear emphasis on merit-based decisions that factor in supplier cost and availability. Our approach is rooted in objectivity and considers the qualifications and capabilities of suppliers without bias.

Wellbeing

Regular assessments are vital to our approach ensuring the well-being of our employees. We employ an independent Occupational Health service taking recommendations and advice. We actively promote 121 meetings between employees and line managers, serving as a platform for transparent and open communication. Employees and line managers discuss goals, track progress, and seek/provide support or additional training as needed. These sessions provide a safe space for employees to address work-related stress, personal challenges, and other issues. Our advocacy for 121 meetings with line managers plays a pivotal role in nurturing employee-manager relationships, supporting individual development, fostering open lines of communication, and ensuring alignment with our goals and values. We provide a free-to-use Employee Assistance Platform (EAP) where employees have access to qualified and experienced counsellors, receiving advice similar to services provided by Citizens Advice. The EAP is instrumental in addressing sickness absence and presenteeism rates, offering counselling support helping employees identify the root causes of their concerns. The well-being of every individual is our top priority. The EAP serves as one of the ways through which we offer support for mental well-being and provide a system that can make a substantial difference in our lives. This service is also open to close relatives of employees. Our HR Information System (HRIS), NaturalHR, features a daily Pulse survey accessible to all employees. This survey allows employees to express their current emotional state by clicking on an emotion that best represents their feelings. The HR department can access this data in real-time, enabling us to promptly address any concerns arising from unhappy responses. The information is also reviewed on a weekly basis. As a part of our commitment to employee well-being, we have provided free lunchtime learning sessions in the form of financial well-being webinars for our employees. These will be repeated annually.

Pricing

Price
£657.00 a licence
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@junipereducation.org. Tell them what format you need. It will help if you say what assistive technology you use.