Powered by Neo: Sales Management and Property Sales Portal
Neo Technology's Sales Management Solution streamlines property sales processes, offering a user-friendly portal for buyers and sellers. Our system facilitates seamless transactions, from property browsing to contract signing, ensuring efficiency and customer satisfaction at every step.
Features
- Centralised database for managing property listings and transactions
- Customisable sales workflows tailored to your business needs
- Integration with property listing portals and websites
- Automated prospect management and follow-ups
- Sales performance tracking and analytics
- Document management for contracts and agreements
- Real-time communication tools for agents and clients
- Secure access controls and data encryption
- Mobile app for sales management on-the-go
- Integration with accounting systems for financial tracking
Benefits
- Streamlined sales processes and improved efficiency
- Enhanced visibility into sales performance metrics
- User-friendly portal for buyers and sellers
- Reduced administrative overhead with automated workflows
- Improved collaboration and communication among sales teams
- Secure storage and management of sales data
- Faster property sales turnaround times
- Real-time access to sales data for informed decision-making
- Scalable solution to support business growth
- Enhanced customer satisfaction throughout the sales journey.
Pricing
£2 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 2 9 1 6 7 3 5 7 6 7 6 1 7 8
Contact
NEO TECHNOLOGY LIMITED
Stuart Payne
Telephone: +447719169415
Email: stuart.payne@neotechnologysolutions.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
This solution can be integrated with other applications and for holistic property management solution is also available as part of Neo Technology's property Management Solution “Propsys 360”.
Alternatively, it can function independently to address specific related challenges. - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Neo's solution offers robust features for tenants, staff and properties, constraints may include compatibility limitations with certain legacy systems and custom integration requirements based on unique business workflows.
- System requirements
-
- Operating system compatibility
- Minimum hardware specifications
- Database management system requirements
- Internet connectivity
- Security protocols and encryption standards
- Integration APIs and compatibility with third-party systems
- Scalability and performance benchmarks
- Backup and disaster recovery mechanisms
- User authentication and access control requirements
- Software update and patch management procedures.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We offer both email and online ticketing support to ensure comprehensive assistance for our users.
Our email support allows users to reach out with inquiries, issues, or feedback directly via email, providing a convenient communication channel.
Additionally, our online ticketing system enables users to submit support requests and track their status efficiently. With our ticketing system, users can log their issues, receive timely updates on their resolution progress, and communicate with our support team seamlessly. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- We offer web chat support for quick help. We've tested it to ensure it works well with tools like screen readers. We want everyone, including people with disabilities, to use our chat easily and get the help they need.
- Onsite support
- No
- Support levels
-
On call support can be provided 24hrs, seven days a week, as required and agreed with the client.
All clients have resources, based on support framework required. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We offer a variety of resources to assist users in getting started with our service.
This includes comprehensive user documentation available online, covering all aspects of setup, configuration, and usage.
Additionally, we provide online training sessions and tutorials for users to familiarise themselves with the platform at their own pace.
For those who require further assistance, we offer onsite training sessions conducted by our expert team to ensure a smooth transition and effective utilisation of the service. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Word Document
- End-of-contract data extraction
- At the end of the contract, users can extract their data through a streamlined process facilitated by our platform. We provide tools and mechanisms within the system that allow users to export their data in standard formats such as CSV or Excel. Additionally, users have the option to request assistance from our support team for data extraction, ensuring a smooth transition and compliance with data privacy regulations.
- End-of-contract process
-
At the end of the contract, several processes are initiated. Firstly, there's a review of the services rendered during the contract period, ensuring all deliverables are met. Depending on the agreement, there may be discussions regarding contract renewal or termination.
Regarding pricing, the contract typically includes core services specified in the agreement. Additional costs may apply for extra features, customisations, or services beyond the scope of the standard package. This is clarified in the contract terms and can be discussed with the account manager.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Our service has been specifically designed to work on mobile devices, ensuring a seamless user experience across different platforms. While the core functionality remains consistent between mobile and desktop versions, there are some differences in layout and interface to optimise usability on smaller screens.
For instance, menus and navigation may be simplified or reorganised for easier access on mobile devices. Additionally, certain features may be optimised or adjusted to accommodate the unique characteristics of mobile interactions, such as touch gestures and screen size constraints.
Overall, our goal is to provide a consistent and user-friendly experience across all devices. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
-
Through the interface, users can access and manage various features and functionalities offered by our service.
This includes tasks such as configuring settings, managing data, and accessing support resources. The interface is designed to be user-friendly and intuitive, facilitating efficient navigation and interaction for users of all levels of expertise. - Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
-
We've conducted interface testing with users of assistive technology to ensure accessibility and usability for all individuals.
This testing involved individuals with diverse needs, including those using screen readers, magnifiers, alternative input devices, and other assistive technologies. - API
- Yes
- What users can and can't do using the API
-
Our service provides an API for seamless integration with other systems and applications.
Through our API, users can perform a variety of tasks such as retrieving, creating, updating, and deleting data programmatically. This includes accessing user information, managing resources, querying data, and initiating automated workflows. However, certain administrative functions may be restricted via the API for security reasons, such as user authentication and authorisation settings.
Additionally, while the API offers extensive functionality, some complex operations or system configurations may require direct interaction with our platform's user interface. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users can customise our service to tailor it to their specific needs and preferences. Customisation options allow users to personalise their experience according to their requirements, preferences, and workflow.
This includes adjusting settings, configurations, and layouts to align with individual preferences. Users with appropriate permissions can access customisation features, ensuring that adjustments are made by authorised individuals based on their roles and responsibilities within the organisation.
Scaling
- Independence of resources
-
To ensure independence of resources, we employ robust resource isolation techniques within our infrastructure. Each user's workload is allocated dedicated resources, including compute, storage, and network capacity, preventing resource contention and ensuring consistent performance.
Additionally, we implement dynamic scaling mechanisms to automatically adjust resource allocation based on demand fluctuations, maintaining optimal performance levels even during peak usage periods.
Continuous monitoring and proactive capacity planning further safeguard against resource exhaustion, guaranteeing that users remain unaffected by the demand placed on by others, ensuring a seamless and reliable user experience.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We provide comprehensive service usage metrics through multiple channels for user convenience. Users can access real-time usage data programmatically via our API or through interactive dashboards within the platform.
Additionally, scheduled reports offer regular insights into service usage trends, ensuring continuous monitoring and analysis.
For more specific insights, users can request customised reports tailored to their requirements. This approach ensures that users have access to the information they need to make informed decisions about their usage of the service. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export their data through a straightforward process provided within the platform. Typically, there's an option within the user interface allowing users to select the data they want to export and choose the desired format. The system then initiates the export process, generating a downloadable file containing the selected data. Additionally, users may have the option to schedule automated data exports or request assistance from customer support if needed.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
We guarantee a high level of availability for our service, typically backed by service level agreements (SLAs) that outline specific uptime targets.
These SLAs often specify the percentage of time the service is expected to be available within a given period, such as 99.9% uptime annually.
In the event that we fail to meet these guaranteed levels of availability, users may be entitled to refunds or credits, depending on the terms outlined in the SLA.
Our goal is to ensure that users experience minimal disruptions and can rely on our service to meet their needs consistently. - Approach to resilience
- Available on request.
- Outage reporting
- We'll ensure you're promptly notified of any service outages via email. For enhanced monitoring, we also offer real-time dashboards, providing immediate visibility into service status. Additionally, we provide access to APIs, allowing seamless integration with your systems for outage reporting.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
We enforce strict access controls to ensure that only authorised personnel can access management interfaces and support channels.
This includes implementing role-based access control (RBAC) to limit permissions based on user roles and responsibilities.
Additionally, we utilise strong authentication mechanisms such as multi-factor authentication (MFA) to verify the identity of users before granting access.
Access to sensitive data and administrative functions is further restricted through network segmentation and encryption protocols. Regular audits and monitoring are conducted to detect and address any unauthorised access attempts promptly. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Adoptech
- ISO/IEC 27001 accreditation date
- 10/01/2024
- What the ISO/IEC 27001 doesn’t cover
-
Compliance with industry-specific regulations or standards not explicitly covered by ISO/IEC 27001.
Security practices of third-party vendors or partners not directly under our control.
Aspects of security related to emerging technologies or evolving threats not explicitly addressed in the ISO/IEC 27001 standard.
Internal policies and procedures not directly related to information security management. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We adhere to robust information security policies and processes to safeguard your data. These include measures such as encryption protocols, access controls, regular security audits, and compliance with industry standards like ISO 27001.
Additionally, we implement stringent authentication methods, conduct employee training on security best practices, and maintain a proactive approach to identifying and mitigating potential security risks.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We closely track all parts of our services from the moment they're created until they're no longer needed. When we make any changes, we carefully check them to see if they might cause security issues.
We test everything thoroughly before making the changes to ensure they won't cause any problems. We follow the best practices in the industry and use systems to keep track of different versions of our services, so everything stays organised and secure. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We regularly assess our services to identify any potential weaknesses or threats.
Once identified, we swiftly deploy patches or fixes to address these vulnerabilities.
We stay informed about potential threats from various sources, including security advisories, industry forums, and threat intelligence feeds. Our goal is to proactively address any vulnerabilities to ensure the security and integrity of our services - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Our protective monitoring processes involve continuous monitoring of our systems and networks to detect any potential security breaches or compromises.
When a potential compromise is identified, we have established protocols to promptly investigate the incident and take necessary actions to mitigate the threat.
Our goal is to respond swiftly and meet agreed SLAs to any incidents to minimise the impact and protect the integrity of our services and data. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Users can report incidents through designated channels, such as our support portal or email. Upon receiving a report, our team investigates the incident promptly and communicates updates to users as necessary.
After resolving the incident, we provide detailed incident reports outlining the cause, impact, and actions taken to prevent recurrence, ensuring transparency and accountability in our incident management approach.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Cloud computing helps fight climate change by using less energy and reducing emissions. It does this by making data centres more efficient, so they use less power.
Cloud services also let people work from home more, so there's less pollution from commuting.
Overall, cloud computing is making it easier for everyone to help the planet.Tackling economic inequality
We prioritise initiatives that promote economic inclusivity, such as providing opportunities for small and local businesses to participate in our supply chain.
Additionally, we offer flexible pricing models and discounts to ensure affordability for organisations with limited resources.Equal opportunity
Our service promotes diversity and equal access to opportunities. We actively engage with underrepresented groups, including minority-owned businesses and marginalised communities, to ensure their voices are heard and their needs are met.
Furthermore, our recruitment and training practices prioritise diversity and inclusion.Wellbeing
We prioritise the wellbeing of our employees, customers, and communities. Our service offerings include features designed to enhance mental health and work-life balance.
We also support employee volunteer programs and community initiatives aimed at improving overall wellbeing.
Pricing
- Price
- £2 a user a month
- Discount for educational organisations
- No
- Free trial available
- No