Roxhill Media
Roxhill is a database that delivers accurate details of UK and international journalists, broadcasters, bloggers and podcasters
It is used to find and engage a high number of relevant journalists quickly and as such, helps them secure all possible press coverage.
Features
- Contextual media list building
- Press release distibution
- Press release engagement analysis
- Social media analysis
- Media request alerts
- Forward feature alerts
- Journalist interviews
- Journalist move alerts
Benefits
- Market leading data accuracy saves time
- Fast, knowledgeable support saves time
- More relevant media lists deliver greater journalist engagement
- Social and article content delivers better journalist insight
- Users can manage journalist relationships on the move
- Better journalist engagement delivers more press coverage
- The use of leading technology delivers increased reliability
- Journalist events deliver education and training
Pricing
£3,000 to £25,000 an instance a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 9 4 0 8 5 8 6 1 0 3 1 7 2 4
Contact
Roxhill Media
Phil Godson
Telephone: 07971 696 710
Email: phil@roxhillmedia.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Roxhill is a service used by marketing, communication, social and press teams
- System requirements
- Access to a web-browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 15 minutes during the working week
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Each Roxhill client is allocated a dedicated account manager who delivers all training and may be contacted directly by phone or email
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Each client is allocated a dedicated account manager who carries out full training and is on hand to co-ordinate all onboarding tasks
- Service documentation
- No
- End-of-contract data extraction
- Any media lists built by the client may be downloaded into an Excel file
- End-of-contract process
- Once the contract ends, access to the database is switched off
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Lighter functionality on the mobile app
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The API links Roxhill to the CCS Framework listed Press Office Solutions Ltd COLIN media management tool. This is available at an additional cost.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- The number of concurrent user licences
Scaling
- Independence of resources
- Server loads are monitored and hosting support agreements ensure even load spreading to deliver reliability
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data is exported by selecting the required records and clicking a download button
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- As an online portal we are required to deliver a continuous service to our clients. We monitor outages and aim to have a service uptime of >99%
- Approach to resilience
- We outsource to Amazon Web Services who secure and manage our data resilience, via a contractually agreed SLA.
- Outage reporting
- Email alerts to clients if a significant outage is experienced. All clients have direct telephone and email contact with their account manager,
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- There are no management interfaces. Full support is delivered by dedicated account managers.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- As an SME, we have a flat hierarchy, continual daily monitoring to our security logs and are able and will respond to abnormalities on an ongoing basis.
- Information security policies and processes
- We maintain, and regularly review and update a corporate security policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We maintain an active product development process and any changes are fully spec'd, reviewed and tested on delivery. As part of this development process, all changes are reviewed from a security viewpoint.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Managed by our third-party cloud provider. We maintain an in-house development team who constantly review and integrate new updates and patches as required
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We actively monitor all elements of the development stack which sit behind VPNs and firewalls. Any compromise is quickly escalated on discovery. As a small business, we are able to respond in real-time and deploy solutions as soon as they have been formulated.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Every client has a dedicated account manager through which issues are reported and escalated.
Incident reports can be produced on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Policy in place - Covid-19 recovery
-
Covid-19 recovery
Policy in place - Tackling economic inequality
-
Tackling economic inequality
Policy in place - Equal opportunity
-
Equal opportunity
Policy in place - Wellbeing
-
Wellbeing
Policy in place
Pricing
- Price
- £3,000 to £25,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Full trail service for a limited period (maximum 2 weeks) without the ability to download data or send press releases.