Event Management Software
Eventogy’s unified events management platform provides the tools for event organisers to create, manage, market, host and report on all aspects of their in-person, hybrid or virtual meetings, conferences and events.
Eventogy has enabled global organisations to deliver events of all scales for more than a decade.
Features
- Event Registration Websites
- Website Content Management System (CMS)
- CRM Integration
- Email Marketing, invitations and guest communications
- Mobile Apps, live polls, Q&A, meetings, notifications, social tools, etc.
- Check-in and badging with iPad app in real time
- White label tools, comprehensive client branding
- Meetings scheduling
- Full Virtual Events platform
- Delegate / Attendee management
Benefits
- End to end management of all events in your calendar
- The only fully unified events platform and mobile apps service
- World class, UK based support team
- Fully compliant GDPR and Data controlling processes
- Data security, trusted by global banks and financial institutions
- Real time reporting and full analytics with audit trails
- Powerful event team management tools
- Easy to use interface, providing powerful feature sets
- Sustainable and ethical practices such as paperless and virtual events
- Better audience engagement with collaborative mobile app features
Pricing
£9,990 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 4 6 3 3 4 0 8 1 6 6 4 1 3 6
Contact
Eventogy
Tom Phillips
Telephone: +442076083000
Email: tom@eventogy.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
-
- 100% web based
- Works cross platform and cross browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLAs demonstrate 2h to 24h depending on priority levels subject to contract and SLAs
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
-
Users utilizing a screen reader are able to navigate through the widget
Users interacting solely with a keyboard can fully interact with the widget
Visually impaired users can interact with the widget in a high-contrast state
Hover states for all buttons and links which can visually change when hovered over or tabbed to
Messages received in live chat can be read out loud and verbally differentiate between the end user and agent - Onsite support
- Yes, at extra cost
- Support levels
-
Technical Support of all components and sections relating to:
- The Platform
- The Event Sites
- The Mobile Apps
- The Check-In App
Business Support consists of assisting The Clients’ teams as part of their day to day duties.
- Setting up the structure of an Events website
- Uploading a guest list to the system
- Custom formatting of a content page
- Building a custom email
- Setting up a custom report
SLA's and the detailed support examples here are included as part of the license fees.
All clients are provided access to dedicated developer and account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide comprehensive, on-site implementation and training.
Each instance receives a product specification guide.
Quick start guides are available through the platform.
Continued training during contract period provided throughout the year.
World class support module in place, telephone and email give direct access to developers. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
We provide a comprehensive set of options to export client data. This is an all data export that can be tailored by our support team to dump a data export with any number of custom headers.
Output file can be XLS, CSV etc. - End-of-contract process
- All data is provided to client at the end of the contract period. The database will then be deleted and all data removed from Eventogy's servers after an agreed period of time.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Yes. The application has been built to create public facing websites which are fully responsive in design and build.
In addition, we have a suite of dedicated mobile applications which are both native and also web based, both of which have been designed specifically to work on smart phones. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
APIs are built and are subsequently provided to clients subject to consultation. We do not provide open APIs in order to maintain high levels of security.
Our product specification guide is built on a client by client basis and is tailored for each requirement.
Our API is designed to integrate seamlessly into CRM systems and other business critical platforms in order to provide a two way flow of data between Eventogy and your own business.
There are no limitations to what our API would be able to perform. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Although Eventogy is off the shelf, it does offer certain white label benefits. We entertain custom client requests that may improve their workflow to meet a business demand. We may review all requests and costs may apply.
Scaling
- Independence of resources
- Providing software through cloud environment allows Eventogy to benefit from elastic computing, load balancing, and multi-site tenancy, ensuring the clients' experience is never compromised.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Eventogy captures every single action by both administrators and attendees.
We use both Google Analytics as an optional tool and our own dashboards for real time analytics.
Our integrated mobile apps provide real time engagement metrics that can be viewed and presented during live events. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
We have a comprehensive reporting module which allows users to export data through the reporting wizard.
More complex requirements are managed through our support channel, with no limit to the reporting output provided at no extra cost.
API tools also allow direct and automatic exporting to client platforms. - Data export formats
-
- CSV
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
Eventogy is committed to providing the highest standards of service and support and if we fail to achieve these standards we shall apply a credit for each day where we fail, calculated by dividing the fees paid by the Client by the number of days in the billing period.
The Service Provider warrants to:
- Deliver managed services within agreed milestones and deadlines.
- Provide access to the services for 99.9% of the time in any 3-month period, excluding updates, maintenance or a force Majeure event.
- Provide access to any website hosted within the system for 99.9% of the time in any given 1- month period, excluding scheduled maintenance or reasons beyond our reasonable control.
- Provide access to support at all times during business hours on business days and respond to requests for assistance within 1 business day for 99.9% of the time, or within 12 hours on any calendar day where you use the Service Providers managed services. - Approach to resilience
-
Eventogy can be configured to be managed in datacenters that have seperate locations to ensure failsafes and BCM.
In the event of an individual server failing there will be no perception of downtime to user as the secondary server sets come online.
Data is written synchronously to multiple server locations to continue to operate in case of individual server failure. - Outage reporting
-
Eventogy database servers are managed by our partner hosts who have their own SLAs. Part of this SLA involves 24/7 monitoring of servers and instant notifications of any downtime, outages and general latency spikes.
Any scheduled maintenance and patching on hardware and server operating systems are scheduled and notified in advance.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
For platform management, we use three factor authentication to restrict access to management interfaces. This includes VPN, IP Whitelisting and username / passwords that meet guidelines.
For Event Managers, we have a variety of options including login and passwords, IP Whitelisting, WebSSO and other options if required. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have a collection of 19 policy documents ranging from information security policies to mobile application security. These are industry standard policy documents that each and every member of staff must read, sign, and adhere to yearly.
Any of these policy documentations are available upon request.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We have a strict change management process that manages version controlling, version logs and documentation.
Versions are maintained for a period of 7 years.
All changes go through a multi-disciplinary, multi-person testing process before deployment to live environments. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Penetration testing reveals any potential compromises which result in action plans. These action plans are resolved based on severity, starting with immediacy.
In addition to this, hardware manufacturers and software service providers notify both Eventogy and our partners in any instance of a patch, compromise or vulnerability. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
All computer systems are logged. The data logged supports the security, compliance and capacity planning requirements of the system.
Users are given clear information of what is recorded, the purposes of the recordings and the retention of the data collected. This is made available to users in the form of a privacy policy.
The DPA requires that any personal data collected is collected for specific purposes and it is deleted when it is no longer needed. Audit logs are configured to record any actions undertaken using administrator or elevated privileges. Audit logs are secured to protect them from unauthorised modification. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have a business continuity plan that details the processes of dealing with incidents. These range from:
- Adverse weather
- Interruption to utilities
- Security incidents and theft
- Health & safety incidents
- Act of terrorism
- New laws and regulations
Details of major incidents and action taken will be recorded. These notes may be referred to if there is any further investigation and it will also inform future business continuity planning.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Eventogy does all we can to fight climate change.
We promote paperless events in all our events and our software is designed to do this.
Internally, we use only cloud tools and do not print. - Covid-19 recovery
-
Covid-19 recovery
Unknown - Tackling economic inequality
-
Tackling economic inequality
N/a - Equal opportunity
-
Equal opportunity
n/a - Wellbeing
-
Wellbeing
n/a
Pricing
- Price
- £9,990 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Access to fully featured sandbox environment for an agreed period of time.