Event Management Software

Eventogy’s unified events management platform provides the tools for event organisers to create, manage, market, host and report on all aspects of their in-person, hybrid or virtual meetings, conferences and events.

Eventogy has enabled global organisations to deliver events of all scales for more than a decade.


  • Event Registration Websites
  • Website Content Management System (CMS)
  • CRM Integration
  • Email Marketing, invitations and guest communications
  • Mobile Apps, live polls, Q&A, meetings, notifications, social tools, etc.
  • Check-in and badging with iPad app in real time
  • White label tools, comprehensive client branding
  • Meetings scheduling
  • Full Virtual Events platform
  • Delegate / Attendee management


  • End to end management of all events in your calendar
  • The only fully unified events platform and mobile apps service
  • World class, UK based support team
  • Fully compliant GDPR and Data controlling processes
  • Data security, trusted by global banks and financial institutions
  • Real time reporting and full analytics with audit trails
  • Powerful event team management tools
  • Easy to use interface, providing powerful feature sets
  • Sustainable and ethical practices such as paperless and virtual events
  • Better audience engagement with collaborative mobile app features


£9,990 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tom@eventogy.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

3 4 6 3 3 4 0 8 1 6 6 4 1 3 6


Eventogy Tom Phillips
Telephone: +442076083000
Email: tom@eventogy.com

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
System requirements
  • 100% web based
  • Works cross platform and cross browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLAs demonstrate 2h to 24h depending on priority levels subject to contract and SLAs
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
Users utilizing a screen reader are able to navigate through the widget
Users interacting solely with a keyboard can fully interact with the widget
Visually impaired users can interact with the widget in a high-contrast state
Hover states for all buttons and links which can visually change when hovered over or tabbed to
Messages received in live chat can be read out loud and verbally differentiate between the end user and agent
Onsite support
Yes, at extra cost
Support levels
Technical Support of all components and sections relating to:
- The Platform
- The Event Sites
- The Mobile Apps
- The Check-In App

Business Support consists of assisting The Clients’ teams as part of their day to day duties.
- Setting up the structure of an Events website
- Uploading a guest list to the system
- Custom formatting of a content page
- Building a custom email
- Setting up a custom report

SLA's and the detailed support examples here are included as part of the license fees.

All clients are provided access to dedicated developer and account manager.
Support available to third parties

Onboarding and offboarding

Getting started
We provide comprehensive, on-site implementation and training.
Each instance receives a product specification guide.
Quick start guides are available through the platform.
Continued training during contract period provided throughout the year.
World class support module in place, telephone and email give direct access to developers.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We provide a comprehensive set of options to export client data. This is an all data export that can be tailored by our support team to dump a data export with any number of custom headers.

Output file can be XLS, CSV etc.
End-of-contract process
All data is provided to client at the end of the contract period. The database will then be deleted and all data removed from Eventogy's servers after an agreed period of time.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Yes. The application has been built to create public facing websites which are fully responsive in design and build.

In addition, we have a suite of dedicated mobile applications which are both native and also web based, both of which have been designed specifically to work on smart phones.
Service interface
User support accessibility
None or don’t know
What users can and can't do using the API
APIs are built and are subsequently provided to clients subject to consultation. We do not provide open APIs in order to maintain high levels of security.

Our product specification guide is built on a client by client basis and is tailored for each requirement.

Our API is designed to integrate seamlessly into CRM systems and other business critical platforms in order to provide a two way flow of data between Eventogy and your own business.

There are no limitations to what our API would be able to perform.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Although Eventogy is off the shelf, it does offer certain white label benefits. We entertain custom client requests that may improve their workflow to meet a business demand. We may review all requests and costs may apply.


Independence of resources
Providing software through cloud environment allows Eventogy to benefit from elastic computing, load balancing, and multi-site tenancy, ensuring the clients' experience is never compromised.


Service usage metrics
Metrics types
Eventogy captures every single action by both administrators and attendees.
We use both Google Analytics as an optional tool and our own dashboards for real time analytics.
Our integrated mobile apps provide real time engagement metrics that can be viewed and presented during live events.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
We have a comprehensive reporting module which allows users to export data through the reporting wizard.
More complex requirements are managed through our support channel, with no limit to the reporting output provided at no extra cost.

API tools also allow direct and automatic exporting to client platforms.
Data export formats
  • CSV
  • ODF
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Eventogy is committed to providing the highest standards of service and support and if we fail to achieve these standards we shall apply a credit for each day where we fail, calculated by dividing the fees paid by the Client by the number of days in the billing period.

The Service Provider warrants to:

- Deliver managed services within agreed milestones and deadlines.

- Provide access to the services for 99.9% of the time in any 3-month period, excluding updates, maintenance or a force Majeure event.

- Provide access to any website hosted within the system for 99.9% of the time in any given 1- month period, excluding scheduled maintenance or reasons beyond our reasonable control.

- Provide access to support at all times during business hours on business days and respond to requests for assistance within 1 business day for 99.9% of the time, or within 12 hours on any calendar day where you use the Service Providers managed services.
Approach to resilience
Eventogy can be configured to be managed in datacenters that have seperate locations to ensure failsafes and BCM.

In the event of an individual server failing there will be no perception of downtime to user as the secondary server sets come online.

Data is written synchronously to multiple server locations to continue to operate in case of individual server failure.
Outage reporting
Eventogy database servers are managed by our partner hosts who have their own SLAs. Part of this SLA involves 24/7 monitoring of servers and instant notifications of any downtime, outages and general latency spikes.

Any scheduled maintenance and patching on hardware and server operating systems are scheduled and notified in advance.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
For platform management, we use three factor authentication to restrict access to management interfaces. This includes VPN, IP Whitelisting and username / passwords that meet guidelines.

For Event Managers, we have a variety of options including login and passwords, IP Whitelisting, WebSSO and other options if required.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a collection of 19 policy documents ranging from information security policies to mobile application security. These are industry standard policy documents that each and every member of staff must read, sign, and adhere to yearly.

Any of these policy documentations are available upon request.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We have a strict change management process that manages version controlling, version logs and documentation.

Versions are maintained for a period of 7 years.

All changes go through a multi-disciplinary, multi-person testing process before deployment to live environments.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Penetration testing reveals any potential compromises which result in action plans. These action plans are resolved based on severity, starting with immediacy.

In addition to this, hardware manufacturers and software service providers notify both Eventogy and our partners in any instance of a patch, compromise or vulnerability.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All computer systems are logged. The data logged supports the security, compliance and capacity planning requirements of the system.

Users are given clear information of what is recorded, the purposes of the recordings and the retention of the data collected. This is made available to users in the form of a privacy policy.

The DPA requires that any personal data collected is collected for specific purposes and it is deleted when it is no longer needed. Audit logs are configured to record any actions undertaken using administrator or elevated privileges. Audit logs are secured to protect them from unauthorised modification.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a business continuity plan that details the processes of dealing with incidents. These range from:
- Adverse weather
- Interruption to utilities
- Security incidents and theft
- Health & safety incidents
- Act of terrorism
- New laws and regulations

Details of major incidents and action taken will be recorded. These notes may be referred to if there is any further investigation and it will also inform future business continuity planning.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Eventogy does all we can to fight climate change.
We promote paperless events in all our events and our software is designed to do this.
Internally, we use only cloud tools and do not print.
Covid-19 recovery

Covid-19 recovery

Tackling economic inequality

Tackling economic inequality

Equal opportunity

Equal opportunity





£9,990 a licence a year
Discount for educational organisations
Free trial available
Description of free trial
Access to fully featured sandbox environment for an agreed period of time.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tom@eventogy.com. Tell them what format you need. It will help if you say what assistive technology you use.