MWK SOLUTIONS
VisitOne
A single channel for your guests of performing arts venues to manage their entire visit. An integrated platform for you to grow sales and create better marketing.
Features
- Digital ticket delivery
- Food and beverage ordering
- Restaurant table booking
- Dynamic marketing campaigns
- Ticket transfers
Benefits
- Know your attendees
- Grow sales
- Grow your database
- Deliver better marketing
Pricing
£0.12 to £0.12 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at phillip.markwick@mwksolutions.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
3 6 2 5 3 2 0 6 3 6 3 2 8 2 8
Contact
MWK SOLUTIONS
Phillip Markwick
Telephone: 07976247699
Email: phillip.markwick@mwksolutions.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Visit integrates with: Spektrix. Tessitura. Tevalis. Ticketsolve. Tixly. PointOne. Square. Sumup. Stripe. Plus others
- Cloud deployment model
- Public cloud
- Service constraints
- No constraints.
- System requirements
- No specific requirements.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Usually within the hour.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- No formal testing.
- Onsite support
- Onsite support
- Support levels
- We will provide guidance and support required for our customers to be fully operational. During our clients operational hours, mostly evenings and weekends, we are on hand to provide whatever support is required.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide online training via video share.
- Service documentation
- No
- End-of-contract data extraction
- A data request must be made by the customer and we will extract all data as required.
- End-of-contract process
- If the contract ends then the client data is retained for 30 days then removed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- The guest facing experience is highly customisable. Admin users can configure how the guest experience looks, adjust branding, what order types are available, what table times can be offered to guests, and what key messaging is shown.
Scaling
- Independence of resources
- The service runs on scalable cloud infrastructure that is elastic.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We track links sent, opened, clicked.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- VisitOne Limited
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There is no user based data export facility.
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Service is available 99.9%
- Approach to resilience
- This information is available on request.
- Outage reporting
- Status board and email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Support staff have limited access to our customers data. Only senior technical operators have access to databases. Data is encrypted.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- All security related matters must be signed off by the board.
- Information security policies and processes
- The company has an information security policy that dictates governance processes. The board makes all security related decisions.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All components of the service are versioned and released using controlled pipelines. Previous versions are available up to 1 year for recovery purposes.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Available on request.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Available on request.
- Incident management type
- Undisclosed
- Incident management approach
- Available on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
Performing arts have suffered directly as a result of Covid-19 through closure and falling audience numbers. Audience attendance remains low, but is recovering. Our platform helps organisations engage with their audience to grow attendance and revenues back to previous levels.
Pricing
- Price
- £0.12 to £0.12 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at phillip.markwick@mwksolutions.com.
Tell them what format you need. It will help if you say what assistive technology you use.