MX Reality Ltd

V-Gather

V-Gather is a leader in developing customer experience environments in the metaverse. Built in a secure Microsoft Azure cloud-based infrastructure the V-Gather platform allows users to create innovative, engaging environments to enhance user experience and collaboration for recruitment, onboarding, product management, events, training, education and retail scenarios

Features

  • Configurable 3D immersive environments
  • Native content management
  • Real time user interaction tracking
  • Native virtual collaboration (text, voice & video)
  • Browser based access and delivery
  • Secure Microsoft Azure cloud based infrastructure
  • Native meeting and collaboration scheduling
  • Supports rich media interaction i.e. Augmented Reality
  • Supports access to learning and recruitment information
  • Scalable and reusable 3D environment

Benefits

  • users can build their own branded environments
  • users can build their own personalised and branded environments
  • system administrators have access to user behavior and interaction data
  • users can dynamically meet with other users and make appointments
  • users access 3D environments via internet browsers
  • users can watch videos, listen to webinars and join seminars
  • users can collect relevant information in their personal goody bags
  • Users move freely in the 3D environment without restrictions
  • users are able to discover learning and educational pathways

Pricing

£4,800.00 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@mxreality.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

4 6 7 8 2 4 5 8 6 0 1 3 8 9 8

Contact

MX Reality Ltd Majid Al-Kader
Telephone: 01908 088727
Email: info@mxreality.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Access is not supported on mobile internet browsers
System requirements
  • Windows 10 Desktop (PC / Laptop)
  • Apple laptop or desktop running macOS 10.14
  • 8GB of RAM or higher
  • For Windows PC, Dedicated NVIDIA GPU Graphics Card
  • Quad-core CPU
  • Broadband Connection Speed of 10Mb or higher
  • 64-bit Safari 14.1+, Google Chrome 87+ or Firefox 84+
  • WebGL, Javascript, Pop-ups and Cookies enabled

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is provided at additional cost depending on the amount and duration of support required. Typically we will aim to provide a same day initial response during normal weekday business hours. Out of office hour support could be arranged if required at further cost depending on requirements.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
No
Support levels
Technical support is provided at additional cost based on customer requirement (allowing for a certain number of days support needed per month and number / type of resources that might need to support)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training is generally provided via online meetings. Following such training, any relevant user documentation (generally in PDF format) is provided (via email) to guide users through the service.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Video
End-of-contract data extraction
Users have access to data throughout the life of their license/contract via the reporting engine within the system. After a contract has lapsed users can request a download of all relevant data. This request will need to be made via official email. Data will then be supplied in a specified format typically a CSV file.
End-of-contract process
Where V-Gather services are provided on a licence basis, and the licence is not renewed prior to the end of the contract, the licence will become inactive at the end of the contract and users will be unable to access the service. If the client desires to renew / extend the contract, then the licence will be reactivated following contract renewal and the user access will be re-enabled.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
No
Customisation available
No

Scaling

Independence of resources
The V-Gather services are hosted on load balanced Microsoft Azure Servers which allows consistent user services to be delivered across varying user volumes.

Analytics

Service usage metrics
Yes
Metrics types
System usage metrics are available upon request from V-Gather. In addition standard user activity reports are available from the administration console
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
All data is encrypted at rest
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Where user data is stored by a V-Gather service, the data can generally be exported and provided in a CSV file format by V-Gather. For some relevant services, the data can be exported by the user administrator in CSV format.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
We do not connect to client's networks, but we use HTTPS TLS >=1.2 for public networks
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
All data is encrypted during transit and at rest. Access to systems and services requires authentication.

Availability and resilience

Guaranteed availability
SLA's are provided on a case by case basis in which availability guarantees are defined and agreed. target service availability is 99.8%
Approach to resilience
We use a Microsoft Azure datacenter and infrastructure to develop and deliver our online services leveraging its inherent resilience and redundancy facilities.
Outage reporting
Service outages are reported / notified via email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
The services generally have a user profile/role hierarchy and the role determines the level of access available within the service
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We have an IT Security Policy that covers information classification, access control, equipment security, business continuity, etc. Our offices require key fob entry and all staff are ID checked prior to joining. We have a third party IT organisation that manages and monitors IT security including hardware, antivirus, firewalls, software patch updates, etc. Security notifications are periodically sent out to remind staff about security consciousness. Access to machines, and software systems requires personal login details.
Information security policies and processes
All staff have joint and individual responsibility for supporting the information security policies and processes. Access to the company policies (including the information security and data protection policies) are provided to staff when they join. Automated process (where possible) are put in place to help staff abide by policies (such as automated screen locks after a brief period of inactivity). Any information security issues are reported in the first instance to the senior staff who in turn report it to senior management. Senior management then address the issue with the support of the third party IT organisation.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change requests are raised / submitted. Following this, they are evaluated in terms of complexity, impact, resource requirement, etc. A summary of the evaluation is then provided along with details of any resulting impacts on budget and delivery timescale. The appropriate authority is then required to approve / authorise the change prior to the work commencing. Our service development is generally monitored through a project management system managed by a project manager and as part of any change request, the evaluation includes an investigation into any security implications. Where necessary the Risk Register may need updating
Vulnerability management type
Undisclosed
Vulnerability management approach
Internal infrastructure is supported via a third party IT services company who provide remote monitoring and updates for system security and patching. Our cloud infrastructure is built with Microsoft Azure services, and leverages its industry standard security and vulnerability protocols. We get periodic notifications from the system regarding any updates or threats and act on them accordingly.
Protective monitoring type
Undisclosed
Protective monitoring approach
V-Gather internal infrastructure and cloud infrastructure are delivered via third party IT services and are managed against an SLA. Identified compromises are managed depending upon severity, the initial response time for critical incidents is 1 hour and is managed against agreed SLA.
Incident management type
Undisclosed
Incident management approach
Incident Management is provided via email communication - Users are provided with a support email address where incidents can be recorded. following an incident documentation and reports are available upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

V-Gathers solutions allow organisations to provide enhanced online digital services. These deliver additional environmental benefits reducing travel and energy usage and help businesses work towards net zero greenhouse gas emissions.
Covid-19 recovery

Covid-19 recovery

As organisations and businesses start to recover from the impacts of COVID-19, The V-Gather solution enhances new ways of working improving workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions.
Tackling economic inequality

Tackling economic inequality

The V-Gather solutions are designed to enhance and develop collaboration and knowledge sharing. As such they are aligned to help create new skills, create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.
Equal opportunity

Equal opportunity

V-Gathers solutions provide easy access to all users enabling everyone in an organisation to collaborate and share knowledge easily. This provides support for disabled people in developing new skills and career opportunities.

Pricing

Price
£4,800.00 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
V-Gather provide access to free trials via a members area. Users can login via the V-Gather website to trial the software.
Link to free trial
https://v-gather.com/try-now/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@mxreality.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.