V-Gather
V-Gather is a leader in developing customer experience environments in the metaverse. Built in a secure Microsoft Azure cloud-based infrastructure the V-Gather platform allows users to create innovative, engaging environments to enhance user experience and collaboration for recruitment, onboarding, product management, events, training, education and retail scenarios
Features
- Configurable 3D immersive environments
- Native content management
- Real time user interaction tracking
- Native virtual collaboration (text, voice & video)
- Browser based access and delivery
- Secure Microsoft Azure cloud based infrastructure
- Native meeting and collaboration scheduling
- Supports rich media interaction i.e. Augmented Reality
- Supports access to learning and recruitment information
- Scalable and reusable 3D environment
Benefits
- users can build their own branded environments
- users can build their own personalised and branded environments
- system administrators have access to user behavior and interaction data
- users can dynamically meet with other users and make appointments
- users access 3D environments via internet browsers
- users can watch videos, listen to webinars and join seminars
- users can collect relevant information in their personal goody bags
- Users move freely in the 3D environment without restrictions
- users are able to discover learning and educational pathways
Pricing
£4,800.00 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 6 7 8 2 4 5 8 6 0 1 3 8 9 8
Contact
MX Reality Ltd
Majid Al-Kader
Telephone: 01908 088727
Email: info@mxreality.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Access is not supported on mobile internet browsers
- System requirements
-
- Windows 10 Desktop (PC / Laptop)
- Apple laptop or desktop running macOS 10.14
- 8GB of RAM or higher
- For Windows PC, Dedicated NVIDIA GPU Graphics Card
- Quad-core CPU
- Broadband Connection Speed of 10Mb or higher
- 64-bit Safari 14.1+, Google Chrome 87+ or Firefox 84+
- WebGL, Javascript, Pop-ups and Cookies enabled
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is provided at additional cost depending on the amount and duration of support required. Typically we will aim to provide a same day initial response during normal weekday business hours. Out of office hour support could be arranged if required at further cost depending on requirements.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- Technical support is provided at additional cost based on customer requirement (allowing for a certain number of days support needed per month and number / type of resources that might need to support)
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training is generally provided via online meetings. Following such training, any relevant user documentation (generally in PDF format) is provided (via email) to guide users through the service.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Video
- End-of-contract data extraction
- Users have access to data throughout the life of their license/contract via the reporting engine within the system. After a contract has lapsed users can request a download of all relevant data. This request will need to be made via official email. Data will then be supplied in a specified format typically a CSV file.
- End-of-contract process
- Where V-Gather services are provided on a licence basis, and the licence is not renewed prior to the end of the contract, the licence will become inactive at the end of the contract and users will be unable to access the service. If the client desires to renew / extend the contract, then the licence will be reactivated following contract renewal and the user access will be re-enabled.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The V-Gather services are hosted on load balanced Microsoft Azure Servers which allows consistent user services to be delivered across varying user volumes.
Analytics
- Service usage metrics
- Yes
- Metrics types
- System usage metrics are available upon request from V-Gather. In addition standard user activity reports are available from the administration console
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- All data is encrypted at rest
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Where user data is stored by a V-Gather service, the data can generally be exported and provided in a CSV file format by V-Gather. For some relevant services, the data can be exported by the user administrator in CSV format.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- We do not connect to client's networks, but we use HTTPS TLS >=1.2 for public networks
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- All data is encrypted during transit and at rest. Access to systems and services requires authentication.
Availability and resilience
- Guaranteed availability
- SLA's are provided on a case by case basis in which availability guarantees are defined and agreed. target service availability is 99.8%
- Approach to resilience
- We use a Microsoft Azure datacenter and infrastructure to develop and deliver our online services leveraging its inherent resilience and redundancy facilities.
- Outage reporting
- Service outages are reported / notified via email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The services generally have a user profile/role hierarchy and the role determines the level of access available within the service
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have an IT Security Policy that covers information classification, access control, equipment security, business continuity, etc. Our offices require key fob entry and all staff are ID checked prior to joining. We have a third party IT organisation that manages and monitors IT security including hardware, antivirus, firewalls, software patch updates, etc. Security notifications are periodically sent out to remind staff about security consciousness. Access to machines, and software systems requires personal login details.
- Information security policies and processes
- All staff have joint and individual responsibility for supporting the information security policies and processes. Access to the company policies (including the information security and data protection policies) are provided to staff when they join. Automated process (where possible) are put in place to help staff abide by policies (such as automated screen locks after a brief period of inactivity). Any information security issues are reported in the first instance to the senior staff who in turn report it to senior management. Senior management then address the issue with the support of the third party IT organisation.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change requests are raised / submitted. Following this, they are evaluated in terms of complexity, impact, resource requirement, etc. A summary of the evaluation is then provided along with details of any resulting impacts on budget and delivery timescale. The appropriate authority is then required to approve / authorise the change prior to the work commencing. Our service development is generally monitored through a project management system managed by a project manager and as part of any change request, the evaluation includes an investigation into any security implications. Where necessary the Risk Register may need updating
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Internal infrastructure is supported via a third party IT services company who provide remote monitoring and updates for system security and patching. Our cloud infrastructure is built with Microsoft Azure services, and leverages its industry standard security and vulnerability protocols. We get periodic notifications from the system regarding any updates or threats and act on them accordingly.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- V-Gather internal infrastructure and cloud infrastructure are delivered via third party IT services and are managed against an SLA. Identified compromises are managed depending upon severity, the initial response time for critical incidents is 1 hour and is managed against agreed SLA.
- Incident management type
- Undisclosed
- Incident management approach
- Incident Management is provided via email communication - Users are provided with a support email address where incidents can be recorded. following an incident documentation and reports are available upon request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
V-Gathers solutions allow organisations to provide enhanced online digital services. These deliver additional environmental benefits reducing travel and energy usage and help businesses work towards net zero greenhouse gas emissions. - Covid-19 recovery
-
Covid-19 recovery
As organisations and businesses start to recover from the impacts of COVID-19, The V-Gather solution enhances new ways of working improving workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions. - Tackling economic inequality
-
Tackling economic inequality
The V-Gather solutions are designed to enhance and develop collaboration and knowledge sharing. As such they are aligned to help create new skills, create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors. - Equal opportunity
-
Equal opportunity
V-Gathers solutions provide easy access to all users enabling everyone in an organisation to collaborate and share knowledge easily. This provides support for disabled people in developing new skills and career opportunities.
Pricing
- Price
- £4,800.00 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- V-Gather provide access to free trials via a members area. Users can login via the V-Gather website to trial the software.
- Link to free trial
- https://v-gather.com/try-now/