Email Marketing
To enable marketers to send branded email campaigns with full reporting via an easy to use UI. Additionally, our platform can be used for SMS marketing, email automation, surveys, sign up and adhoc data capture forms and website tracking. We also provide easy to use CRM.
Features
- Drag & Drop Editor
- Real time reporting
- Free templates
- Branded sending domain
- Subscriber Forms, adhoc data capture forms
- Unlimited users, personalisation, lists and contacts
- Inclusive account management and unlimited platform support
- Integrations with CRMs and CMSs
- UK based, GDPR compliant
- SMS, marketing automation
Benefits
- User friendly platforms suitable for both technical/non technical users
- Clone campaigns and templates for faster building of campaigns
- Unlimited testing of campaigns
- Intuitive prompts and final checks
- Create automated email journeys saving manual resource
- Schedule campaigns to launch in advance
- Inbuilt previews to check mobile responsiveness
- Save blocks for faster campaign building
- Pull in external content into emails automatically
- Publish forms, landing pages, RSS content easily
Pricing
£50.00 an instance
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 6 7 9 4 1 0 2 5 6 9 1 2 6 5
Contact
Campaign Master (UK) Ltd.
Deepa Dhillon
Telephone: 0208 863 5334
Email: deepa.dhillon@campaignmaster.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Our own CRM platform called CM Data Manager, but we also provide integrations with several other CRMs such as Dynamics 365, Salesforce, Workbooks, Open CRM etc.
- Cloud deployment model
- Public cloud
- Service constraints
- None. Users only require internet access to our platforms.
- System requirements
- Only requirement internet access to use our platforms and service.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We answer all telephone calls within 3 rings.
Emails are replied to within 10 minutes and both via humans.
We do not operate any robots or ticket queues. We respond to all queries very quickly.
Our support service runs from 9am to 5.30pm Monday to Friday. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
All platform support is fully inclusive of the subscription and is also unlimited. This support is via direct email and telephone - no automated ticket queues or robots are involved.
A dedicated account manager is provided as standard to all clients too. Our clients determine the frequency of the meetings they require. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We offer online, onsite or inhouse training - whatever the client prefers.
In our office we have a dedicated training room to train up to 10 users at a time.
Following training we provide log in details and user guides are also contained within our platforms.
If a user requires additional support, we set up refresher sessions and/or send Teams invites to further support users with specific training on topics of their choice.
We also send by direct email, easy to follow steps for instructions to how to achieve a goal. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- As they have access to their accounts, they can simply export any data and assets they require.
- End-of-contract process
-
At the end of the contract the account is made inactive and scheduled for deletion as per our terms and conditions that accompany the contract.
The price of the contract is determined by the number of users for our CRM and the email volume for our email marketing platform.
Additional costs would apply in the case of additional users for our CRM and higher email volumes and/or optional bolt on modules purchased.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Our platforms are mobile responsive so can be accessed on mobile devices.
For example you can access and edit data in our CRM.
In our email marketing platform you can view results.
The main difference only being the screen size. - Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- We have a REST API and all calls are published on our website. For those clients that require this integration we enable the API for their account and provide log in details for them to access and use. Limitations are stated on our website.
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Our CRM is fully customisable so our users can collect the specific data they wish to use, by creating as many (or few) database fields and entities. They define their own primary identifiers and even create pre-populated fields for easier data entry.
With our email marketing platform, users can change the look and feel of their accounts , so can white label if they are an agency for example. They can also set up fully branded domains so every aspect of their email marketing is customised with no mention of Campaignmaster anywhere.
Scaling
- Independence of resources
- Our infrastructure allows for substantial growth.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Users can see how many emails they have subscribed to, how many are sent, are left over and across all their accounts.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- By logging into their account and navigating to the export area.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Excel
- Notepad
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- The service is available 24/7 as it is accessed via the internet.
- Approach to resilience
- It is available on request.
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Our platform allows for user privilege creation, so multiple, defined user roles can be created to allow/restrict access to specific areas of our platforms.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSi
- ISO/IEC 27001 accreditation date
- 12/10/2022
- What the ISO/IEC 27001 doesn’t cover
- IT equipment
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We have a detailed Information Security Policy along with our own internal process and policies detailed in company documents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our own internal technical team have their processes and policies documented.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our technical team have security software deployed throughout our systems for both front and back ends to scan and identify any threats.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Our technical team have deployed anti virus and other protection softwares on our systems and applications.
We isolate the compromise and remedy with the necessary action.
We endeavour to respond immediately or as quickly as possible. - Incident management type
- Supplier-defined controls
- Incident management approach
- We maintain logs for any incidents internally.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We minimise our carbon footprint wherever possible. We use minimal paper and make good use of recycling opportunities. Our team also car share for commuting to work.Covid-19 recovery
We deployed the exact same service throughout lockdown and no clients saw any decline in our service at all. We continue to have work stations spaced out, good ventilation and screens.Tackling economic inequality
Our pricing is fair and reasonable and clients only pay for what they use.Equal opportunity
We employ a diverse group of employees including colour, race, gender, religion etc.Wellbeing
Our office are cleaned regularly. We have air conditioning, ergonomic chairs and staff have plenty of free space around them. We have breakout areas with a full kitchen. We even have a professional table tennis table and small golf putting green.
Refreshments are available on site and at no additional cost with filtered drinking water.
We have an open door policy where team members can speak freely or as they wish.
We hold regular team events too ranging from indoor cricket to drinks and dinner nights.
Pricing
- Price
- £50.00 an instance
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
A trial account to be used for a set period of time.
A number of emails to be used.
A mini training session to get the best use of the platform.
Access to full support so user gets a feel for our excellent support!