Skip to main content

Help us improve the Digital Marketplace - send your feedback

Ve3 Global Ltd

Salesforce - Hyperforce Lightning Sales Cloud

VE3's Sales Cloud empowers government revenue growth and stakeholder management. Comprehensive citizen 360, process automation, and collaboration tools. Transparent reporting for success. SFDCHS2022GC13

Features

  • Citizen profile management
  • Secure authentication
  • Collaboration tools
  • Seamless integration with line of business apps
  • Brand alignment with existing website
  • Knowledge base and FAQ
  • Web-chat integration for cost-effective communication
  • No-code configuration with training included
  • Advanced case management and chatbots
  • Mobile-ready and omni-channel engagement

Benefits

  • Low-cost citizen service
  • Encourage self-service and channel shift
  • Efficient chat and chatbot support
  • Intelligent knowledge articles for contact deflection
  • Simplified, accessible processes
  • Consistent processes for citizens and internal staff
  • Increased adoption with user-friendly UI
  • Integration with legacy systems via open APIs
  • Middle office digitization
  • Compliance with GDPR, CE+, and accessibility standards

Pricing

£175 to £850 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at prime@ve3.global. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 8 5 8 9 3 2 7 4 9 5 6 0 3 9

Contact

Ve3 Global Ltd Nikhil Alex
Telephone: 02045520840
Email: prime@ve3.global

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Salesforce services are all modular and pre-integrated with Einstein AI built-in. Functionality can be expanded as needed. Customers extend by adding Einstein Analytics to: Service Cloud for case management, Sales Cloud for CRM and 360degree view, and Marketing Cloud for engagements and customer journeys. Further information here https://appexchange.salesforce.com/ and https://www.salesforce.com/uk/products/
Cloud deployment model
Public cloud
Service constraints
Key considerations (further detail in our Supplier Terms)
As Salesforce is multi-tenant, there are 'governor limits' which prevent resources from being monopolised by any single organisation.
NB though these limits exist it's rare for customers to be impacted, and even more unusual for our current Public Sector customers. In the unlikely event of a need to increase, limits can be extended with various add-ons separately listed. Hitting a limit is often a sign of an underlying design flaw. Please make yourself aware of these limits at this link https://developer.salesforce.com/docs/atlas.en-us.210.0.salesforce_app_limits_cheatsheet.meta/salesforce_app_limits_cheatsheet/salesforce_app_limits_features.htm
A user’s password may not be shared with any other individual.
System requirements
  • Connectivity to the Internet
  • A standard browser, either desktop or mobile
  • Salesforce mobile app is available if preferred to a browser
  • Appropriate bandwidth, https://help.salesforce.com/articleView?id=000004958&type=1

User support

Email or online ticketing support
Email or online ticketing
Support response times
Every Salesforce service includes support as standard. The lowest level relies on the Salesforce user community for responses and has a response time of 2 business days, this can be reduced to 1 hour with the appropriate upgrade in your support plan.
https://www.salesforce.com/content/dam/web/en_us/www/cloud-services/documents/premier-success-plans-datasheet.pdf
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Salesforce has not conducted usability studies to verify that the online chat function works effectively with screen reading and other assistive technology. However, existing customers have conducted extensive testing and, for example, the Driver and Vehicle Licensing Agency is successfully using the Salesforce Webchat capability in production
Onsite support
Yes, at extra cost
Support levels
Every Salesforce service includes community-based support. This can be enhanced with guaranteed response times through Premier and Premier+. For more critical applications we provide Signature Success which provides Salesforce staff with a knowledge of a specific customers applications and configurations and an initial response from your designated support team in as little as 15 minutes, with personalised updates every 30 minutes.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Salesforce provides an amazing immersive self-learning environment available called “Trailhead” for anyone who would like to have an engaging and interactive way of learning about salesforce. It is an online and free to use learning environment available here: https://trailhead.salesforce.com/

In addition, Salesforce's Customers for Life is designed to help customers be successful and get up and running quickly. A dedicated group is available for new customers to engage by asking questions, giving feedback, and sharing experiences. this also includes 'Getting Started Webinars', 'Getting started resources','Salesforce Tech-lounge for new customers' and 'getting started live Q&A' further detail available at https://www.salesforce.com/success-getting started/
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Salesforce also provides free online courses, referred to as 'Trails'
End-of-contract data extraction
The administrator for a given Salesforce environment can export (subject to appropriate permissions being set) data to a series of files securely using the weekly export function. Further information can be found at this link https://help.salesforce.com/articleView?id=admin_exportdata.htm&type=5

As the function suggests this data export can be performed weekly (dependant on the version procured) for backup purposes if required/
End-of-contract process
After termination of all subscriptions associated with an environment, Customer Data submitted to the Covered Services is retained in inactive status within the Covered Services for 120 days, after which it is securely overwritten or deleted from production within 90 days, and from backups within 180 days.
Physical media on which Customer Data is stored during the contract term is not removed from the data centres that Salesforce uses to host Customer Data unless the media is at the end of its useful life or being deprovisioned, in which case the media is first sanitized before removal. This process is subject to applicable legal requirements.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The capability of Salesforce via a browser and on a mobile device, via either a browser or the native Salesforce1 App is broadly similar. However, there are some subtle differences as described here: https://help.salesforce.com/articleView?id=limits_mobile_sf1_data.htm&type=0

Note that the salesforce browser UI can also be accessed on many mobile devices.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
The Salesforce interface is a modern and intuitive design, with help functions throughout. The interface can be configured as maybe required or left as default.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Salesforce is committed to providing applications accessible to all. This includes users working with assistive technology, such as speech recognition software and screen readers. Salesforce follows international best practices in Section 508 of the Web Content Accessibility Guidelines (WCAG) 2.0 Level AA to the extent possible.

A third party has assessed and documented the accessibility status of Salesforce core products in the VPAT documents published here: https://www.salesforce.com/company/legal/508_accessibility.jsp

In addition, Salesforce includes an alternate user interface mode that lets users with assistive devices, such as speech recognition software and screen readers, work with Salesforce more effectively with detail here https://help.salesforce.com/articleView?id=accessibility_mode_enabled.htm&type=0
API
Yes
What users can and can't do using the API
Salesforce provides several simple, powerful, and secure APIs.

SOAP API to create, retrieve, update, or delete records, perform searches, etc. in real time in any language that supports web services.

REST API REST-based web services interface for use with mobile applications and web projects.

Chatter REST API similar to feed APIs offered by Facebook/ Twitter.

WAVE REST API access Wave Analytics assets, such as datasets, lenses and dashboards.

Bulk API based on REST principles optimised for loading or deleting large sets of data. Use it to handle many records asynchronously in batches.

Metadata API to retrieve, deploy, create, update, or delete customizations for your Salesforce instance. Migrate changes from testing to production. Intended for managing customizations and for building tools that can manage the metadata model, not the data itself.

Streaming API for notifications to be pushed from the server to the client, typically for applications that poll frequently.

Apex REST API & APEX SOAP API to expose Apex classes and methods so that external applications can access your code through REST or SOAP architecture, respectively. Both support OAuth 2.0 and Session ID for authorization.

Tooling API to integrate Salesforce metadata with other systems. REST and SOAP both supported.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Point-and-click configuration: The Salesforce platform makes it easy to modify the functionality of Salesforce applications to meet your unique requirements. Working with the metadata framework and a series of simple point-and-click wizards, you can design custom user interfaces and modify the structure of the data model and the application’s business logic. Configuration enables organisations to modify objects, fields, validation rules, workflow, security settings, formulas, and much more without the need for code.

Customise with code: Although point-and-click configuration with the Salesforce platform is the fastest and easiest way to customise, some functionality is beyond the constraints of a metadata framework. For such cases, developers can create needed functionality in open-ended development environments, using toolkits for most of the common programming languages, or Apex.

Scaling

Independence of resources
The daily transaction average for our platform is regularly 6 billion, consistently at sub 250ms response time within the Salesforce environment. Within each logical system, we use load balancers to distribute load among multiple availability zones for hyper-scalability and redundancy. The multitenant application design, combined with the fastest servers and high-performance networking infrastructure leveraged from the public cloud, guarantees fast performance. In addition to scaling for growth anywhere, Salesforce strives to improve the average response time of our services and to back up our claims, full details of transaction volumes and response times are reported in real-time at https://status.salesforce.com/

Analytics

Service usage metrics
Yes
Metrics types
The service includes various metrics to monitor usage and adoption of the service, for example, last login, login duration etc.
For Infrastructure detail metrics are available at https://trust.salesforce.com website provides performance and availability information for the entire service.

For specific metric monitoring and for more in-depth detail customers can extend capability through the use of Event Monitoring. For example - which applications are being used, by whom, how are they being used, when, where from and are there performance issues? This data can be used to improve adoption, security and performance of the application.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Salesforce

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
Classic Encryption: native Salesforce application feature which can be used to encrypt specific custom fields. There is no additional cost for this, but it does impact some application functionality. More information here: http://sfdc.co/FieldEncryption Platform Encryption:

Platform Encryption allows customers to encrypt data stored through Salesforce such as: files and attachments, certain standard and custom fields, and use an advanced key management system. It uses native strong, standards-based encryption. Controls help to protect data, which include the use of derived data encryption keys and customer-controlled key rotation, generation, and destruction process. Available for an additional cost.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
There are a number of options available to extract data, either during the contract or when the contract ends. We encourage customers to export their data during their contract on a periodic basis to maintain a local copy of their salesforce database, rather than wait until the end of the contract These options include:

The Weekly Export Service – export data from the service on a periodic basis via a zip file containing .csv files over a TLS link.

Export data over the API via an integration or middleware solution. A comprehensive Salesforce exit strategy paper is available on request.
Data export formats
  • CSV
  • Other
Other data export formats
  • XLS
  • PDF
  • Out of The Box import via the open standard API
  • API export in open standards such as XML and OData
  • API also support bulk export and upload
  • Pre-integrated ETL tools such as MuleSoft etc.
Data import formats
  • CSV
  • Other
Other data import formats
  • Out of The Box import via the open standard API
  • API imports in open standards such as XML and OData
  • API also support bulk export and upload
  • Pre-integrated ETL tools such as MuleSoft etc.
  • Salesforce can also store content in any flat file format.

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Customers connect to the service over the public Internet with all transmissions between the user and the Salesforce Services secured using TLS 1.2 or higher and encrypted using 256 or 128-bit encryption. The Services use International/Global Step Up SSL certificates with 2048-bit Public Keys. Web Service callouts can be secured using TLS, and mutual TLS. Additionally, customers can partner with a selection of supported ISPs for a more direct connection to the Salesforce service. In the UK, BT are one such ISP. This service is known as Salesforce Express Connect. Specifically, Hyperforce also includes Salesforce Private Connect through AWS.
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Customer data is protected within the Salesforce service through a mature, standards-based defence in depth security architecture. Logical and physical access is strictly controlled and monitored and the controls used are in scope for the various security certifications the company has, and audited regularly by third parties. Controls such as firewalls, intrusion detection, anti-malware, file integrity monitoring are augmented with extensive monitoring to provide a robust prevention, detection and response model. Internal and external, as well as third-party vulnerability scanning and application penetration testing are also in place.

Availability and resilience

Guaranteed availability
The Salesforce Services are designed with the concept of continuous improvement and Trust (e.g. Availability, Performance and Security) in the infrastructure. Salesforce uses commercially reasonable efforts to make its on-demand services available to its customers 24/7, except for (minimal) planned downtime, for which Salesforce gives customers prior notice, and force majeure events. This service leverages Public Cloud region, and uses multiple availability zones. This pattern ensures a 99.9% service level agreement and allows services to withstand up to two different zonal faults and continue to be available. Live and historical statistics on Salesforce system performance are publicly published at: https://trust.salesforce.com/en/#systemStatus, and further detail can be shared upon request and NDA.
Approach to resilience
A Hyperforce instance resides in a single public cloud region, and uses three availability zones for disaster recovery. This allows services to withstand up to two different zonal faults and continue to be available maintaining 99.9% uptime.

Compute resources are deployed across (at least) three zones within a given region. A regional level load balancer is placed on top of the instances and manages spreading load appropriately. Blob storage and certain other provider specific services will also be at a regional level (the list of services vary based on provider). Any service deployed in this pattern will need to tolerate two millisecond latency across zones. More detailed information is available under NDA on request.
Outage reporting
Outages are publicised on a public portal and via email alerts. Escalation policies are established and maintained as Salesforce's goal is to rapidly restore service. In the event of an extended outage, periodic updates are provided in near real time to customers via the trust.salesforce.com dashboard site and in addition, service notifications are provided to nominated contacts via various channels such as email. Update frequency for notifications is dependent on the customer support service plan.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Salesforce has a formal Incident Management Process that guides the Salesforce Computer Security Incident Response team in investigation, management, communication, and resolution activities.

Salesforce will promptly notify the customer in the event of any security breach of the Service resulting in an actual or reasonably suspected unauthorised disclosure of Customer Data. Notification may include phone contact by Salesforce support, email to customer's administrator and Security Contact and public posting on trust.salesforce.com.

Salesforce.com is a member of the prestigious Forum of Incident Response and Security Teams (FIRST) and complies with the FIRST framework and best practices for incident response.
Access restrictions in management interfaces and support channels
Management access for service support and delivery is done through multiple layers of controls including, but not limited to, multiple 2 factor authentication, bastion host and proxy control and segregation of duties. These controls are in scope for SSAE-18 auditing and evidences through the SOC 2/ISAE3402 report.

Access to the management interface for the customer to configure their salesforce environment, is configured by the customer themselves. The options are outlined in the above response. Robust application design and testing ensures that users without administrative access rights cannot access more sensitive areas of the application.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
EGAC
ISO/IEC 27001 accreditation date
06/01/2024
What the ISO/IEC 27001 doesn’t cover
NA
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO 22301
  • ISO 20000-1
  • ISO 14000-1
  • ISO 9000-1

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Salesforce's Information Security Management System (ISMS) and information security policies are based on the ISO 27002 framework of best practices and are ISO 27001 certified. As required by this certification, the ISMS is endorsed by Senior Management. The EVP of Security has responsibility for the information security policies and ISMS. The Trust Strategy Alignment (TSA) Committee approves/authorizes all changes to the policies, the Statement of Applicability (SoA), the information security manual, and any separate policy statements. During the ISO 27001 audit process (as well as other audits such as SOX and SSAE 16 SOC 1), Senior Management for various departments are involved in verifying that policies and procedures are in place and adhered to. Policies are reviewed/approved at least annually.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Salesforce has formal processes for placing a system into production. This procedure includes a build checklist, server hardening checklist and pre-production testing. Baseline configurations for servers, network devices, and databases are consistent with industry-accepted CIS (Centre for Internet Security) system hardening guidelines.

Change control procedures are required by the company’s Change Management Policy and include steps for testing, review, authorization, communication, verification, and back-out procedures. All changes to the infrastructure components are tested in a dedicated environment using production class equipment before being deployed into production. Changes are reviewed and approved by Technical Operations management prior to deployment to production.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Salesforce has various vulnerability management processes in place around internal scanning, external scanning & vendor patch release management. Technical operations and security personnel monitor vulnerability alerts and patch release notifications from vendors and other sources. There are associated evaluation and deployment processes in place. Salesforce also regularly performs self-vulnerability assessments using various tools and techniques, such as Qualys. In addition, Salesforce uses external service providers to perform an application vulnerability assessment after each major release (three times annually) and network vulnerability assessments quarterly. There is also an on-going external application scanning service used. further detail on responsible disclosure here https://trust.salesforce.com/en/security/responsible-disclosure-policy/
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Salesforce's Computer Security Incident Response Team (CSIRT) uses a security event logging and management system to manage the alerts and logs generated by devices on our network and provide protective monitoring. The system consists of a central database, management server, and distributed agents. The distributed agents receive events from network devices and systems (firewalls, IDS, routers, switches, hosts, file integrity, and database monitoring) on the network, then compress, encrypt, and transmit the data to the management server and database for processing. Correlated events are configured to generate alerts and logs which are monitored on a 24/7 basis
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Salesforce has a formal Incident Management Process that guides the Salesforce Computer Security Incident Response team in investigation, management, communication, and resolution activities.

Salesforce will promptly notify the customer in the event of any security breach of the Service resulting in an actual or reasonably suspected unauthorised disclosure of Customer Data. Notification may include phone contact by Salesforce support, email to customer's administrator and Security Contact and public posting on trust.salesforce.com.

Salesforce.com is a member of the prestigious Forum of Incident Response and Security Teams (FIRST) and complies with the FIRST framework and best practices for incident response.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our G-Cloud service provision is deeply committed to fighting climate change, recognizing the urgent need for collective action to address environmental challenges. Here's how our services deliver against this social value theme:

Environmental Sustainability in Operations:

We prioritize running efficient operations to reduce emissions and minimize environmental impacts. This includes implementing energy-efficient practices, optimizing resource usage, and adopting renewable energy sources wherever possible within our data centers and infrastructure.

Promoting Sustainable Practices:

VE3 actively engages with our suppliers and clients to promote sustainable business practices. Through our services, we advocate for the adoption of environmentally friendly technologies, responsible sourcing, and waste reduction strategies, thereby reducing carbon footprints across the supply chain.

Responsible by Design Framework:

Our G-Cloud services adhere to a 'Responsible by Design' framework, ensuring that environmental considerations are integrated into the development and deployment of digital solutions. By prioritizing environmental protection and minimizing negative impacts, we strive to deliver sustainable outcomes for our clients.

Training and Education:

VE3 invests in training and education programs focused on environmental sustainability. Through initiatives like the Sustainability Quotient (SQ) training, we equip our teams with the knowledge and skills to adopt climate-smart behaviors and implement environmentally conscious practices in their work.

Community Engagement:

We actively engage with communities to support environmental objectives and promote climate action. By partnering with local organizations and stakeholders, we contribute to initiatives aimed at addressing climate change, such as tree planting programs, clean energy projects, and environmental education campaigns.

Covid-19 recovery

Our G-Cloud service provision plays a crucial role in supporting the COVID-19 recovery effort by facilitating resilience, adaptation, and innovation in the face of unprecedented challenges. Here's how our services contribute to the recovery process:

Remote Work Enablement:

VE3's digital solutions empower organizations to transition to remote work seamlessly. By providing secure and reliable cloud-based infrastructure, collaboration tools, and remote access solutions, we enable businesses to maintain productivity while ensuring the safety and well-being of their employees.

Business Continuity Planning:

We assist organizations in developing and implementing robust business continuity plans to mitigate disruptions caused by the pandemic. Our services include data backup and recovery solutions, disaster recovery planning, and resilience testing to ensure operational continuity in the face of unforeseen events.

Digital Transformation Acceleration:

VE3 accelerates digital transformation initiatives to help organizations adapt to the new normal. By modernizing legacy systems, implementing cloud-based technologies, and digitizing processes, we enable businesses to optimize efficiency, improve agility, and remain competitive in a rapidly evolving landscape.

Healthcare Support Solutions:

We provide specialized healthcare support solutions to assist frontline workers and healthcare organizations in responding to the COVID-19 crisis. This includes telemedicine platforms, patient management systems, and data analytics tools to enhance patient care, streamline operations, and support decision-making processes.

Economic Stimulus through Innovation:

VE3 fosters innovation and entrepreneurship to stimulate economic recovery in the aftermath of the pandemic. Through our G-Cloud services, we support startups, small businesses, and enterprises in developing and deploying innovative solutions that address emerging challenges, create new opportunities, and drive economic growth.

Tackling economic inequality

We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:

Access to Affordable Technology:

We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.

Skills Development and Training:

VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.

Support for Minority-Owned Businesses:

We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.

Digital Inclusion Initiatives:

VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.

Fair and Transparent Procurement Practices:

We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.

Equal opportunity

We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:

Access to Affordable Technology:

We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.

Skills Development and Training:

VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.

Support for Minority-Owned Businesses:

We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.

Digital Inclusion Initiatives:

VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.

Fair and Transparent Procurement Practices:

We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.

Wellbeing

Environmental Sustainability:

We are committed to environmental sustainability as a core component of wellbeing. By prioritizing eco-friendly practices, resource conservation, and carbon reduction efforts in our operations and services, we contribute to creating a healthier and more sustainable environment. We prioritize the wellbeing of individuals and communities in all aspects of our G-Cloud service provision. Here's how our services contribute to enhancing wellbeing:

User-Centric Design:

VE3 designs our G-Cloud services with a user-centric approach, prioritizing usability, accessibility, and intuitive design. By focusing on the needs and preferences of users, we create digital experiences that enhance overall wellbeing by reducing frustration, stress, and cognitive load.

Health and Safety Protocols:

We implement robust health and safety protocols to protect the wellbeing of employees, clients, and partners. This includes adherence to strict security standards, data privacy regulations, and compliance with industry best practices to ensure the safety and integrity of our digital infrastructure and services.

Promotion of Work-Life Balance:

VE3 recognizes the importance of work-life balance in maintaining overall wellbeing. Through our G-Cloud services, we enable remote work, flexible scheduling, and collaboration tools that empower individuals to achieve a healthy balance between their professional and personal lives, leading to greater job satisfaction and wellbeing.

Mental Health Support:

We prioritize mental health support for our employees and clients by offering resources, programs, and initiatives aimed at promoting mental wellbeing. This includes access to counseling services, mindfulness training, stress management workshops, and employee assistance programs designed to support individuals in times of need.

Community Engagement and Social Impact:

VE3 actively engages with communities to address social determinants of health and promote holistic wellbeing. Through partnerships, philanthropic initiatives, and volunteer efforts, we support local organizations and projects focused on improving access to healthcare, education, housing, and other essential services that contribute to overall community wellbeing.

Pricing

Price
£175 to £850 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at prime@ve3.global. Tell them what format you need. It will help if you say what assistive technology you use.