Ticketing & CRM system
Tixly (formerly Tix Ticketing) is one of the fastest growing ticketing software companies today. Millions of tickets are sold each month through our ticketing software for some of the most prestigious Performing Arts organisations and multi-event Culture venues across the Nordics, UK, Europe and North America.
Features
- Online Ticket sales
- Back Office Ticket Sales
- Fundraising
- Donations
- Venue Sales
- Real time reporting
- APIs
- CRM
- Data Warehouse
Benefits
- Modern Theatre ticketing system
- Extensive APIs
- Flexible memberships with benefits
- Patron management
- Donations upselling
- Sell merchandise
- Multi Oganisation capabilities
- Easy to integrate, white label, in every website
- Intuitive box office interface in every browser
- Reporting and scanning apps
Pricing
£0.20 to £2.00 a transaction a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 0 8 5 4 1 2 7 6 6 2 1 8 6 1
Contact
TIXLY LTD
Patrick Morsman
Telephone: +44 330 808 9947
Email: patrick@tixly.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Very limited downtime for upgrades
- System requirements
-
- Browswer agnostic
- Need an internet connection (minimum 3G)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We try to respond within 1 hour
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- We provide support Monday to Saturday 8am to 8pm and also offer out of hours support via phone
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We supply Project Mangement on and off line training. We carry out data transfers from previous systems and have staff onsite at go-live.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We give the customers full access to their data and help them with their data transfer.
- End-of-contract process
- We supply all customer data to the customer, this is included in the price
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The page will render to mobile friendly
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- We use multiple API to link to third party sales, Finance system, CRM systems etc. We supply documentation online and help customers with the API interfaces.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Customers can create their own sales flows and change items on their coprorate websites.
Styling, colours, fonts, logo's and meta tags can be customised. GTM tags can be added to customise all marketing tracking and pixels.
Scaling
- Independence of resources
- For busy onsales we have an integration with Queue-it software. We also monitor service loads and add extra capacity if needed.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We supply up/down time service levels.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- We give customers access to the data , tags and permissions, we can supply it in any format the customer requests (for instance xml).
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We guarantee 99.9% uptime. We can negotiate with the customer for breaches in SLA
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Username and password, can be ip restricted on request
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Crimson Security Inc.
- PCI DSS accreditation date
- 31/06/2021
- What the PCI DSS doesn’t cover
- N/a
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- PCI 2.1
- Information security policies and processes
- Available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We have a monthly test, by an external company. Reports of these test are the input for improvements in our software.
We deploy patchs generally within one day
OWASP website and external party - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Available on request
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We have no pre-defined process for this but work on a ad-hoc best effort base.
Users report by mail, phone or though our support system
Reports are written documents sent to the customers and discussed in person of needed.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
We have an equal opportunities pollicy in place and a very diverse staff. - Wellbeing
-
Wellbeing
Flexible working conditions and off time. Generous holiday allowance and sick leave.
Pricing
- Price
- £0.20 to £2.00 a transaction a month
- Discount for educational organisations
- No
- Free trial available
- No