Skip to main content

Help us improve the Digital Marketplace - send your feedback

Eventsforce Solutions Ltd

Events Management Tech Platform

Event management platform, allowing organisers to manage a wide variety of events, conferences and meetings, whilst delivering great experiences for attendees.
In addition to our core platform, a number of additional licence options are available for specific types of events such as mobiles apps, speaker, abstract and award ceremony management.

Features

  • Online registrations, admin reg portal, booking items, group registrations
  • Communications, unlimited email sending, ad-hoc email library, invitation management
  • Reporting, event dashboard, custom reports, scheduled reports, report-only access
  • Financial, custom pricing structures, discount management, payment gateway, invoicing, multicurrency
  • Onsite Check-in, real time attendance recording, check-in app, badge printing
  • Mobile App Events, custom branded app, leads scanner, attendees interaction
  • Awards Events, awards entry submissions, judge category
  • Abstract Events, abstract submissions
  • Virtual Content Delivery, virtual event, live streaming

Benefits

  • admin reg portal, booking items, group reg,

Pricing

£10,000 to £100,000 a licence

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at patrizia.moretti@eventsforce.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 1 2 2 3 9 8 6 4 3 5 8 2 3 7

Contact

Eventsforce Solutions Ltd Patrizia Moretti
Telephone: 07724 329341
Email: patrizia.moretti@eventsforce.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Per our contracted agreement, we reserve a weekly window to perform server and network maintenance.
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
24/5
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users can access our chat when they are logged into their Eventsforce account or when reading Knowledge Base articles
Web chat accessibility testing
N/a
Onsite support
No
Support levels
24/5 chat with support team
trainings
Dedicated Customer Success Manager
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide online training, with the option of recording it. The number of training sessions depends on the pace of the client. Our help center is always available for clients knowledge.
Service documentation
No
End-of-contract data extraction
Users can download their data from our platform during their last month contracted with Eventsforce
End-of-contract process
Users can download all data needed at no additional cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
We have the mobile version of our website, it has the same functionality as the actual website
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
API to be licenced and contracted via the account manager and
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Frontend microsite can be customised to best reflect our client's branding. admin users can customise from the backend

Scaling

Independence of resources
Our Cloud service configuration (AWS) allows for automatic scaling during periods of high demand.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can run reports via the administration portal which can then be exported to a .XLSX download document.
Data export formats
Other
Other data export formats
XLSX
Data import formats
  • CSV
  • Other
Other data import formats
Xslx

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
As outlined in the client contract.
Approach to resilience
This information is available upon request.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Through restricting access roles
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
AlertLogic
PCI DSS accreditation date
April 9 2024
What the PCI DSS doesn’t cover
All relevant financial transaction process are covered by our PCIDSS certification.
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
https://www.eventsforce.com/data-security-policy/
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Monthly OWASP scan is performed on the current codebase. All results are forwarded to Engineering staff and prioritized for resolution based on criticality score. Upon completion of the remediation, the scan is re-executed to verify compliance.
All infrastructure servers and services are patched on a regularly scheduled cadence that follows the manufacturer's patch release by 1 week to help mitigate potential update issues.
Endpoint protection is updated at least daily, if the manufacturer releases multiple updates per day, then the definitions are updated accordingly.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
The Eventsforce Application is protected from application attacks by implementing a Web Application Firewall and Intrusion Detection System. Currently in place is an IDS provided by Alert Logic called Threat Manager, and a WAF provided by AWS.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Low Priority incidents are treated essentially the same as discrete event traffic and are simply logged into the data store

Medium Priority incidents consist of activities requiring closer observation and continued monitoring, but don't rise to the level of a real-time response

High Priority incidents require Alert Logic SOC analysts to proactively notify customers using all provided means of contact information available to us

Critical Priority incident escalations follow the same guidelines as High priority incidents, except that they will typically incorporate ongoing direct support from the SOC for the customer for the duration of the incident.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

We work with clients from any cultural background, any religious belief and sexual orientation.

Pricing

Price
£10,000 to £100,000 a licence
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
3 to 6 months free trial, including registration platform and any other service and modules the clients would like to try

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at patrizia.moretti@eventsforce.com. Tell them what format you need. It will help if you say what assistive technology you use.