Events Management Tech Platform
Event management platform, allowing organisers to manage a wide variety of events, conferences and meetings, whilst delivering great experiences for attendees.
In addition to our core platform, a number of additional licence options are available for specific types of events such as mobiles apps, speaker, abstract and award ceremony management.
Features
- Online registrations, admin reg portal, booking items, group registrations
- Communications, unlimited email sending, ad-hoc email library, invitation management
- Reporting, event dashboard, custom reports, scheduled reports, report-only access
- Financial, custom pricing structures, discount management, payment gateway, invoicing, multicurrency
- Onsite Check-in, real time attendance recording, check-in app, badge printing
- Mobile App Events, custom branded app, leads scanner, attendees interaction
- Awards Events, awards entry submissions, judge category
- Abstract Events, abstract submissions
- Virtual Content Delivery, virtual event, live streaming
Benefits
- admin reg portal, booking items, group reg,
Pricing
£10,000 to £100,000 a licence
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 1 2 2 3 9 8 6 4 3 5 8 2 3 7
Contact
Eventsforce Solutions Ltd
Patrizia Moretti
Telephone: 07724 329341
Email: patrizia.moretti@eventsforce.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Per our contracted agreement, we reserve a weekly window to perform server and network maintenance.
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24/5
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Users can access our chat when they are logged into their Eventsforce account or when reading Knowledge Base articles
- Web chat accessibility testing
- N/a
- Onsite support
- No
- Support levels
-
24/5 chat with support team
trainings
Dedicated Customer Success Manager - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide online training, with the option of recording it. The number of training sessions depends on the pace of the client. Our help center is always available for clients knowledge.
- Service documentation
- No
- End-of-contract data extraction
- Users can download their data from our platform during their last month contracted with Eventsforce
- End-of-contract process
- Users can download all data needed at no additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- We have the mobile version of our website, it has the same functionality as the actual website
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API to be licenced and contracted via the account manager and
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Frontend microsite can be customised to best reflect our client's branding. admin users can customise from the backend
Scaling
- Independence of resources
- Our Cloud service configuration (AWS) allows for automatic scaling during periods of high demand.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can run reports via the administration portal which can then be exported to a .XLSX download document.
- Data export formats
- Other
- Other data export formats
- XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
- Xslx
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- As outlined in the client contract.
- Approach to resilience
- This information is available upon request.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Through restricting access roles
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- AlertLogic
- PCI DSS accreditation date
- April 9 2024
- What the PCI DSS doesn’t cover
- All relevant financial transaction process are covered by our PCIDSS certification.
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- .
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- https://www.eventsforce.com/data-security-policy/
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Monthly OWASP scan is performed on the current codebase. All results are forwarded to Engineering staff and prioritized for resolution based on criticality score. Upon completion of the remediation, the scan is re-executed to verify compliance.
All infrastructure servers and services are patched on a regularly scheduled cadence that follows the manufacturer's patch release by 1 week to help mitigate potential update issues.
Endpoint protection is updated at least daily, if the manufacturer releases multiple updates per day, then the definitions are updated accordingly. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- The Eventsforce Application is protected from application attacks by implementing a Web Application Firewall and Intrusion Detection System. Currently in place is an IDS provided by Alert Logic called Threat Manager, and a WAF provided by AWS.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Low Priority incidents are treated essentially the same as discrete event traffic and are simply logged into the data store
Medium Priority incidents consist of activities requiring closer observation and continued monitoring, but don't rise to the level of a real-time response
High Priority incidents require Alert Logic SOC analysts to proactively notify customers using all provided means of contact information available to us
Critical Priority incident escalations follow the same guidelines as High priority incidents, except that they will typically incorporate ongoing direct support from the SOC for the customer for the duration of the incident.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We work with clients from any cultural background, any religious belief and sexual orientation.
Pricing
- Price
- £10,000 to £100,000 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 3 to 6 months free trial, including registration platform and any other service and modules the clients would like to try