Azeus UK Limited

Azeus Convene

Azeus Convene is a meeting solution with native apps for iPad, Android, Windows, Mac. Proven to increase productivity, Convene can be used for paperless meetings at all levels of the organisation. It can also be configured to work as a Board Portal for Board meetings, project management and team meetings.


  • Safeguard information with enterprise-grade encryption, authentication, and authorisation
  • Assign different access rights per role
  • Track changes in meeting documents through audit trails
  • Review resolutions, minutes, action items
  • Annotate documents with option to share or mark private
  • Daily automated backups ensure data integrity
  • Assign and track action items between meetings
  • Send latest updates to meeting participants instantly
  • Supports common document formats; no need to convert to PDF
  • Synchronized page viewing and annotations


  • Eliminate board-pack or meeting printing, shipping and disposal costs
  • Review and annotate board meeting papers on the move offline
  • Distribute meeting minutes as soon as the meeting is finished
  • Automatic purge for lost devices
  • Prepare for upcoming meetings whether online or offline
  • Distribute agenda, documents and updates with just a single click
  • Attend remote board meetings on iPad, Android, Windows and Mac
  • Drag & drop upload of documents with versioning support
  • Access and meet across iPad, Android, Windows or Mac
  • Schedule and update meeting information and auto-notifications


£190 per person per year

Service documents


G-Cloud 11

Service ID

2 0 9 2 4 4 2 8 2 7 9 1 6 9 2


Azeus UK Limited

Eleanor Jim

020 8004 5937

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Convene for Windows requires Windows 7 or higher. Convene for Mac requires X 10.10 or higher. Convene for Android requires Android 7.0 or higher. Convene for iOS requires iOS 11 or higher.

Our standard terms of service have set out the scheduled maintenance window for servers hosted in different regions, and such terms of service are incorporated as part of the contract. Scheduled maintenance would be carried out within that window. That would suffice as communicating scheduled maintenance in advance. When we need to deploy a major release, we inform customers in advance to make them aware of upcoming changes.
System requirements
  • Windows 7 or higher for desktops, laptops and Surface Pro
  • Mac OS X 10.10 or higher for Mac app
  • IOS 11 or higher for Apple iPad or iPhone
  • Android Nougat 7.0 or higher for Android devices
  • Chrome51, Firefox47, Edge13.1056, IE11, or Safari9 for portal access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Reported issues will be prioritized according to their nature and impact to business operations. The priority definitions and corresponding target response times are:

High – Service is unusable – 1 hour
Medium – Service is usable, but affects day-to-day operations – 2 hours
Low – Service is usable, but has minor issue(s) / Ad hoc queries by end users – 8 hours

The above is for emails. For phone calls, response time is less than a minute.

Respond times are the same for weekends. Support is available 24/7/365.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users can provide their name, email address, and phone number before they can start a chat. This is to ensure the support staff can contact them if they suddenly get disconnected.

Input fields are clearly labelled. If a user provides input in the wrong forma (e.g., email address without the @ sign), the user gets an error message identifying the error.

At the end of the chat, users can request for a transcript to be sent to the email address they provided.
Web chat accessibility testing
We haven't performed web chat testing with assistive technology users.
Onsite support
Yes, at extra cost
Support levels
Priority One - Service not usable: response within one hour; fix or workaround within one working day.
Priority Two - Service usable but not functioning as expected: response within two hours; fix or workaround within 5 working days.
Priority Three - Service usable but user is experiencing other issues; response within 8 hours; fix in the next release.

Costs are included within standard license.

Support will be a cloud support engineer, if the fix is not satisfactory, it can be escalated to a technical manager.

Support is normally remote. Onsite support will be charged at SFIA rates.
Support available to third parties

Onboarding and offboarding

Getting started
User documentation is available as are quick start videos and full video training.
We also offer training via webex or onsite
There is build in help on both the app and the portal
Service documentation
Documentation formats
End-of-contract data extraction
Users can extract data manually, or they can send request for a data export. A data export is chargeable and the charges would be based upon the SFIA rate card. As the number of users is variable, the organisation could maintain the data for as long as they want with only a single user license.
End-of-contract process
Export of data to an alternative system would be chargeable. The charge would be estimated based upon the amount of data within the system. A typical data export at the end of a three-year contract would take 3 person days work, and would be based on the lead engineer rate on the SFIA card. There would be additional costs if the requirement is to upload the data to a new system, and these would depend upon the target system.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
There is a difference in scrolling only. For documents on mobile the scrolling is right to left ( or vice versa) and on desktops and laptops the scrolling is up and down ( or vice versa)
Service interface
Description of service interface
Convene is an integrated solution made of two components -- a secure web portal that lets administrators manage meetings and a mobile application that allows participants to meet over the same interface. Convene is designed to be multiplatform to give clients the flexibility to use their preferred browsers, devices, and platforms.
Accessibility standards
None or don’t know
Description of accessibility
Azeus Convene shows user-friendly error messages to the user when an error occurs. Users have to correct the error before the data can be processed.
Accessibility testing
Azeus Convene is compliant with assistive technologies compatible with MS operating systems such as Dragon Naturally Speaking and JAWS Screen Readers.
Customisation available


Independence of resources
We use AWS as our host and the system can scale to meet demand automatically


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
PDF files
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.5% availability is guaranteed. Users are entitled to refund or credit if availability is not met
Approach to resilience
Details are available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
As part of Convene's security policies, each individual is given their own account for accessing management interfaces and support channels. Sharing of accounts is strictly prohibited. Access to the cloud infrastructure's management console requires two-factor authentication and only authorized personnel are provided access. Authorized personnel are only provided the access required for them to perform their role and responsibilities. All access, both in management interfaces and in support channels, are reviewed regularly to prevent privilege creep and to ensure obsolete accounts are disabled.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password
  • Other
Description of management access authentication
Passwords - Through the system administrator menu, complex passwords can be enforced through a configurable password policy, allowing the system administrator to specify various settings.

AD/LDAP Integration - Convene integrates with Active Directory and LDAP to allow users to log in to the app/web portal using their existing corporate/organisation accounts.

Touch ID - For iOS, users can also log in to Convene via Touch ID aka fingerprint scanning.

2FA - Upon signing in, the system also checks if the device/browser used is registered through the administrative portal. OTP via SMS is also supported if there's an existing SMS gateway.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Information security policies and processes
Convene has documented security policies and procedures in place to ensure the confidentiality, availability, and integrity of the system. We have appointed senior personnel and teams that ensure the proper and total implementation of our security policies and procedures across the entire organisation. Our security policies includes the organizational structure of the organisation's security team and its responsibilities, principles, security incident response procedures, access policies, security vetting requirements, onboarding and offboarding procedures, and data and systems security. A Chief Security Officer is assigned in every office location and is responsible for: ensuring that staff comply with security policies and procedures; protecting customer data or information; and regularly reviewing the effectiveness of security policies and procedures to safeguard against the growing number of threats and their evolving sophistication.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Convene's configuration and change management process has been audited under SOC2. As part of our configuration and change management procedures, all changes need to be applied and tested in a separate test environment before seeking approval from the change control manager. Approved changes are scheduled at least a week before implementation in production. All changes are requested and tracked in an electronic ticketing system and each change request is assigned a unique identifier for proper tracking and auditing. Vulnerability scans are performed prior to every major release to ensure that any changes have been analysed for potential security impacts.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Convene's System Team performs vulnerability scanning on both the application and the infrastructure to ensure the security of the whole system. Web application scans are performed after every major release before the web application is finally released into production. Patch management procedures are in place to ensure that servers are regularly updated with the latest security patches. Critical patches are applied next non-peak window. Any patches undergo testing prior to application to production to ensure no adverse impact on the functionality of the system. Convene's System Team also subscribes to security newsletters to stay updated with the latest security vulnerabilities,
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Convene has a 24x7 monitoring system and intrusion detection system to identify potential threats and alert all responsible parties for prevention, investigation, and/or remediation. Staff are made aware of security incident handling and reporting procedures. All breaches to information security, actual or suspected, are promptly reported to Chief Security Officers. CSOs will lead the investigations on such incidents and customer representatives will be informed immediately about such breaches. Convene will tap security experts to work with the Customer's internal ICT team to provide the Customer with any assistance in tracing and resolving security issues that may impact business operations.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
An incident ticketing system is in place to provide a guided mechanism for tracking, handling, and documenting system incidents. This ticketing system is configured to follow the policies and procedures for handling and responding to system incidents. Convene's support team follow pre-defined procedures for addressing common events. Users can report incidents via chat, email, or phone. Responsible parties are required to provide inputs on the corresponding incident's ticket for causal analysis and resolution. Incident reports can be provided to customers upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£190 per person per year
Discount for educational organisations
Free trial available
Description of free trial
Full working version of the Convene for Governance product for up to 10 users with support.
Integrations are not included in the trial version.
Standard trial is 3 weeks but can be extended to allow for procurement process.
Link to free trial

Service documents

Return to top ↑