zoommail limited

Zoom Mail

Email Marketing and Email Newsletter
Create, send, track, automate and integrate email marketing.


  • Drag & drop email editor
  • Subscriber management, segment, group, add custom fields
  • Campaign reports display email opens & clicks
  • Create email welcome series
  • Signup from your website
  • Create responsice emails
  • Add personalisation to emails
  • Email reports are realtime
  • Trigger emails on dates and activity


  • Quickly distribute emails to your subscriber audience
  • Allow subscribers to unsubscribe from every email
  • Adhere to GDPR legislation
  • Target email groups with relevant messages
  • Allow users to define email preference
  • Import email addresses easily from csv and excel


£19 to £12200 per unit per month

  • Free trial available

Service documents

G-Cloud 11


zoommail limited

David Hazzard



Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Power onboarding
CRM Connectivity - synchronised and keep your subscriber data up to date
Web Tracking - track your subscribers on your website
EmailAI - Lead scoring and AI identifying your genuine hotleads
Email Verification - verify email addresses
We can also provide Dedicated Domains and IP addresses
Cloud deployment model Public cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within a working day - Monday-Friday 9am-5pm
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide 1st, 2nd and 3rd line support with the expertise in-house.
On a paid version there is no cost for support but we can only commit to 1st and 2nd line responses within a working day.
Account management is a cost option of £200/month
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We have an optional power onboarding
Month 1: Video meeting creating template & email, uploading database, grouping data, proofing email, sending
Month 2: Video meeting reviewing month 1 report and transferring email creation, subscription management, proofing and sending to the client.
Month 3: Video meeting reviewing and completing system transfer to client
We also have optional onsite training, this would be tailored to your requirements.
Service documentation No
End-of-contract data extraction You can export the subscriber status and data
End-of-contract process Our costs are based on the subscriber list size, the additional plugins, and level of required support. At the end of the contract there are no end costs.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install No
Designed for use on mobile devices No
Service interface No
What users can and can't do using the API Access is provided using OAuth2 authentication.
Our API is REST based, allowing users to add users to groups and send emails.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Users can create their own email designs using our drag and drop editors. Users can upload their own html emails. Users can brand their own unsubscribe and subscriber preference pages.


Independence of resources We have over 19 years experience in this field. Zoom Mail is created with the ability to increase resources when the demand increases.


Service usage metrics Yes
Metrics types Subscriber numbers, emails sent, email opens and links clicked.
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Through the browser users can export their subscriber data.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We guarantee that Zoom Mail service will be available over the internet for 100% of the time in any given calendar month, except for periods of unavailability due to:

Your payments not covering your use.
Acts or omissions of you or your users
Scheduled maintenance which we have announced at least 24 hours in advance.
Factors outside our control
Violations of our Acceptable Use Policy
Law enforcement activity
If we fail to meet the guarantee detailed above, you will be able to request a credit as detailed below, up to a maximum of 100% of your fee for capacity used during the previous 30 calendar days. Please contact us at support@zoommail.co.uk for further details.
Approach to resilience We are hosted in a tier3+2N data centre, where our CEO has created and hosted solutions for the last 6 years.
We are member of RIPE and have our own IP4 allocation range.
We have a scaleable and transferrable cloud solution.
Outage reporting Email Alerts to our support team

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Management interfaces are two-factor authentication
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards CyberEssentials Certificate Number:0902478526261904, Issued: 8th April 2019
Information security policies and processes In-house incident management policies based on recognised industry standards

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Being a small but knowledgeable team, we regularly review outside threats as they happen and the potential impact on our systems.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Being a small but knowledgeable team, we regularly review outside threats as they happen and the potential impact on our systems.
We apply patches on a weekly basis as they become available.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Being a small but knowledgeable team, we regularly review outside threats as they happen and the potential impact on our systems.
Users cannot excessively access our system resources without us reaching out to them.
Incident management type Supplier-defined controls
Incident management approach In-house incident management policies based on recognised industry standards

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £19 to £12200 per unit per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Feature and volume limited

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑