Venturi Unite

Venturi Unite is a ‘tried and tested’ highly disruptive, collaborative solution enabling clients ‘vacancy to payment’ management of their contingent workers and hiring supply chain. A ‘best in class’ model, underpinned by fully automated, cloud-based technology delivering 5-10% annual cost savings and increased visibility/compliance at ZERO COST to the client


  • Allows E2E transparent management of the contingent woker hiring process
  • Independent, neutral model
  • Facilitates significant annual cost savings
  • Specific compliance support; IR35, AWR, GDPR, Criminal Finance Act 2017
  • Provision of Management Information through real-time ‘Data as a Service'
  • Highly adoptable, user friendly technology with seamless integration of technology
  • Manages different types of contingent worker (including shift workers)
  • Full visibility, control and governance across the worker estate
  • Full visibility, control and governance down the supply chain
  • Platform allows entire supply chain collaboration on IR35 compliance


  • ZERO COST to end hirer client
  • Neutral model ensures a highly motivated agency supply chain
  • Sustainable cost savings of ~ 5-10% on annual spend
  • Mitigates the risk of legislative legislation breach
  • Data as a Service enables data driven decision making
  • Higher adoption rates result in higher visibility on spend/compliance
  • Flexiblity of platform increases client agility to remain competitive
  • Increased visibility results in improved control, transparency and governance
  • Increased supply chain visibility reduces ‘transfer of debt’ liabilities
  • Your organisation becomes the destination of choice for contingent workers


£0.00 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 4 2 4 7 5 8 1 9 4 7 5 3 2 0


Telephone: 07961 574 896

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
None - pure cloud solution and does not require any specific hardware.
System requirements
  • Internet access
  • Chromium browser
  • Microsoft Edge

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response 1-2 hours and resolution between 1- 24 hrs via an in/out of hours / 24/7/365 service depending on client requirements.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat accessibility testing
Onsite support
Support levels
As standard Venturi Unite provide 8.30am - 18.00 - out of hours support dependent on client requirements. Dedicated Account management - response times 1-2hrs, Resolution - 1-24hrs
Support available to third parties

Onboarding and offboarding

Getting started
Implementation Project Management is offered to client and the involvement of Venturi Unite is defined by client needs eg number of users, site locations, volume of workers etc. Initial training is mandatory for hiring managers and ongoing training is optional - training is available face to face, webex and documentation options are available
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Word
  • Video
  • Excel
  • CSV
End-of-contract data extraction
If required, data can be provided to the customer and can be deleted from the platform. This will be based on each individual customer's needs.With regard to client or their suppliers' data held within the VMS software platform we will ensure such data is transferred to the client or supplier(as relevant) within 30 days of the date of termination and such data will be in .csv format. The data will be subsequently deleted from our servers and the software platform (see service definition document for further details) subject to data protection legislation requirements.
End-of-contract process
At the end of the contract a client can have customised data extracts. We agree the exit plan with the client at the outset of the contract as to what they will require so we can inform them and also agree any additional relevant costs (see service definition document).

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Ensures a consistent experience across devices with a similar look and feel, as well as navigation and functionalities.
Service interface
What users can and can't do using the API
* User can: Register workers, update workers, provide payroll data, retrieve payslips, create vacancies, modify vacancies, submit candidates, update candidate submissions, create Clients, Create suppliers, create Sites, create Positions, Create Placements, modify Placements, create timesheets, approve / reject / cancel timesheets, read invoice data.

* User cannot - create or allocate payments received from a client
API documentation
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Customisation available
Description of customisation
Our model allows the client to white label the solution as their own brand - this increases client hiring manager adoption. In addition users can fully customise their solution to meet their business processes as well as other needs and goals.


Independence of resources
The solution is designed with high availability and geo-redundancy in mind. Automatic load balancing and elastic computing ensure our service remains scalable and resilient.


Service usage metrics
Metrics types
Weekly Management information reports, Reports on every single hire across the clients entire business, Identification of talent pools, AWR management, IR35 management, Spend reporting, Spend forecasting
Chargeable and non-chargeable labour tracked - every activity is tracked and therefore auditable - full audit trail available. We have developed numerous standard reports, and as reporting functionality is an integral part of the VMS, it is easy to add more. Reports can be generated into excel multi-sheet format. Graphs/ dashboard indicators can be added. Reports can be in most formats , automated, with alerts for set criteria.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Vendor Management System technology and A Vendor Management Service Programme

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported from a variety of functional areas and is generally within the scope of an activity or for a purpose and is excel or csv
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • PDF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
High availability and resilience - 99.9% service uptime to clients, clients are not charged for the service so no financial impact.
Approach to resilience
Venturi Unite has both BC and DR plans in place these ensure minimal disruption to service, clients and supply chain. Additionally the solution is provisioned with hot fail over across multiple availability zones, data is regularly backed but remains with in our secured and managed AWS accounts.
Outage reporting
The Neutral Vend MSP of the Venturi Unite solution acts as the operations centre and would report all outages.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access control is managed through Roles and Privileges, including support users.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We have a pragmatic approach to security governance for both our Software and Corporate network management. In software we apply coding standards, peer review, testing, strong ciphers for password encryption, tooling form monitoring and 3rd party penetration testing. Corporate network governance is handled by policy and through contracted IT support services.
Information security policies and processes
Information security policy, Business Continuity, Crisis Management, Disaster Recovery.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our service is purely cloud provisioned software, code quality is maintained via peer review and sonarqube, bit bucket for version control and build kite for CI / CD pipline
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Code quality and vulnerability is monitored using Sonarqube which is run against all deployments.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use AWS Guard Duty to monitor for threat and intrusion. This is a comprehensive threat analysis and audit system and works as follows;

- Automatic analyses of network and account activity providing broad, continuous monitoring of the account.
- Combines managed rule sets, threat intelligence from AWS Security from third party intelligence partners, anomaly detection and Machine Learning to detect malicious or unauthorised behaviour.
- Provides detailed and searchable event logs and allows automation of common threat patterns.
Incident management type
Supplier-defined controls
Incident management approach
Users are able to report issues to our support desk. Support validate and verify these issues before passing to our technical team to determine causality and identify remedial measures where necessary. We also utilise Cloud Watch to monitor system issues and in many instances proactively identify and resolve problems that occur.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£0.00 a unit
Discount for educational organisations
Free trial available
Description of free trial
A full service proof of concept is available under a 30 day trial agreement.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.