Vuelio Media, Stakeholder and Political Services

Vuelio is an intuitive software & intelligence platform, used by over 450 public sector (and 3,000 private sector) organisations. We help you to manage media monitoring, coverage analysis, journalist contact information, press office, enquiries, lines-to-take, news distribution, publishing, stakeholder engagement, political monitoring and contacts - all in one place.


  • Media & political monitoring across print, broadcast, online and social
  • In-house researched journalist, blogger and political contacts database
  • Integrated press release distribution, tracking and publishing service
  • Centralised press enquiry, response and lines-to-take management
  • Stakeholder relationship management
  • Communications planning and strategy module
  • Vuelio Canvas - interactive coverage wall for news and content
  • Real-time analytics dashboards and exportable reports
  • Online Newsroom and Media Centre services
  • Journalist Enquiry Service - media opportunities delivered to your inbox


  • Convenience of a centralised platform to manage all communications activities
  • Communicate without silos; relate your team’s activities to outcomes
  • Cost efficiencies procuring multiple services through one supplier
  • Client driven advancements to navigate a rapidly changing communications landscape
  • Real-time data visualisations for insights into organisational activity
  • Regular technology innovation to deliver new features to Vuelio users
  • Smart automation of processes to save time, better demonstrate effectiveness
  • Expert media and political intelligence to inform communications strategies
  • A network of influencers to connect communicators with their audiences
  • Multi-platform, mobile optimised access to manage communications on the move


£1000 per unit

Service documents


G-Cloud 11

Service ID

3 3 5 6 5 5 3 1 6 8 6 9 6 6 8



Oliver Grant

0203 426 4071

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
There are no service constraints that will affect Vuelio users
System requirements
  • A supported browser
  • Web access

User support

Email or online ticketing support
Email or online ticketing
Support response times
An instant automated response is provided with a support ticket reference number. Further response is provided depending on the severity of the issue, with the following maximum response times:

1) A live production system is down - within 1 working hour
2) Suspected high impact condition associated with the application - within 4 working hours
3) Intermittent or low impact condition - Within 3 working days
4) Question concerning the application or its usage - Within 5 working days
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Onsite support
Support levels
Our standard support inclusive within all subscriptions includes:

- Telephone and email support from 08:00 - 18:00 on working days
- Web-based or onsite training and access to training materials
- A professional services consultant to manage the on-boarding process
- A dedicated account manager
Support available to third parties

Onboarding and offboarding

Getting started
All users are provided with an account manager, a professional serivces consultant to assist with on-boarding, online training, access to training materials and onsite training if required.
Service documentation
End-of-contract data extraction
At no additional charge, all user content will be exported to a .CSV file and securely returned to the user.
End-of-contract process
Within one week of notice, user-owned content will be securely returned at no cost via Excel / .csv format.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Vuelio offers a mobile app for Android and IoS. The application offers mobile optimised functionality, allowing management of communications activities on the move.
Service interface
Customisation available
Description of customisation
Vuelio is a dynamic and customisable system to cater for a diverse range of requirements. Customisable elements of the solution include:

- Labelling throughout the product
- Organisation specific categories, drop-down menus and tags
- Field visibility
- Email distribution templates
- News alerts
- User permissions
- Analytics and reporting
- Modules

Vuelio users can customise the above to:

- Reflect their specific organisational terminology
- Produce customised analytics based on relevant metrics
- Access a customised searching facility
- Produce branded and application specific email communications
- Ensure appropriate access rights for each licence/ user
- Access only relevant Vuelio functionality

Typically, customisation is provided by Vuelio's professional services and support function to save the users' time, however some elements can be configured by the user if required.


Independence of resources
Our software runs in Microsoft Azure, a scalable hosting environment, which we monitor to ensure a performant service for all clients.


Service usage metrics
Metrics types
Vuelio can provide a wide-range of metrics including:
- Login requests
- Successful logins
- Failed logins
- IP address of login
- User activity through live dashboards and exportable reports
- Page load time
- Service availability/ uptime on request
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Other data at rest protection approach
We rely on features of the Azure platform described here:
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export their data in a diverse range of formats from the system, including:

- Exporting analytics to Word, PDF and Excel
- Sharing via email
- Exporting lists to Excel or .CSV
- Options to export/ transfer/ publish via XML or RSS
- Exporting contact details as vCards
- Sharing calendar details as .ICS files
- Publishing to social media
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our resolution times are as follows:
1) A live production system is down - within 4 working hours
2) Suspected high impact condition associated with the application within - 8 working hours
3) Intermittent or low impact condition - Within 10 working days

The service will achieve at least 99.5% uptime. For each hour of service unavailability, excluding planned maintenance, we will credit an amount equal to one day’s pro-rata monthly costs for each hour.
Approach to resilience
All Vuelio applications are deployed to a cloud environment with resilience and redundancy as a specific design criteria.

All data is backed up, or replicated, so that recovery is possible in the case of any failures.
Outage reporting
Any service outages will be reported via email through our support and account management function.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
All user accounts can be provided with appropriate levels of access to management interfaces with a customisable set of user permissions.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
As part of our Cyber Essentials Plus adherence we have in place a full Information Security Management System covering the range of procedures and policies. Policies are followed through with regular audits, with responsibility lying with our Chief Technical Officer and ultimately our CEO.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All system changes are subject to our formal Change Control Procedure.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Annual penetration tests, developer training, peer-code review. We apply regular infrastructure patching. We subscribe to appropriate internet news groups for the applications and technology we use.
Protective monitoring type
Protective monitoring approach
As part of our infrastructure service, we have effective monitoring and alerting tools deployed to provide early warning of malicious threats.
Incident management type
Incident management approach
We have defined a robust Incident Management process, key stages including Detect, Respond, Recover, Learn and Improve. User reports incidents to support team via email on telephone, creating a support ticket. We will provide an in-depth analysis of incidents on request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£1000 per unit
Discount for educational organisations
Free trial available

Service documents

Return to top ↑