EmailOctopus is a cloud based email marketing platform enabling organisations and businesses to send bulk emails to their subscribers.


  • Drag and drop email builder
  • Real time analytics
  • Easy to use interface
  • Cloud based solution
  • Integrations with Zapier
  • Rich API to integrate with other platforms


  • Easily build HTML emails with our templates
  • Access the platform from anywhere
  • A UK based support team, on hand to help
  • Integrate with over 500 different tools using Zapier
  • Beautiful, responsive, email templates
  • Run by experts in email marketing
  • Industry leading pricing


£20 to £1000 per licence per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

3 4 6 4 0 6 7 1 2 1 2 0 3 6 8



Thomas Evans


Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to We operate as a standalone service, however can provide email marketing via Amazon SES under our Connect product
Cloud deployment model Public cloud
Service constraints No
System requirements No system requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We respond to all queries within 1 working day. Emergency support is offered on weekends.
User can manage status and priority of support tickets No
Phone support No
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Our web chat tool is a 3rd party tool.
Web chat accessibility testing Test across multiple browsers.
Onsite support No
Support levels We provide full support on deliverability, email design, and general platform advice. This is included in the cost of the platform.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide extensive documentation through our helpdesk and provide live chat to assist users who are new to using the platform.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Users can export their marketing lists at any point. They can do this via the Dashboard or via our API.

We can provide copies of their emails created using the platform if required.
End-of-contract process The platform is considered self-service so at the end of a contractual period they are free to export their data through the Dashboard or API.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The creation of an email marketing campaign is limited on mobile devices.
Service interface Yes
Description of service interface We offer a service interface to create emails and view reports.
Accessibility standards None or don’t know
Description of accessibility Users with assistive technology will be unable to create campaigns, however they can access reports and upload lists.
Accessibility testing We do limited testing with users of assistive technology.
What users can and can't do using the API The API can be used to add or edit subscribers of a marketing list. It can also be used to retrieve reports on the performance of an email campaign.

It cannot be used to create or send an email.
API documentation Yes
API documentation formats HTML
API sandbox or test environment No
Customisation available No


Independence of resources We assign users to different sending IP's and servers based upon usage.


Service usage metrics Yes
Metrics types We provide statistics on list size and growth. We also provide campaign specific reports on clicks, opens, bounces, and unsubscribes.
Reporting types
  • API access
  • Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can export their lists through the Dashboard into a CSV format.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability There are no specific SLAs in place.
Approach to resilience Available on request.
Outage reporting We provide outage alerts via email for any significant outages.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels We restrict access to users data to only employed support staff who have completed their GDPR and privacy training.

All staff are required to use 2FA along with a secure username/password AND Google authentication in order to access any user data.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach The security team consists of our Technical Lead, CEO and Operations Lead.
Policies/policy changes are communicated to staff when required and during on-boarding for new starters.
Information security policies and processes The security team consists of our Technical Lead, CEO and Operations Lead.
Policies/policy changes are communicated to staff when required and during on-boarding for new starters.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We use GitHub to track changes to components. Pull requests are created on all changes which are manually reviewed by members of the team, along with automated tests run against. These tests and reviews specifically check for security risks.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We operate a bug bounty scheme for vulnerability reporting and also ensure our dependencies are kept up to date. All reports are assessed by a developer and are patched with the upmost urgency, usually within 24hrs.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We pro-actively monitor by using Alerts on critical events, alerting on suspicious internal and administrator login attempts. All of which is done using accurate time-stamps. Alerts are notified to the team in real-time and are responded to on an ASAP basis, we maintain weekend technical support to ensure even out of hours we spot issues.
Incident management type Supplier-defined controls
Incident management approach Users can provide incident reports using our support system, we also offer a bug bounty incentive for anyone who finds critical issues. For issues around data security we have a documented process which includes the appropriate levels of escalation up to the ICO if required.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £20 to £1000 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We offer a plan which allows the storage of up to 2500 subscribers for free.

Service documents

Return to top ↑