Lifejak Ltd

EventHalo

Complete application processing for event exhibitors and traders from online forms to payment services:

On-line application forms for events and trade shows; exhibitors, vendors, performers, & volunteers, accept/reject applications, invoicing, payments, in-system email, document storage; accreditation for staff, guests, VIPs.

Features

  • trade show exhibitor online application forms, review, payments, invoices
  • exhibitor, trader, staff and guest-list accreditation, with mobile box-office

Benefits

  • end-to-end online processing of trade show exhibitors, saving time
  • multiple event functions integrated: accreditation, attractions, vendors, exhibitors, catering
  • large-screen web-app for planning, offine mobile app for show days
  • attractive modern interface with professionally designed UX and UI

Pricing

£0 to £15000 per licence per year

  • Free trial available

Service documents

G-Cloud 9

387059390102133

Lifejak Ltd

Jamie Ridyard

0330 123 321 1

sales@lifejak.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints The service is subject to planned maintenance updates on a pre-determined basis. The mobile apps work on iOS and Android.
System requirements
  • Chrome, Firefox, Edge, Internet Explorer
  • Internet connection
  • Mobile app requires iOS v7 and above or Android v4

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 8 working hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible We rely on Intercom.com which is widely accessible using standard keyboards and extended keyboards, screen readers and standard assistive technologies.
Web chat accessibility testing None.
Onsite support No
Support levels There is only one service level available to all customers, included at no extra cost in the service. The service covers setup, form design, usage, troubleshooting browser issues, mobile app installation and service usage.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We normally take their existing methods, paper, pdf, etc and replicate them in our system, perform a screen share with the user to walk through their previous process in our system, refine any points, then train and go live.
Service documentation Yes
Documentation formats
  • HTML
  • Other
Other documentation formats Video
End-of-contract data extraction All data can be exported as JSON, PDF, CSV, or custom
End-of-contract process There are no additional costs at the end of the contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Desktop service is intended to be carried out a planning time, whilst mobile app stores a cache of the data for offline use at a live event where data may be unreliable.
Accessibility standards None or don’t know
Description of accessibility We use a web stack, Angular, which supports standard keyboard insertion, mouse simulation, touch, and screen readers.
Accessibility testing None
API No
Customisation available Yes
Description of customisation Forms, branding, email templates, online shop, user permissions, all can be edited from the setup app.

Scaling

Scaling
Independence of resources Manual tracking and prediction of resource usage, based on historical data, and new cloud servers being instantiated on demand

Analytics

Analytics
Service usage metrics Yes
Metrics types Most aspects of the system are tracked, and per user and over time analytics are computed for each.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach There is a reporting function in each app, which allows for JSON, PDF, CVS or custom exports.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network All data is end--to-end encrypted.

Availability and resilience

Availability and resilience
Guaranteed availability 99% availability, best efforts, service credits for breach
Approach to resilience Data available on request
Outage reporting Email alerts, and a service status page.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication Encrypted QR code, RFID token
Access restrictions in management interfaces and support channels Users and staff have permission levels which we use to restrict access across all core services.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations
  • Stripe managed service accreditation
  • Amazon secure supplier accreditation

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Director responsible for quarterly reports to board on security issues.
Information security policies and processes Developers and operations staff report to CTO any suspected issues, CTO has 48 h to report to CEO, who must alert board in the event of suspected breach.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Open Project is used to track every component, physical or virtual, in the system, with a custom defined flow of status each component may pass through. Staff have various permissions allowing them to process components from stage to stage depending on their skills. Custom fields in the component datatypes allow for reporting suspected breaches of various kinds including security breaches.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Regular scripted and unscripted behaviours are carried out on the system to simulate normal and abnormal behaviour. Any actions that generate out of band responses are tracked by an on-call developer who starts a service report. Line managers have 48 hours to respond and confirm vulnerability status. Critical vulnerabilities demand a full team response 18hx7d and are planning to be repaired within 72 hours.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Regular scripted and unscripted behaviours are carried out on the system to simulate normal and abnormal behaviour. Any actions that generate out of band responses are tracked by an on-call developer who starts a service report. Line managers have 48 hours to respond and confirm vulnerability status. Critical vulnerabilities demand a full team response 18hx7d and are planning to be repaired within 72 hours.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach All user behaviour is logged, intermediary services such as CloudFlare are used, regular scripted and unscripted behaviours are carried out on the system to simulate normal and abnormal behaviour. Any actions that generate out of band responses are tracked by an on-call developer who starts a service report. Line managers have 72 hours to respond and confirm vulnerability status. Critical vulnerabilities demand a full team response 12hx5d and are planning to be repaired within 96 hours.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £0 to £15000 per licence per year
Discount for educational organisations No
Free trial available Yes
Description of free trial The service allows operation on a processing fee basis, which costs the user nothing, permanently.

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑