Wired Plus Ltd

Wired Plus

We are a full service marketing automation platform and agency. We have created Automation Marketing Software backed up with a team of marketing experts focussed on one key principle: make better, confident marketing decisions, based on real data, emails, landing pages, surveys, lead scoring and web tracking.

Features

  • real time email and website analytics reporting
  • enterprise email marketing (ESP) platform
  • creative email solutions - email template design and managed services
  • lifecycle and behavioural email marketing automation suite
  • creation of dynamic and customisable landing pages
  • surveys and forms tool to measure responses of survey answers
  • data segmentation and data management tools
  • API interlinking into CRM and ERP systems
  • Lead generation and brand awareness campaign email marketing tools
  • secure remote login into UK based SAAS system

Benefits

  • creation and sending of email marketing campaigns
  • real time visibility on interaction with your marketing content
  • tracking of legal marketing requirements like unsubscribes
  • track survey results with graphical reports and data insight
  • drag and drop to create automation, templates and landing pages
  • online SAAS system accessing marketing and data on the move
  • full account management and UK based support
  • API integrations allow you to easily manage your data
  • lead scoring to monitor most engaged members of audience

Pricing

£45 to £399 per licence per month

Service documents

Framework

G-Cloud 11

Service ID

4 5 9 0 9 4 2 0 6 7 2 6 5 1 0

Contact

Wired Plus Ltd

Andrew Hardman

0845 463 5516

hello@wiredplus.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to The email and marketing automation platform can also tie into other systems via an API integration: Systems include CRMs and ERP solutions such as Salesforce, Microsoft Dynamics and Magento. Custom integrations also available.
Cloud deployment model Private cloud
Service constraints No as long as the buyer has access to an internet connection and latest browser versions there are no restrictions or limitations.
System requirements
  • Active Wired Plus System License
  • Latest Web Browser with Internet Connection

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Questions are answered within 4 hours and may be escalated if further investigation is required.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels With all clients we provide phone, email and support desk support 24/7 for urgent or emergency issues. We also provide full account management and general support 9am to 5.30pm Monday to Friday. This is as standard.
For larger clients looking for full dedicated account management and onsite support and strategic advice at an extra cost should this be required.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started With all users there is an option of online training completed via a screenshare system compatible with departments IT restrictions or onsite training. This training covers the full system including features, functions, data management, and marketing strategy suggestions. We also provide an option for onsite training at the clients offices or the client can come to our offices should they wish. The training is undertaken by a trained member of staff in our training team and can be done to the whole team at the same time or to individuals one at a time dependent on the client requirements. There is also a full help and knowledge base within the system that is fully documented with screenshots and account managers and support team are there to help at any point any questions arise after the training.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Users with authorised data export permissions can export the data at any point in the system should they require. When the contract ends we undertake a full export and off-boarding process to make sure the client has all data and marketing assets accessible.
End-of-contract process All clients are required to give notice of their cancellation 30 days before the end of the contract. An account manager then works with the client to export sensitive data from the platform in a usable format, including any contact data.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service There are no differences in functionality between the two platforms. Images will resize on mobile devices, and page layouts will adjust the structure based on the device, for example any content in the right column will stack under content in the left column.
Service interface Yes
Description of service interface Wired Plus is accessed via the browser through a log in page.
Accessibility standards None or don’t know
Description of accessibility Users cannot currently change the colour or font on the webpage, but can zoom in using the browser settings to increase the font and image sizes.
Accessibility testing Quarterly UI testing and assessments with selected clients and specific third party UI testers.
API Yes
What users can and can't do using the API The API code library can be viewed online at http://api.wiredplus.com/ . A user can create a secure connection with username and password to connect to Wired in the software platform itself. Guidance is and will be provided on doing this either in the help area or via an account manager. The API code is controlled by the client so changes and restrictions can be made at any point.
The API can be written in REST API. API usage is limited to 1000 calls per hour, and requires the creation of an API user. You can create API users by logging into your account and going to the Settings area. Please note that these APIs always use UTC dates and times.
There are no other limitations and full support will be provided to assist clients with the integration.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The Core Platform / software system cannot be customised but can be white labelled. The system also allows for full customisation of email templates, landing pages, surveys and any other marketing assets or data.
This is generally done via a drag and drop editor which allows for quick adjustments. Alternatively, if the client wishes too they can access the source code to make adjustments to the marketing assets should they wish.

Scaling

Scaling
Independence of resources We use secure data centers within the UK or EU. All hold a broad set of industry standard accreditations such as ISO27001 and ISO9001. Our data centers are connected to the internet with redundant internet links and bandwidth can be easily upgraded on requirement. There is redundancy at every component and service level, as well as spare capacity and we can scale our servers on demand. Therefore we can run for prolonged periods even after experiencing major component failures. We make use of leading cloud providers and content distribution networks to host our email images.

Analytics

Analytics
Service usage metrics Yes
Metrics types There are a number of usage metrics available within the system related to both actual user metrics as well as marketing campaign metrics. User metrics are service usage based as well as user auditing for security which can be provided on request. With the marketing usage metrics this will provide a breakdown of all campaign and data held within the system and campaigns sent out including delivery rates, open and click through rates, suppressions and social / website activity to name a few. This can all be viewed via the platform and via API calls.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data through a number of routes in the system. They login and then can go to the contacts, reports, surveys or template areas and simply select export all or the selected data / reports they wish to download. This will then provide them with a CSV file of the data locally (this process assumes the user has been given permission to export).
Data export formats CSV
Data import formats Other
Other data import formats
  • HTML
  • CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks We use UKFast for our server configuration and data management and UKFast fully owns and manages its networks as a managed service to all clients. UKFast provides network segregation through dedicated firewalling for our service.
Data protection within supplier network Other
Other protection within supplier network UKFast provide Cisco ASA firewalls for our service which ensure only connection to devices from listed IP’s over listed ports. Data on servers have protection such as web application firewalls, anti-DDoS, SSL’s on behalf of Comodo, IDS/IPS.

Availability and resilience

Availability and resilience
Guaranteed availability We have a 100% guarantee SLA in place for the network infrastructure including routers, switches and cabling. Because each circuit in every regional POP is connected to a different router, we guarantee continuous service, even in the event of a total loss of a router and/or circuit.
Each POP has a redundant uninterruptable power supply system, so should either UPS fail or be taken out of service for maintenance, the connection remains unaffected ensuring maximum network performance and reliability. We guarantee that when not undergoing scheduled maintenance, the network infrastructure is available 100% of the time. In the event of an unplanned network failure, we'll refund 24 hours' service for every 60 minutes of lost connection - up to a maximum value equal to your monthly subscription charge.
Approach to resilience Wired uses N+1 configuration on all management infrastructure. Our infrastructure is protected by firewalls and all management access requires two-factor authentication. Virus scan technology is implemented throughout our infrastructure. We commission annual independent third party security assessments. An ongoing vulnerability scanning and management program is in place. Machines are built from approved hardened images, and verified in third party security assessments. A monthly patching cycle is in place to ensure the latest security updates have been applied. We have restore points for critical data and these are taken every 5 minutes. Backup data is securely kept at same geographic regions, yet sufficiently distant to ensure data is not lost in the event of a disaster, whilst complying with local data protection regulation. We employ skilled information security and data privacy specialists in our team to ensure security is always a priority. EU Model Contracts are in place, as well as subcontractors processing data. Role based permissions are used to control staff access to systems and data. Management access to infrastructure is tightly controlled, and employs multi-factor authentication protection. Intrusion Detection Technology is in place.
Outage reporting • a public dashboard • an API • email alerts • account manager call and email to the client. We also provide a scheduled maintenance calendar of upcoming planned improvements affecting the platform.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Dedicated employees have access to management portals and support channels based on their management clearance. Portals and support channels require a username and password access that are changed every 90 days.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 LRQA
ISO/IEC 27001 accreditation date 7 Feb 2018
What the ISO/IEC 27001 doesn’t cover The ISO received was for cloud infrastructure along with HSCN stage 1 is currently in use and stages 2 and 3 are currently being set up.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards Wired Plus has the Cyber Essentials accreditation. our server infrastructure provider also has ISO 27018, PCI DSS,
Information security policies and processes All employees must sign an NDA ensuring there is no misuse of internal or client data. We abide by the following policies: data protection, Subject access request, right to be forgotten, data deletion requests, password protection, internal email policies, clean desk, internet usage, removable media and risk assessment and are GDPR compliant. The management team are responsible for enforcing, training and testing employees on these areas, and spot checks are completed to ensure compliance. Additional training is given annually and upon request to employees who would require it.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Dedicated change management system that must be approved by senior technical manager. Four stages are used during the change control process once an Originator raises a request: an Evaluator assesses the issue including reporting issues, new developments or enhancements, who then passes the work to the management team. The team complete the work and notifies any other affected parties and passes the project to the Verifier. This team then performs steps including security checks, and passes the project to the Modifier who installs the changes and updates traceability information and updates the originator and project manager.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Wired have a vulnerability management program for all infrastructure. Our infrastructure providers also follow PCI DSS & ISO 27001. Workers who discover a weakness or vulnerability in the security measures must not discuss this with anyone other than Information Security Manager. Wired acknowledge receipt of reported vulnerabilities with its products or services within seven days. We provide a response to the reporting party within ten days from the time the report was received. We also endeavour to contact the reporting party every seven days while a patch or fix is being developed, and to resolve the vulnerability within thirty days.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Threat monitoring IDS tool that provides protecting monitoring and file integrity monitoring across all infrastructure. Alerts are generated when known malicious or unwanted software attempts to install itself or run on the system. When malware is detected, we automatically respond to delete or quarantine malicious files and clean up malicious registry entries. We also have a distributed DDoS system as part of the continuous monitoring and penetration-testing processes, which uses standard detection and mitigation techniques such as SYN cookies, rate limiting, and connection limits to protect against DDoS attacks.
Incident management type Supplier-defined controls
Incident management approach In order to facilitate a recovery regardless of type or duration of disaster, we implemented multiple recovery strategies. These strategies are categorised into three levels, designed to provide a recovery solution matched to the duration of the emergency condition. You will be notified by the account management team of a confirmed incident, and clients can securely report incidents to their account manager who will escalate this to a security team member. The security team produce monthly report and this includes such things as number of incidents/investigations, patches and anti-virus coverage compliance.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £45 to £399 per licence per month
Discount for educational organisations No
Free trial available Yes
Description of free trial The Free trial version lasts 14 days and provides access to the full platform. The only restriction is that the trial you are limited to 500 free email sends.
Link to free trial https://wiredplus.com/signup

Service documents

Return to top ↑