Membership Management Software

Our membership software provides modular features for member administration and engagement. Members can be groups and/or individuals.

Key benefits include: granular configuration options, automated workflows, efficiency savings, excellent support and a highly engaging, familiar design.

Core functionality includes: emails, payments, reporting, groups, file storage, forum, online community, seamless third-party integrations.


  • Member, user CRM, database, profiles, authentication, management
  • Online community, intranet, private social network, content sharing, likes, comments
  • Payments, subscriptions, donations, credit debit cards, direct debit, renewals, reminders
  • Email campaigns, filters, schedule, mailmerge, templates, links, open, click reporting
  • File sharing, posts, hierarchal storage directories, permission based access control
  • Private messaging, 1 to 1 chat, Group messaging
  • Forum, threads, topics, categories, notification subscriptions, email alerts
  • Permission based access controls, groups
  • Mobile friendly, Remote access, SSO and bespoke API integrations
  • Real-time reporting


  • Typically save 80% administration time
  • Increase member, user, contact engagement with peer-to-peer learning, discussions
  • Customisation and detailed tailoring options available
  • Automate workflows
  • Collaborate on the move on any device
  • Manage your data securely with access controls
  • Share files, videos and other content with your community
  • Send tailored email communications to the right people
  • Encourage participation and sense of belonging
  • Automatically collect payments and donations


£200 per instance

Service documents

G-Cloud 10



Kyle White

0141 459 1024

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints We have no explicit constraints and endeavour to ensure our service operates on the widest possible range of devices, connections and infrastructure.
System requirements
  • Download speed of greater than 3Mbps for best user experience
  • A web browser: IE10+, Edge, Firefox, Chrome, Opera, Safari
  • Internet enabled mobile, tablet, laptop or desktop device

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Office hours <2 hours.
Out of hours <2 hours of next office hours.

Response times also vary by criticality and requirements.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Efforts have been made throughout our service to make it accessible as possible. No formal testing against these standards has yet been conducted.
Web chat accessibility testing Testing is ongoing
Onsite support Yes, at extra cost
Support levels On-demand support (included in software costs)
On-demand support with dedicated technical account manager (costs subject to system requirements)
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We offer a dedicated hands-on consultancy period in order to get started. That covers ensuring everything is configured to your needs and that your team are happy with how the software works and the processes. Requirements often evolve over time. Our approach to onboarding ensures we can collectively achieve the best outcomes for a positive partnership.

Our software is very easy to use and feels familiar even to brand new users, so we are able to offer a great deal of training and support which is rarely needed.

We supply online training, user documentation, telephone support and screensharing. We provide onsite training as an optional extra.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data can be extracted at any time during the contract by the user.

At the end of the contract, users can extract their data in the same way and if a full data history is desired, this is available from us on request.
End-of-contract process At the end of the contract, all your data is available as part of the contract costs.

There are no additional costs at the end of the contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The platform is fully mobile compatible with no loss of functionality.
Accessibility standards None or don’t know
Description of accessibility Efforts have been made throughout our service to make it accessible as possible. No formal testing against these standards has yet been conducted.
Accessibility testing Testing is ongoing.
What users can and can't do using the API Our secure API allows for access/updates to member / user records, events and payments.

Set up for use of the API is limited and restricted. API access is available only on request.
API documentation Yes
API documentation formats
  • HTML
  • PDF
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Branding, look and feel, features, language, text labelling, terminology, data fields, search criteria and more.

We offer a highly customisable service.

Customisation can be done by either the user or by VeryConnect.


Independence of resources We monitor resources closely and ensure every client is significantly oversubscribed in terms of bandwidth, CPU and storage. Our infrastructure scales on demand.


Service usage metrics Yes
Metrics types Login frequencies.
Integrated Google Analytics available on aggregate or with activity details per user.
View pages and files accessed.
Email, event and payment transaction histories - view all data over time.
Aggregate and per member engagement metrics - likes, comments, blogs and posts.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach Various options depending on level of data sensitivity
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach We have an export feature which allows for data to be exported as CSV for administrators.

For export of all user generated content such as files and photos, a full database dump is available on request.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Our availability is 99.98%

SLAs depend on features and requirements. Example SLA:
The Client is entitled to a refund of 1/30th of the monthly fee for any periods of service un-availability lasting longer than 2 hours concurrently, or 3 hours cumulatively in a 24 hour period.
Approach to resilience Available on request
Outage reporting API, user dashboard and email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels We use a role based permissions system for access controls for management interfaces and to undertake all management operations the user must have admin rights.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Available on request
Information security policies and processes We follow best practices including GDPR and we follow the reporting structure from the ICO

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We follow strict code review and version control systems are in place to track changes for all components throughout their lifetime.
Vulnerability management type Undisclosed
Vulnerability management approach We undertake periodic penetration testing by third party companies.

We deploy patches at a speed proportional to their severity. For critical patches we do this at the earliest possible moment.

We get our information about potential threats from a variety of sources including industry leaders such as the ICO
Protective monitoring type Undisclosed
Protective monitoring approach Available on request
Incident management type Undisclosed
Incident management approach Available on request

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £200 per instance
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑