Our membership software provides modular features for member administration and engagement. Members can be groups and/or individuals.
Key benefits include: granular configuration options, automated workflows, efficiency savings, excellent support and a highly engaging, familiar design.
Core functionality includes: emails, payments, reporting, groups, file storage, forum, online community, seamless third-party integrations.
- Member, user CRM, database, profiles, authentication, management
- Online community, intranet, private social network, content sharing, likes, comments
- Payments, subscriptions, donations, credit debit cards, direct debit, renewals, reminders
- Email campaigns, filters, schedule, mailmerge, templates, links, open, click reporting
- File sharing, posts, hierarchal storage directories, permission based access control
- Private messaging, 1 to 1 chat, Group messaging
- Forum, threads, topics, categories, notification subscriptions, email alerts
- Permission based access controls, groups
- Mobile friendly, Remote access, SSO and bespoke API integrations
- Real-time reporting
- Typically save 80% administration time
- Increase member, user, contact engagement with peer-to-peer learning, discussions
- Customisation and detailed tailoring options available
- Automate workflows
- Collaborate on the move on any device
- Manage your data securely with access controls
- Share files, videos and other content with your community
- Send tailored email communications to the right people
- Encourage participation and sense of belonging
- Automatically collect payments and donations
£200 per instance
0141 459 1024
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||We have no explicit constraints and endeavour to ensure our service operates on the widest possible range of devices, connections and infrastructure.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Office hours <2 hours.
Out of hours <2 hours of next office hours.
Response times also vary by criticality and requirements.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Efforts have been made throughout our service to make it accessible as possible. No formal testing against these standards has yet been conducted.|
|Web chat accessibility testing||Testing is ongoing|
|Onsite support||Yes, at extra cost|
On-demand support (included in software costs)
On-demand support with dedicated technical account manager (costs subject to system requirements)
|Support available to third parties||Yes|
Onboarding and offboarding
We offer a dedicated hands-on consultancy period in order to get started. That covers ensuring everything is configured to your needs and that your team are happy with how the software works and the processes. Requirements often evolve over time. Our approach to onboarding ensures we can collectively achieve the best outcomes for a positive partnership.
Our software is very easy to use and feels familiar even to brand new users, so we are able to offer a great deal of training and support which is rarely needed.
We supply online training, user documentation, telephone support and screensharing. We provide onsite training as an optional extra.
|End-of-contract data extraction||
Data can be extracted at any time during the contract by the user.
At the end of the contract, users can extract their data in the same way and if a full data history is desired, this is available from us on request.
At the end of the contract, all your data is available as part of the contract costs.
There are no additional costs at the end of the contract.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The platform is fully mobile compatible with no loss of functionality.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Efforts have been made throughout our service to make it accessible as possible. No formal testing against these standards has yet been conducted.|
|Accessibility testing||Testing is ongoing.|
|What users can and can't do using the API||
Our secure API allows for access/updates to member / user records, events and payments.
Set up for use of the API is limited and restricted. API access is available only on request.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||
Branding, look and feel, features, language, text labelling, terminology, data fields, search criteria and more.
We offer a highly customisable service.
Customisation can be done by either the user or by VeryConnect.
|Independence of resources||We monitor resources closely and ensure every client is significantly oversubscribed in terms of bandwidth, CPU and storage. Our infrastructure scales on demand.|
|Service usage metrics||Yes|
Integrated Google Analytics available on aggregate or with activity details per user.
View pages and files accessed.
Email, event and payment transaction histories - view all data over time.
Aggregate and per member engagement metrics - likes, comments, blogs and posts.
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Other data at rest protection approach||Various options depending on level of data sensitivity|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
We have an export feature which allows for data to be exported as CSV for administrators.
For export of all user generated content such as files and photos, a full database dump is available on request.
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
Our availability is 99.98%
SLAs depend on features and requirements. Example SLA:
The Client is entitled to a refund of 1/30th of the monthly fee for any periods of service un-availability lasting longer than 2 hours concurrently, or 3 hours cumulatively in a 24 hour period.
|Approach to resilience||Available on request|
|Outage reporting||API, user dashboard and email alerts.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||We use a role based permissions system for access controls for management interfaces and to undertake all management operations the user must have admin rights.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Available on request|
|Information security policies and processes||We follow best practices including GDPR and we follow the reporting structure from the ICO|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We follow strict code review and version control systems are in place to track changes for all components throughout their lifetime.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
We undertake periodic penetration testing by third party companies.
We deploy patches at a speed proportional to their severity. For critical patches we do this at the earliest possible moment.
We get our information about potential threats from a variety of sources including industry leaders such as the ICO
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||Available on request|
|Incident management type||Undisclosed|
|Incident management approach||Available on request|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£200 per instance|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|