Recruitment and Admissions Software For Higher Education

FULL FABRIC provides a cloud-based solution for student recruitment and admissions, from initial inquiry to enrollment. Our toolset was built from the ground up specifically for higher education.


  • CRM built specifically for higher education
  • Enquiry Forms engine and landing pages - custom or template
  • Email and SMS campaign tools - custom or template
  • Powerful segmentation tools - segment your audience
  • Track history for segment or individual
  • Branded Student Application portal - customize with smart fields
  • Personalised URL for Applications
  • Ability to upload documents (visa, CV, identity)
  • Back-office view for tracking and evaluation
  • Intuitive, customizable workflow with ability to automate


  • Build and nurture relationships through the entire student lifecycle
  • Easily attract more leads and capture visitor information
  • Provide valuable downloadable content while capturing prospects’ contact details.
  • Track form performance: Learn about your prospects’
  • Personalize the experience with user-friendly and intelligent applications
  • Personalised Applications URL
  • Divide the process into section, progress is automatically saved
  • Applicants easily upload documents, request references, and pay application fees
  • Shorten Admissions time: build review and interview feedback forms
  • Prospects can apply, save and submit applications on any device


£11000 per instance per year

Service documents

G-Cloud 11



Tania Roquette



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Not Applicable.
System requirements
  • Internet Connection
  • Browser from the approved browser list

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical: 30 minutes
High: 2 hours
Medium: 4 hours
Low: 1 day
Monday through Friday 9:00 AM – 6:00 PM London time, excluding UK bank holidays
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing We use Intercom as our service interface and ticketing solution.

Please refer to < https://www.intercom.com/blog/messenger-accessibility/ > for detailed information on the testing and design principles that intercom has used to design the support experience.
Onsite support Yes, at extra cost
Support levels From the Support Centre, users can:
- Open a case online with Support via our portal, email, or phone
- Send us more information by adding additional correspondences to your existing case
- Check on the status of your open cases
- Jump to other handy resources like the Product Guides & FAQs

Severity Level / Response Time
Critical / 30 minutes
High / 2 hours
Medium / 4 hours
Low / 1 day

We have no optional additional levels of support. Support will enter through client success and, when required, will be escalated to 2nd line support, a Technical Product Manager or a Developer based on severity / complexity. All accounts have a Senior Account Manager as an additional interface / escalation point.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We are a group of higher ed professionals, technologists, designers, marketers and entrepreneurs on a mission to bring modern technology to education. Higher Education is in our DNA. Our expertise will ensure that clients get you up and running correctly from the start.

FULL FABRIC will assign a Project Manager to the implementation project. The project manager will manage the entire process, using an agile approach. FULL FABRIC uses a a project management tool and conducts weekly status update meetings with the client throughout the implementation process.

The Implementation specialist will provide project management to achieve a full implementation of all elements within the timescales agreed. FULL FABRIC will ensure that the system meets mutually agreed acceptance criteria and will assist you in undertaking acceptance testing prior to ‘go-live’.

FULL FABRIC will provide on-site training session on the use of the system, as well as online knowledge bases to help users navigate the system.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction On expiry or termination of this Agreement and upon written request by the Client, FULL FABRIC will make the Client data available for export or download in an agreed format.
End-of-contract process To be agreed

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our mobile interfaces are designed from the ground up and take into consideration the use cases specific to the form factor. We work with users to understand the form factors most commonly used and the flows to support.

Our desktop interfaces are designed to allow users to consume large amounts of information, perform data-intensive actions, or configure complex workflows.
Service interface Yes
Description of service interface In addition to the several configurable staff roles, selected IT staff can have a super user access to perform certain activities such as User Management, Authentication and Authorization Policy Management or Data Management, to name a few.
Accessibility standards None or don’t know
Description of accessibility Our design is build on WCAG 2.1 AA principles and aspires to be compliant. Part but not all of our interfaces are compliant.
Accessibility testing Usability and interface testing with users with feedback incorporated into systems and systems roadmap.
What users can and can't do using the API FULL FABRIC will support interoperability using import/export of data in recognised exchange formats, standard APIs and other industry-standard protocols. Through FULL FABRIC industry- standard APIs the client is able to import and export information using both push and pull . mechanisms.
FULL FABRIC uses HTTP verbs and a RESTful endpoint structure. Request and response payloads are formatted as JSON.
All sensitive interactions with FULL FABRIC products (e.g. API calls, authentication, data transfer, etc.) are encrypted in-transit with TLS 1.2 and 2048 bit encryption or better.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Our system is highly configurable in both workflow and content:
- Ability to customise all schemas, workflow, templates, letters
- Institution branding on portal
- Creation of candidate forms with conditional fields
- Application configuration (standard or custom features)
- Configuration of rights and access


Independence of resources - FULL FABRIC’s infrastructure is built on Amazon Web Services (AWS). Our SLA is 99.9% uptime and we currently average 99.99%. The Service is delivered from at least two independent availability zones in the EU-WEST-1 (Ireland) or EU-WEST-2 (London) regions using carrier-class components designed to support millions of users.


Service usage metrics Yes
Metrics types Clients can easily segment and create smart lists based on multiple criteria such as demographics, interests as well as behavioural data.

Flexible dashboards that allow you to get a real time picture of the pipeline at a glance, based on criteria that really matters.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can export data in CSV and PDF format.
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • Microsoft Office Documents (Excel / Word / PPoint / Etc)
  • PDF
  • JPG
  • PNG
  • GIF
  • TXT

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Service Commitment - We use all commercially reasonable efforts to make our service available with a monthly uptime percentage of at least 99.9%.
Approach to resilience FULL FABRIC’s infrastructure is built on Amazon Web Services infrastructure, a cloud computing platform. All critical components of the Service are redundant and run on at least two availability zones within the EU-WEST-1 or EU-CENTRAL-1 regions of AWS.

Production server provisioning is automated, and, if required, services can be moved to another server in another availability zone within the same region in a matter of seconds in the event of catastrophic server failure.

In the extremely unlikely event of all three availability zones in a particular region becoming unavailable as a consequence of a catastrophic event, critical services can be deployed to another region and the Service can be restored in a matter of hours.
Outage reporting Monitoring services notifies service teams via email, slack and internal dashboards. Users and clients are notified by email where applicable.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Access is restricted using two-factor authentication on management interfaces and support channels. No sensitive information is shared via telephone or chat.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We conduct regular platform security auditing with Prism Infosec - an independent and recognized information security consultancy and assessment firm.
Information security policies and processes - Regular cyber security auditing with Prism Infosec
- Data encryption in storage and in transmission
- Mandatory two factor authentication (2FA) for all internal systems and optional for the client platform

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All configuration management is automated and scripted, and therefore replicable, using a combination of open source and proprietary technologies. Our process includes regular updates to ensure patching and upgrading of critical components.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We run automated threat and vulnerability testing on a regular basis, running thousands of automated tests on our infrastructure and applications. We also work closely with our security partners to identify new threats, vulnerabilities or exploits and to implement countermeasures in a timely manner. Urgent fixes and patching are applied within hours.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We log and audit activity across our infrastructure and our applications. We also monitor activity using external services as well as AWS specific tools. Threats and incidents are prioritized and addressed accordingly in close collaboration with our security partners and AWS where relevant.
Incident management type Supplier-defined controls
Incident management approach Threats and incidents are prioritized in close collaboration with our security partners. We have put in place procedures for specific types of incidents, and train personnel to be able to handle specific scenarios that require specific training.

Users can report incidents via our support portal, by email or by phone. Security incidents are escalated to the relevant team.

Incidents are documented and reports are produced within a reasonable timeframe following the mitigation of the threat or incident.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £11000 per instance per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑