Recruitment and Admissions Software For Higher Education
FULL FABRIC provides a cloud-based solution for student recruitment and admissions, from initial inquiry to enrollment. Our toolset was built from the ground up specifically for higher education.
- CRM built specifically for higher education
- Enquiry Forms engine and landing pages - custom or template
- Email and SMS campaign tools - custom or template
- Powerful segmentation tools - segment your audience
- Track history for segment or individual
- Branded Student Application portal - customize with smart fields
- Personalised URL for Applications
- Ability to upload documents (visa, CV, identity)
- Back-office view for tracking and evaluation
- Intuitive, customizable workflow with ability to automate
- Build and nurture relationships through the entire student lifecycle
- Easily attract more leads and capture visitor information
- Provide valuable downloadable content while capturing prospects’ contact details.
- Track form performance: Learn about your prospects’
- Personalize the experience with user-friendly and intelligent applications
- Personalised Applications URL
- Divide the process into section, progress is automatically saved
- Applicants easily upload documents, request references, and pay application fees
- Shorten Admissions time: build review and interview feedback forms
- Prospects can apply, save and submit applications on any device
£11000 per instance per year
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Not Applicable.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Critical: 30 minutes
High: 2 hours
Medium: 4 hours
Low: 1 day
Monday through Friday 9:00 AM – 6:00 PM London time, excluding UK bank holidays
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.1 AA or EN 301 549|
|Web chat accessibility testing||
We use Intercom as our service interface and ticketing solution.
Please refer to < https://www.intercom.com/blog/messenger-accessibility/ > for detailed information on the testing and design principles that intercom has used to design the support experience.
|Onsite support||Yes, at extra cost|
From the Support Centre, users can:
- Open a case online with Support via our portal, email, or phone
- Send us more information by adding additional correspondences to your existing case
- Check on the status of your open cases
- Jump to other handy resources like the Product Guides & FAQs
Severity Level / Response Time
Critical / 30 minutes
High / 2 hours
Medium / 4 hours
Low / 1 day
We have no optional additional levels of support. Support will enter through client success and, when required, will be escalated to 2nd line support, a Technical Product Manager or a Developer based on severity / complexity. All accounts have a Senior Account Manager as an additional interface / escalation point.
|Support available to third parties||Yes|
Onboarding and offboarding
We are a group of higher ed professionals, technologists, designers, marketers and entrepreneurs on a mission to bring modern technology to education. Higher Education is in our DNA. Our expertise will ensure that clients get you up and running correctly from the start.
FULL FABRIC will assign a Project Manager to the implementation project. The project manager will manage the entire process, using an agile approach. FULL FABRIC uses a a project management tool and conducts weekly status update meetings with the client throughout the implementation process.
The Implementation specialist will provide project management to achieve a full implementation of all elements within the timescales agreed. FULL FABRIC will ensure that the system meets mutually agreed acceptance criteria and will assist you in undertaking acceptance testing prior to ‘go-live’.
FULL FABRIC will provide on-site training session on the use of the system, as well as online knowledge bases to help users navigate the system.
|End-of-contract data extraction||On expiry or termination of this Agreement and upon written request by the Client, FULL FABRIC will make the Client data available for export or download in an agreed format.|
|End-of-contract process||To be agreed|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Our mobile interfaces are designed from the ground up and take into consideration the use cases specific to the form factor. We work with users to understand the form factors most commonly used and the flows to support.
Our desktop interfaces are designed to allow users to consume large amounts of information, perform data-intensive actions, or configure complex workflows.
|Description of service interface||In addition to the several configurable staff roles, selected IT staff can have a super user access to perform certain activities such as User Management, Authentication and Authorization Policy Management or Data Management, to name a few.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Our design is build on WCAG 2.1 AA principles and aspires to be compliant. Part but not all of our interfaces are compliant.|
|Accessibility testing||Usability and interface testing with users with feedback incorporated into systems and systems roadmap.|
|What users can and can't do using the API||
FULL FABRIC will support interoperability using import/export of data in recognised exchange formats, standard APIs and other industry-standard protocols. Through FULL FABRIC industry- standard APIs the client is able to import and export information using both push and pull . mechanisms.
FULL FABRIC uses HTTP verbs and a RESTful endpoint structure. Request and response payloads are formatted as JSON.
All sensitive interactions with FULL FABRIC products (e.g. API calls, authentication, data transfer, etc.) are encrypted in-transit with TLS 1.2 and 2048 bit encryption or better.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||
Our system is highly configurable in both workflow and content:
- Ability to customise all schemas, workflow, templates, letters
- Institution branding on portal
- Creation of candidate forms with conditional fields
- Application configuration (standard or custom features)
- Configuration of rights and access
|Independence of resources||- FULL FABRIC’s infrastructure is built on Amazon Web Services (AWS). Our SLA is 99.9% uptime and we currently average 99.99%. The Service is delivered from at least two independent availability zones in the EU-WEST-1 (Ireland) or EU-WEST-2 (London) regions using carrier-class components designed to support millions of users.|
|Service usage metrics||Yes|
Clients can easily segment and create smart lists based on multiple criteria such as demographics, interests as well as behavioural data.
Flexible dashboards that allow you to get a real time picture of the pipeline at a glance, based on criteria that really matters.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Users can export data in CSV and PDF format.|
|Data export formats||CSV|
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||Service Commitment - We use all commercially reasonable efforts to make our service available with a monthly uptime percentage of at least 99.9%.|
|Approach to resilience||
FULL FABRIC’s infrastructure is built on Amazon Web Services infrastructure, a cloud computing platform. All critical components of the Service are redundant and run on at least two availability zones within the EU-WEST-1 or EU-CENTRAL-1 regions of AWS.
Production server provisioning is automated, and, if required, services can be moved to another server in another availability zone within the same region in a matter of seconds in the event of catastrophic server failure.
In the extremely unlikely event of all three availability zones in a particular region becoming unavailable as a consequence of a catastrophic event, critical services can be deployed to another region and the Service can be restored in a matter of hours.
|Outage reporting||Monitoring services notifies service teams via email, slack and internal dashboards. Users and clients are notified by email where applicable.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Access is restricted using two-factor authentication on management interfaces and support channels. No sensitive information is shared via telephone or chat.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We conduct regular platform security auditing with Prism Infosec - an independent and recognized information security consultancy and assessment firm.|
|Information security policies and processes||
- Regular cyber security auditing with Prism Infosec
- Data encryption in storage and in transmission
- Mandatory two factor authentication (2FA) for all internal systems and optional for the client platform
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All configuration management is automated and scripted, and therefore replicable, using a combination of open source and proprietary technologies. Our process includes regular updates to ensure patching and upgrading of critical components.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||We run automated threat and vulnerability testing on a regular basis, running thousands of automated tests on our infrastructure and applications. We also work closely with our security partners to identify new threats, vulnerabilities or exploits and to implement countermeasures in a timely manner. Urgent fixes and patching are applied within hours.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||We log and audit activity across our infrastructure and our applications. We also monitor activity using external services as well as AWS specific tools. Threats and incidents are prioritized and addressed accordingly in close collaboration with our security partners and AWS where relevant.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
Threats and incidents are prioritized in close collaboration with our security partners. We have put in place procedures for specific types of incidents, and train personnel to be able to handle specific scenarios that require specific training.
Users can report incidents via our support portal, by email or by phone. Security incidents are escalated to the relevant team.
Incidents are documented and reports are produced within a reasonable timeframe following the mitigation of the threat or incident.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£11000 per instance per year|
|Discount for educational organisations||No|
|Free trial available||No|