Recruitive Ltd

Recruitive Ltd

Specialist provider of Cloud based Recruitment Software, e-recruitment solutions, off the shelf and bespoke build talent acquisition and candidate management systems. Applicant Tracking Solutions, Multi posting CV parsing capabilities. Latest award winning technologies to reduce your time and cost to hire whilst enhancing the candidate journey and streamlining processes.


  • Complete Recruitment Software Solution
  • Off the shelf or Bespoke build
  • Multi -Posting Capabilities to UK Job Boards and Social Media
  • Applicant Tracking System (ATS) with automatic response management
  • Candidate Management, Short Listing, Response Templates, SMS and Email Capabilities
  • CV Parsing Capabilities
  • Own Website Job Listings, candidate registration and Candidate Portal
  • Candidate Profiling and Search Capabilities
  • MI, Reports and Time to Hire, Response Ratios, Media Effectiveness
  • Intervies Booking System, Reference Checking and Full On Boarding Functionality


  • Reduce Time and Cost to Hire
  • Instant Management Reports
  • Nothing to download
  • Telephone based instant support
  • Utilise your own talent pool
  • Respond to all Candidates Quickly
  • Improves your candidates journey
  • Simple and easy to use


£7995 per licence per year

  • Education pricing available

Service documents


G-Cloud 11

Service ID

7 3 4 0 5 5 2 7 4 3 0 0 0 7 7


Recruitive Ltd

Richard Clarke

0345 6000550

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements
Annual user access licence

User support

Email or online ticketing support
Email or online ticketing
Support response times
Immediate support from dedicated and appointed client service handlers to your account.
We only employ the best and most experienced account handlers and technicians (for which you will have a direct contact
numbers for) who always immediately respond to your requirements. You will also have access to an ‘outside of business hours’ contact number in case of any emergency.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Support levels
Immediate support from dedicated and appointed client service/technical account handlers/Managers.
Service support within annual contract.
Technical account Manager and Cloud based support provided
Support available to third parties

Onboarding and offboarding

Getting started
An online demonstration will be provided and once we have a clear understanding of your exact requirements, a formal quotation will be emailed to you, when you are happy an E Sign Order Form would be sent for you to sign and date.Your account will be set up once payment has been made and on completion a Client Service Account Manager will be assigned. You will be provided with unlimited online training within your package and the Account Manager will arrange a schedule for all of your users. Your Account Manager will be on hand day to day to answer any queries yo may have.
Service documentation
Documentation formats
End-of-contract data extraction
We offer a secure data download service to the clients required formats (E.g. CSV files, API download, encrypted disk etc) to the approved authorised user of all data held within their solution.
End-of-contract process
Within 30 days of the end if the contract term we writing outlining and inviting renewal terms for the following year. where clients enter into 2 to 5 year fixed terms we write outlining the continuation of terms within the terms of contract. All clients have appointed account directors who are in regular contact throughout the term of the contract period.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
No differences
Service interface
Description of service interface
This can be arranged on request
Accessibility standards
Accessibility testing
To ensure our technology is compatible with assistive technologies we carried out testing with people who routinely use the assistive technologies in their everyday life, rather than just our internal application development only.
Obviously, initial key testing including screen readers was carried out but moreover how different users would use the screen reader in relation to our technology was also a consideration. We take this seriously. For accessibility, users with impairments were asked to use the application to carry out the tasks, using their own assistive technology set up according to their own preferences, so we could ensure our technologies fully met the requirements.
To date we have carried out extensive testing both internally at our data centres and externally with users on site and remain proactive in delivering fully tested ahead of the curve solutions that support assistive technologies.
What users can and can't do using the API
Where clients have existing recruitment software our API can facilitate the posting of job data to multiple sources.
We provide secure API access codes that clients can use to access the secure service. We also provide the API guide/ specifications. Users can configure the set up to enable the posting of job data to selected sources and the subsequent return of candidate application data back into their own solution. The API at this time is limited to just job posting and candidate response handling however we can expand the services depending on client requirements.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available


Independence of resources
As a cloud based system, each user has a unique URL.


Service usage metrics
Metrics types
We can provide information a wide variety of metrics including candidate usage, job postings, user statistics, average time to hire and many more. If clients have additional requirements we are able to add these.
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
On termination of the contract in order to support clients in transferring data out of the solution we offer a secure data download service. This service delivers the data to the clients required formats (E.g. CSV files, API download, encrypted disk etc as requested) and is sent to the approved authorised user. Full support is included.
Data export formats
  • CSV
  • Other
Other data export formats
  • API
  • Encrypted Disk
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Please see attached Service Definition Document.

Recruitive commits to implementing the solutions in line with the
pre-agreed time schedule. If these are not adhered to Recruitive will compensate on terms agreed by both parties.
Approach to resilience
We are ISO 27001 accredited operating to the highest standards, our data centre set up is totally resilient and further details including drawings of data centre architecture is available on request.
Outage reporting
We have never sustained any outages with our solutions however we provide clients with a full activity log coupled with email alerts which are provided to protect as a further security measure.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Policy and password protection
Optional Two-Factor Authentication (2FA)
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
QMS International
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Anything other than the provision of cloud based recruitment software, e-recruitment solutions, off the self and bespoke build talent acquisition and candidate management systems, applicant tracking solutions, multi posting and cv parsing capabilities.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We operate full and detailed security governance policy (copy available on request). Data is stored separately for all clients and data based on not shared. This eliminates over-spill or data leakage risks. We also encrypt any critical data and have secured and set access procedures in line with ISO 27001 accreditation.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We are ISO27001 accredited and adhere to a strict change management processes. We log every update and work on an agile basis where we test security impacts alongside our developments and adjustment changes before roll out. Every entry is recorded in the log and full details with ability to roll back maintained within our data center solutions in 10 year cycles. We also carry out ad hock security tests in line with our security governance policy.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
At our data centre we constantly assess potential threats to our services. We monitor continued service and any unusual activity is investigated immediately. Any security patches or updates are carried out immediately. Also our data centre is market leading and we share knowledge with other centres regarding New identified potential threats. Any unusual activity or threats are quickly identified. Our policy of 24/7/365 monitoring has served us well over the years in quickly monitoring and identifying any risk factors no matter how minimal the potential treat is and our ability to act immediately in resolving.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We can identify potential compromises due to our 24/7/365 ongoing monitoring policy. Where a risk is identified it is recorded in the log and we immediately act and close that section of the solution immediately and make the required changes, updates and adjustments before re-activation. Over the last 5 years we have had zero instances but are still able to react within 15 mins as part of our protective monitoring policy.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a predefined process set up in accordance with ISO27001 stipulations whereby we maintain a detailed secure server log if all or any activity which is constantly updated,it's on a 24/7/365 basis.In addition solution users can report incidents/potential issues by email,phone, online chat or within own solution log. Any incident no matter the scale is logged and immediately acted on by the team.Updated reports can be downloaded direct from the solution log or these can be provided in various formats by our account management teams based on the data constantly recorded and updated.We operate a robust and secure policy.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£7995 per licence per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑