Recruitive Ltd

Recruitive Ltd

Specialist provider of Cloud based Recruitment Software, e-recruitment solutions, off the shelf and bespoke build talent acquisition and candidate management systems. Applicant Tracking Solutions, Multi posting CV parsing capabilities. Latest award winning technologies to reduce your time and cost to hire whilst enhancing the candidate journey and streamlining processes.


  • Complete Recruitment Software Solution
  • Off the shelf or Bespoke build
  • Multi -Posting Capabilities to UK Job Boards and Social Media
  • Applicant Tracking System (ATS) with automatic response management
  • Candidate Management, Short Listing, Response Templates, SMS and Email Capabilities
  • CV Parsing Capabilities
  • Own Website Job Listings, candidate registration and Candidate Portal
  • Candidate Profiling and Search Capabilities
  • MI, Reports and Time to Hire, Response Ratios, Media Effectiveness
  • Intervies Booking System, Reference Checking and Full On Boarding Functionality


  • Reduce Time and Cost to Hire
  • Instant Management Reports
  • Nothing to download
  • Telephone based instant support
  • Utilise your own talent pool
  • Respond to all Candidates Quickly
  • Improves your candidates journey
  • Simple and easy to use


£7995 per licence per year

  • Education pricing available

Service documents

G-Cloud 11


Recruitive Ltd

Richard Clarke

0345 6000550

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints No
System requirements Annual user access licence

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Immediate support from dedicated and appointed client service handlers to your account.
We only employ the best and most experienced account handlers and technicians (for which you will have a direct contact
numbers for) who always immediately respond to your requirements. You will also have access to an ‘outside of business hours’ contact number in case of any emergency.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels Immediate support from dedicated and appointed client service/technical account handlers/Managers.
Service support within annual contract.
Technical account Manager and Cloud based support provided
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started An online demonstration will be provided and once we have a clear understanding of your exact requirements, a formal quotation will be emailed to you, when you are happy an E Sign Order Form would be sent for you to sign and date.Your account will be set up once payment has been made and on completion a Client Service Account Manager will be assigned. You will be provided with unlimited online training within your package and the Account Manager will arrange a schedule for all of your users. Your Account Manager will be on hand day to day to answer any queries yo may have.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We offer a secure data download service to the clients required formats (E.g. CSV files, API download, encrypted disk etc) to the approved authorised user of all data held within their solution.
End-of-contract process Within 30 days of the end if the contract term we writing outlining and inviting renewal terms for the following year. where clients enter into 2 to 5 year fixed terms we write outlining the continuation of terms within the terms of contract. All clients have appointed account directors who are in regular contact throughout the term of the contract period.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No differences
Service interface Yes
Description of service interface This can be arranged on request
Accessibility standards WCAG 2.1 AAA
Accessibility testing To ensure our technology is compatible with assistive technologies we carried out testing with people who routinely use the assistive technologies in their everyday life, rather than just our internal application development only.
Obviously, initial key testing including screen readers was carried out but moreover how different users would use the screen reader in relation to our technology was also a consideration. We take this seriously. For accessibility, users with impairments were asked to use the application to carry out the tasks, using their own assistive technology set up according to their own preferences, so we could ensure our technologies fully met the requirements.
To date we have carried out extensive testing both internally at our data centres and externally with users on site and remain proactive in delivering fully tested ahead of the curve solutions that support assistive technologies.
What users can and can't do using the API Where clients have existing recruitment software our API can facilitate the posting of job data to multiple sources.
We provide secure API access codes that clients can use to access the secure service. We also provide the API guide/ specifications. Users can configure the set up to enable the posting of job data to selected sources and the subsequent return of candidate application data back into their own solution. The API at this time is limited to just job posting and candidate response handling however we can expand the services depending on client requirements.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment No
Customisation available No


Independence of resources As a cloud based system, each user has a unique URL.


Service usage metrics Yes
Metrics types We can provide information a wide variety of metrics including candidate usage, job postings, user statistics, average time to hire and many more. If clients have additional requirements we are able to add these.
Reporting types Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach On termination of the contract in order to support clients in transferring data out of the solution we offer a secure data download service. This service delivers the data to the clients required formats (E.g. CSV files, API download, encrypted disk etc as requested) and is sent to the approved authorised user. Full support is included.
Data export formats
  • CSV
  • Other
Other data export formats
  • API
  • Encrypted Disk
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Please see attached Service Definition Document.

Recruitive commits to implementing the solutions in line with the
pre-agreed time schedule. If these are not adhered to Recruitive will compensate on terms agreed by both parties.
Approach to resilience We are ISO 27001 accredited operating to the highest standards, our data centre set up is totally resilient and further details including drawings of data centre architecture is available on request.
Outage reporting We have never sustained any outages with our solutions however we provide clients with a full activity log coupled with email alerts which are provided to protect as a further security measure.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Policy and password protection
Optional Two-Factor Authentication (2FA)
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QMS International
ISO/IEC 27001 accreditation date 22/02/2017
What the ISO/IEC 27001 doesn’t cover Anything other than the provision of cloud based recruitment software, e-recruitment solutions, off the self and bespoke build talent acquisition and candidate management systems, applicant tracking solutions, multi posting and cv parsing capabilities.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We operate full and detailed security governance policy (copy available on request). Data is stored separately for all clients and data based on not shared. This eliminates over-spill or data leakage risks. We also encrypt any critical data and have secured and set access procedures in line with ISO 27001 accreditation.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach We are ISO27001 accredited and adhere to a strict change management processes. We log every update and work on an agile basis where we test security impacts alongside our developments and adjustment changes before roll out. Every entry is recorded in the log and full details with ability to roll back maintained within our data center solutions in 10 year cycles. We also carry out ad hock security tests in line with our security governance policy.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach At our data centre we constantly assess potential threats to our services. We monitor continued service and any unusual activity is investigated immediately. Any security patches or updates are carried out immediately. Also our data centre is market leading and we share knowledge with other centres regarding New identified potential threats. Any unusual activity or threats are quickly identified. Our policy of 24/7/365 monitoring has served us well over the years in quickly monitoring and identifying any risk factors no matter how minimal the potential treat is and our ability to act immediately in resolving.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We can identify potential compromises due to our 24/7/365 ongoing monitoring policy. Where a risk is identified it is recorded in the log and we immediately act and close that section of the solution immediately and make the required changes, updates and adjustments before re-activation. Over the last 5 years we have had zero instances but are still able to react within 15 mins as part of our protective monitoring policy.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We have a predefined process set up in accordance with ISO27001 stipulations whereby we maintain a detailed secure server log if all or any activity which is constantly updated,it's on a 24/7/365 basis.In addition solution users can report incidents/potential issues by email,phone, online chat or within own solution log. Any incident no matter the scale is logged and immediately acted on by the team.Updated reports can be downloaded direct from the solution log or these can be provided in various formats by our account management teams based on the data constantly recorded and updated.We operate a robust and secure policy.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £7995 per licence per year
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑