Thrive CSR Limited

Applications, Donations & Grants Management Software

Software platform that enables administrators to more easily receive, review and manage applications for support. Can handle grants programmes; ‘in-kind’ donations of items or time; requests from staff etc.
The system will also handle communications with applicants as well as automatically collect project evaluations.


  • All applications received into one central system
  • Applicants can receive notifications on the progress of their application
  • Status of all applications can be seen from one dashboard
  • Multiple workflow statuses available e.g. pending, shortlist, committee review
  • Scoring system to assist review
  • Budget tracking
  • Output reports e.g. for Committee Review or for Accounts
  • Automatically follow up with recipients for project evaluations or feedback
  • All activity reporting in real time within your system


  • Reduce admin time by over 50%
  • User friendly and professional experience for applicants
  • Administrators easily have full visibility of all activity
  • Easy budget tracking
  • Easy auditing and governance
  • Get higher quality feedback and evaluations
  • Tailored reporting to meet your internal and external reporting requirements
  • GDPR compliant


£5000 to £25000 per unit per year

  • Education pricing available

Service documents


G-Cloud 11

Service ID

7 4 9 9 0 7 6 0 3 0 6 3 3 6 2


Thrive CSR Limited

Neil Macdonald


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
  • Access to internet
  • Modern internet browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Contractually within 1 business day. On average in the last rolling year the average response time has been less than 2 hours.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
No direct testing but we use off the shelf products for web chat that already have appropriate accessibility certifications.
Onsite support
Yes, at extra cost
Support levels
We provide standard support levels of all our customers, with the ability to vary these for special projects.

Our standard support is via our own UK based helpdesk who can assist with both technical and product based questions/problems. This helpdesk is available to all administrators of our system.

We also provide access to an account manager.
Support available to third parties

Onboarding and offboarding

Getting started
We work with the client to scope out exactly how our platform will be configured to their needs, have it set up and then provide onsite training and documentation as appropriate to ensure a smooth roll out.
Service documentation
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction
We help the client extract their data in a suitable CSV format.
End-of-contract process
We help the client extract their data and then securely delete their data. These two actions are included in our costs.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All parts of the system are accessible on both mobile and desktop. All public/staff facing parts of Thrive CSR have an additional level of mobile optimisation.
Service interface
Description of service interface
A full web interface
Accessibility standards
WCAG 2.1 A
Accessibility testing
We have clients who have staff using a variety of assistive technologies.
Customisation available
Description of customisation
Before the service is deployed we run a full scoping exercise with the client in order to understand what customisations, or configuration changes may be required. Almost anything in the platform can be customised to ensure it suits client needs.

Available configurations will carry no additional charges but any substantial bespoke customisation work will carry additional charges which will be outlined to the client in a proposal document.

Many ongoing core platform upgrades and expansions made by Thrive CSR are made available free of charge to existing clients. Any additional substantial bespoke customisations requested during the contract term will be chargeable.


Independence of resources
We have a scalable cloud based architecture and we upgrade capacity far in advance of maximum user utilization being reached.


Service usage metrics
Metrics types
Number of users of the system and the common actions they take. Our system allows full tracking of the public/staff facing and admin parts of the platform to deeply understand and audit how the product is being used.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
From within the administration interface.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We have a 99.9% uptime SLA. Users are refunded 50% of their fee in the last month if we fall below 99%, and 100% if we fall below 96%.
Approach to resilience
For security reasons this information is available on request - however as a guide, the resilient design of our architecture means we have never yet dropped below 99.9% uptime availability.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels are restricted by both technical and procedural enforced security, including infrastructure restrictions and privileged access management software.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We make ultimate security governance and compliance a board level responsibility yet at the same time we identify individual staff, at all levels, who are responsible for making security decisions and empower them to do so.

We look to clearly link our security activities to Thrive CSR's goals and priorities.

We have a corporate culture that ensures accountability for related decisions.

We work to ensure that feedback is provided to decision-makers on the impact of their choices.

We continously monitor our approach to make sure its fits our wider organisational approach to governance.
Information security policies and processes
Thrive follows current industry best practices with numerous technical and procedural security policies. As an option, we can provide a Service Manager, as a single point of contact for ensuring service quality, for service level reporting, for keeping the client up-to-date on new releases/upgrades etc.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Thrive tracks all key assets through their life cycle via a central register and when any key asset is changed, removed, or introduced Thrive has an established risk analysis process, which includes a security analysis of any key changes. Significant changes to Thrive's risk profile require director level sign off.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Thrive performs automated and manual quality assurance and security testing on every major release.

Vulnerabilities and potential threat intelligence is sourced from external news sources and relationships with key industry advisors.

Issues and vulnerabilities are tracked in Thrive task management system and addressed per priority.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have a detailed intrusion detection and monitoring system with 24/7 alerting in place.

We have an established incident response plan that involves employees at all levels of the organisation, including director level. At the heart of this is open and clear communication with our clients about verified incidents and resolutions.
Incident management type
Supplier-defined controls
Incident management approach
The process starts by educating staff how to report a breach or deal with a report from the outside. Once our incident response process is triggered by a breach report a designated team of senior management is convened who directly oversee the investigation and remediation of the breach. This includes alerting users (via phone or email as contractually defined) and government entities as appropriate. After this we have a structured postmortum and process improvement process.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£5000 to £25000 per unit per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑