Dynamics 365 Event Management - CoreGov

Core offers a flexible solution for organisations to manage events of any scale. Powered by Dynamics 365, the module can track and report on registrations and attendance, as well as facilitating management of resources including speakers and venues.


  • Delegate management
  • Full event and conference management functionality
  • Online registration portal
  • Delegate preference management
  • Event reporting and dashboards
  • Internal and external activity management
  • Management of speakers and other event personnel
  • Sponsor and exhibitor management


  • Real time campaign analytics and management dashboards
  • Can be integrated with ClickDimensions for marketing automation
  • Manage events alongside other customer related activities
  • Full audit history


£395 to £1695 per person per day

Service documents


G-Cloud 11

Service ID

7 9 0 3 6 4 8 5 0 6 3 3 5 7 7



Paul Saer

+44 (0) 207 626 0516

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Microsoft Dynamics 365 Online
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints No service constranints are known as this time.
System requirements
  • Processor - 1.9GHz x86- or x64-bit dual core processor
  • Memory - 2-GB RAM
  • Display - Super VGA with a resolution of 1024x768
  • Bandwidth greater than 1Megabit per second (125 KBps/Kilobyte per second)
  • Latency under 150 ms
  • Windows 10 - Internet Explorer 11, Microsoft Edge
  • Windows 8.1 - Internet Explorer 11
  • Windows 8 - IE10, Windows7 -IE10, IE12
  • Support for Mozilla Firefox, Google Chrome and Apple Safari

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times are dependent on the request raised. For Managed Services tickets, the response times for different request types are listed in the Service Description document.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels See rate card. Depending on chosen products and services.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Core have various plans available for training. Some training is face to face for Administrators but we have extensive user based online training for our SaaS offerings. User documentation is provided where required in electronic format.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats Microsoft Word (.doc)
End-of-contract data extraction Core provide a data extraction service for all of our customer data. 3rd party migration software will be used at an extra cost depending on where the data resides and the amount of data to offboard. Standard day rates apply for this service as per the Core rate card. All data is securely deleted to all government standards for OFFICIAL level data upon termination of service. We can provide data extracts from the platform as appropiate or we can off board virtual machinesn were applicaple. However licensing is not transferable and the client is responsible for ensuring they are compliant with Microsoft and any 3rd party licensing for software that may be running on any system we provide as an extraction request.
End-of-contract process The off-boarding high level process is as follow: • An authorised client representative formally notifies Core to terminate the service. • The date and time at which access to the service will be formally agreed. o All access to servers will cease at this time. o All networking components / VPN connections will be halted at this time. • All data requested to be extracted from the servers will be taken out after the access have been cut off. Data extraction fees are on a time and materials basis from the Core rate card. • Once all data extracts are complete all servers for the solution will be programmatically wiped from the IaaS backend including all backups, storage and recovery vaults. This process cannot be reversed once completed and data is permanently wiped and totally unrecoverable once removed. • Billing for the service will be calculated up to the point at which all servers and services have been wiped from the system and a final bill with usage breakdown will be issued.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Service supports different form and view layout for mobile and desktop if required.
Service interface No
What users can and can't do using the API The API supports all user functionality. A specific API for web portals can have additional security restrictions.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The majority of functionality is implemented using standard CRM customisations and therefore can be further customised by users.


Independence of resources Core monitor services for trending growth and add dynamic services as required. The nature of the design in Azure guarantees no impact to end users.


Service usage metrics Yes
Metrics types Infrastructure or application metrics
-HTTP request and response status
-Number of active instances

Other metrics
-Website availability
-Website loadtimes
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft, Quest Software, One Identity, Beezy, Nintex, K2.

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data using standard Dynamics tools including export to excel.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.95% Severity 1 Incident Response Time: 60 Mins Resolution Time: Continuous. 6% of the daily charges for the service month in which the incident occurred if company does not respond to and resolve 100% of the severity 1 Incidents within the resolution time within a service month Severity 2 Incident Response Time: 2 hours Resolution Time: Continuous unless customer ops out 4% of the daily charges for the service month in which the incident occurred if company does not respond to and resolve 100% of the Severity 2 Incidents within the Resolution time within a service month Severity 3 Incident Response Time: 4 hours Resolution Time: Continuous effort between hours of 9-5 2% of the daily charges for the service month in which the incident occurred if company does not respond to and resolve 100% of the Severity 3 Incidents within the Resolution time within a service month severity 4 Problem Response Time: 8 hours Resolution Time: Continuous effort between hours of 9-5 2% of the daily charges for the service month in which the incident occurred if company does not respond to and resolve 100% of the Severity 4 Incidents within the resolution time within a service month.
Approach to resilience Additional information on request but Core apply best practice Azure IaaS build specifications.
Outage reporting Service outages in Azure are publicly available by default. Instance outages and failovers are reported during an outage of any kind. This will be further reported against during the service review meetings.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels All support access channels are controls via privileged account management (PAM) with auditing.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QMS International Limted
ISO/IEC 27001 accreditation date 06/05/2016
What the ISO/IEC 27001 doesn’t cover None
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Core follow ISO27001 and ISACA COBIT 5 methodology for policy, process and framework. Other connected frameworks that make up our entire managed service and internal IT support service include ITIL, TOGAF and Prince2. These policies and processes also closely map to the UK Governments Cloud Security Principles. Our framework is managed directly through the CTO's office at Core where the role of DPO also resides for any GDPR compliancy.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Core has a robust and controlled change management process. Requests for change (RFC) are evaluated for the intended (and unintended) outcomes. A risk assessment is performed to understand the risk and impact to both the end user and the client entity. The risk of and the impact of failure is calculated as high, medium or low. The RFC requires three signatories (platform operations, platform security and service operations) for the change to be implemented. Services, components, and required changes are tracked through the service catalogue and change processes. The service lifetime is aligned to Microsofts product, technology and service lifecycle.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Core have Nessus Cloud and Microsoft System Centre Configuration Manager deployed across all servers and desktops. These products back each other up to provide up to date information on known vulnerabilities and patching requirements. We also use a variety of Microsoft licensed products (but this depends on our client purchasing and risk profiles. These include Cloud App Security, Advanced Threat Protection (Email and endpoint) and Azure Security Centre. Patches are applied as soon as we receive an alert (so within 24 hours of information dissemination).
Protective monitoring type Supplier-defined controls
Protective monitoring approach Compromises are identified instantly through DLP and Information Protection Policies. Security Incident response is dependent on whether the client wants to purchase this from Core but typically as soon as an event is triggered or observed. This will then be followed up in accordance with contract SLAs or OLAs.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Core run an ITIL compliant helpdesk and incident management approach. All calls can be made directly to our 24/7 ServiceDesk function. Reports will be generated by the incident team and delivered to the client via the service delivery manager.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £395 to £1695 per person per day
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑