Wired Plus Ltd

Wired Plus

We are a full service marketing automation platform and agency. We have created Automation Marketing Software backed up with a team of marketing experts focussed on one key principle: make better, confident marketing decisions, based on real data, emails, landing pages, surveys, lead scoring and web tracking.


  • real time email and website analytics reporting
  • enterprise email marketing (ESP) platform
  • creative email solutions - email template design and managed services
  • lifecycle and behavioural email marketing automation suite
  • creation of dynamic and customisable landing pages
  • surveys and forms tool to measure responses of survey answers
  • data segmentation and data management tools
  • API interlinking into CRM and ERP systems
  • Lead generation and brand awareness campaign email marketing tools
  • secure remote login into UK based SAAS system


  • creation and sending of email marketing campaigns
  • real time visibility on interaction with your marketing content
  • tracking of legal marketing requirements for example unsubscribes
  • track survey results with graphical reports and data insight
  • drag and drop to create automation, templates and landing pages
  • online SAAS system accessing marketing and data on the move
  • full account management and UK based support
  • API integrations allow you to easily manage your data
  • lead scoring to monitor most engaged members of audience


£45 to £399 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@wiredplus.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 6 8 6 8 1 4 8 6 6 0 8 4 7 8


Wired Plus Ltd Lewis Sellers
Telephone: 0845 463 5516
Email: hello@wiredplus.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The email and marketing automation platform can also tie into other systems via an API integration: Systems include CRMs and ERP solutions such as Salesforce, Microsoft Dynamics and Magento. Custom integrations also available.
Cloud deployment model
Private cloud
Service constraints
No as long as the buyer has access to an internet connection and latest browser versions there are no restrictions or limitations.
System requirements
  • Active Wired Plus System License
  • Latest Web Browser with Internet Connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
Questions are answered within 4 hours and may be escalated if further investigation is required.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users must click to open the web chat function where they can then type and tab to send and receive messages.
Web chat accessibility testing
The web chat function has undergone testing by regular Wired platform users quarterly and specific third party UI testers.
Onsite support
Yes, at extra cost
Support levels
With all clients we provide phone, email and support desk support 24/7 for urgent or emergency issues. We also provide full account management and general support 8.30am to 5pm Monday to Friday. This is as standard.
For larger clients looking for full dedicated account management and onsite support and strategic advice at an extra cost should this be required.
Support available to third parties

Onboarding and offboarding

Getting started
With all users there is an option of online training completed via a screenshare system compatible with departments IT restrictions or onsite training. This training covers the full system including features, functions, data management, and marketing strategy suggestions. We also provide an option for onsite training at the clients offices or the client can come to our offices should they wish. The training is undertaken by a trained member of staff in our training team and can be done to the whole team at the same time or to individuals one at a time dependent on the client requirements. There is also a full help and knowledge base within the system that is fully documented with screenshots and account managers and support team are there to help at any point any questions arise after the training.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users with authorised data export permissions can export the data at any point in the system should they require. When the contract ends we undertake a full export and off-boarding process to make sure the client has all data and marketing assets accessible.
End-of-contract process
All clients are required to give notice of their cancellation 30 days before the end of the contract. An account manager then works with the client to export sensitive data from the platform in a usable format, including any contact data.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
There are no differences in functionality between the two platforms. Images will resize on mobile devices, and page layouts will adjust the structure based on the device, for example any content in the right column will stack under content in the left column.
Service interface
Description of service interface
Wired Plus is accessed via the browser through a log in page.
Accessibility standards
None or don’t know
Description of accessibility
Users cannot currently change the colour or font on the webpage, but can zoom in using the browser settings to increase the font and image sizes.
Accessibility testing
Quarterly UI testing and assessments with selected clients and specific third party UI testers.
What users can and can't do using the API
The API code library can be viewed online at http://api.wiredplus.com/ . A user can create a secure connection with username and password to connect to Wired in the software platform itself. Guidance is and will be provided on doing this either in the help area or via an account manager. The API code is controlled by the client so changes and restrictions can be made at any point.
The API can be written in REST API. API usage is limited to 1000 calls per hour, and requires the creation of an API user. You can create API users by logging into your account and going to the Settings area. Please note that these APIs always use UTC dates and times.
There are no other limitations and full support will be provided to assist clients with the integration.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
The Core Platform / software system cannot be customised but can be white labelled. The system also allows for full customisation of email templates, landing pages, surveys and any other marketing assets or data.
This is generally done via a drag and drop editor which allows for quick adjustments. Alternatively, if the client wishes too they can access the source code to make adjustments to the marketing assets should they wish.


Independence of resources
We use secure data centers within the UK or EU. All hold a broad set of industry standard accreditations such as ISO27001 and ISO9001. Our data centers are connected to the internet with redundant internet links and bandwidth can be easily upgraded on requirement. There is redundancy at every component and service level, as well as spare capacity and we can scale our servers on demand. Therefore we can run for prolonged periods even after experiencing major component failures. We make use of leading cloud providers and content distribution networks to host our email images.


Service usage metrics
Metrics types
There are a number of usage metrics available within the system related to both actual user metrics as well as marketing campaign metrics. User metrics are service usage based as well as user auditing for security which can be provided on request. With the marketing usage metrics this will provide a breakdown of all campaign and data held within the system and campaigns sent out including delivery rates, open and click through rates, suppressions and social / website activity to name a few. This can all be viewed via the platform and via API calls.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export their data through a number of routes in the system. They login and then can go to the contacts, reports, surveys or template areas and simply select export all or the selected data / reports they wish to download. This will then provide them with a CSV file of the data locally (this process assumes the user has been given permission to export).
Data export formats
Data import formats
Other data import formats
  • HTML
  • CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
We use UKFast for our server configuration and data management and UKFast fully owns and manages its networks as a managed service to all clients. UKFast provides network segregation through dedicated firewalling for our service.
Data protection within supplier network
Other protection within supplier network
UKFast provide Cisco ASA firewalls for our service which ensure only connection to devices from listed IP’s over listed ports. Data on servers have protection such as web application firewalls, anti-DDoS, SSL’s on behalf of Comodo, IDS/IPS.

Availability and resilience

Guaranteed availability
We have a 100% guarantee SLA in place for the network infrastructure including routers, switches and cabling. Because each circuit in every regional POP is connected to a different router, we guarantee continuous service, even in the event of a total loss of a router and/or circuit.
Each POP has a redundant uninterruptable power supply system, so should either UPS fail or be taken out of service for maintenance, the connection remains unaffected ensuring maximum network performance and reliability. We guarantee that when not undergoing scheduled maintenance, the network infrastructure is available 100% of the time. In the event of an unplanned network failure, we'll refund 24 hours' service for every 60 minutes of lost connection - up to a maximum value equal to your monthly subscription charge.
Approach to resilience
Wired uses N+1 configuration on all management infrastructure. Our infrastructure is protected by firewalls and all management access requires two-factor authentication. Virus scan technology is implemented throughout our infrastructure. We commission annual independent third party security assessments. An ongoing vulnerability scanning and management program is in place. Machines are built from approved hardened images, and verified in third party security assessments. A monthly patching cycle is in place to ensure the latest security updates have been applied. We have restore points for critical data and these are taken every 5 minutes. Backup data is securely kept at same geographic regions, yet sufficiently distant to ensure data is not lost in the event of a disaster, whilst complying with local data protection regulation. We employ skilled information security and data privacy specialists in our team to ensure security is always a priority. EU Model Contracts are in place, as well as subcontractors processing data. Role based permissions are used to control staff access to systems and data. Management access to infrastructure is tightly controlled, and employs multi-factor authentication protection. Intrusion Detection Technology is in place.
Outage reporting
• a public dashboard • an API • email alerts • account manager call and email to the client. We also provide a scheduled maintenance calendar of upcoming planned improvements affecting the platform.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Dedicated employees have access to management portals and support channels based on their management clearance. Portals and support channels require a username and password access that are changed every 90 days.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
24 June 2019
What the ISO/IEC 27001 doesn’t cover
The scope of the approval is applicable to: Provision of hosting services, the consultation, design, implementation, proactive maintenance and support of bespoke client managed services and all supporting business processes provided from UKFast Manchester Head Office and data centres.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Wired Plus has the Cyber Essentials accreditation. our server infrastructure provider also has ISO 27018.
Information security policies and processes
All employees must sign an NDA ensuring there is no misuse of internal or client data. We abide by the following policies: data protection, Subject access request, right to be forgotten, data deletion requests, password protection, internal email policies, clean desk, internet usage, removable media and risk assessment and are GDPR compliant. The management team are responsible for enforcing, training and testing employees on these areas, and spot checks are completed to ensure compliance. Additional training is given annually and upon request to employees who would require it.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Dedicated change management system that must be approved by senior technical manager. Four stages are used during the change control process once an Originator raises a request: an Evaluator assesses the issue including reporting issues, new developments or enhancements, who then passes the work to the management team. The team complete the work and notifies any other affected parties and passes the project to the Verifier. This team then performs steps including security checks, and passes the project to the Modifier who installs the changes and updates traceability information and updates the originator and project manager.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Wired have a vulnerability management program for all infrastructure. Our infrastructure providers also follow PCI DSS & ISO 27001. Workers who discover a weakness or vulnerability in the security measures must not discuss this with anyone other than Information Security Manager. Wired acknowledge receipt of reported vulnerabilities with its products or services within seven days. We provide a response to the reporting party within ten days from the time the report was received. We also endeavour to contact the reporting party every seven days while a patch or fix is being developed, and to resolve the vulnerability within thirty days.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Threat monitoring IDS tool that provides protecting monitoring and file integrity monitoring across all infrastructure. Alerts are generated when known malicious or unwanted software attempts to install itself or run on the system. When malware is detected, we automatically respond to delete or quarantine malicious files and clean up malicious registry entries. We also have a DDoS system as part of the continuous monitoring and penetration-testing processes, which uses standard detection and mitigation techniques such as SYN cookies, rate limiting, and connection limits to protect against DDoS attacks.
Incident management type
Supplier-defined controls
Incident management approach
In order to facilitate a recovery regardless of type or duration of disaster, we implemented multiple recovery strategies. These strategies are categorised into three levels, designed to provide a recovery solution matched to the duration of the emergency condition. You will be notified by the account management team of a confirmed incident, and clients can securely report incidents to their account manager who will escalate this to a security team member. The security team produce monthly report and this includes such things as number of incidents/investigations, patches and anti-virus coverage compliance.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£45 to £399 a licence a month
Discount for educational organisations
Free trial available
Description of free trial
The Free trial version lasts 14 days and provides access to the full platform. The only restriction is that during the trial you are limited to 200 free email sends.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@wiredplus.com. Tell them what format you need. It will help if you say what assistive technology you use.