You have sensitive project documents stored and managed across disparate systems
Eradicate the risks of disparate systems by using one secure, centralized platform.
Fill in your details and we'll be in touch.
The only purpose-built software trusted to run your large, complex, high-value procurements in New Zealand.
Eradicate the risks of disparate systems by using one secure, centralized platform.
Manage all stakeholder correspondence in one secure, centralized platform.
Respond to Q&As efficiently, consistently and transparently.
Protect sensitive documents by having document 'killswitch' and granular control.
Centralize all procurement processes and documentation in one secure hub.
Demonstrate fairness, transparency, and integrity every step of the way.
Capture all processes in one secure hub, backed by real-time audit trail.
Monitor real-time activity and understand bidder sentiment.
Automate and streamline traditionally manual tasks through smart workflows.
We've protected ambitious dealmakers and world-changers in over 180 countries, giving them progress with less stress in your organisations.
From preparation, to managing bidders' access, two-way Q&A, and the secure disclosure, submission, evaluation and award process of your project.

Automate processes and use granular access and permission settings to enable large number of users, documents and requirements with the relevant levels of confidentiality.
Get proof of disclosure records and comprehensive reports to prove project governance in a single click.
Track document views, searches, downloads and printing - both internal and external.

Two-way Q&A functionality keeps the entire process within the platform, with both sides able to ask and answer questions from a single role.
Answers are disclosed to a single party, or many parties - without revealing identities - and RFI workflows are automated to ensure compliance. Auditors receive a single source of information to review.

Track usage and take back documents whenever you like, even after they've been saved and downloaded. Protocols are verified in real-time, so revoking access is instant.
For an extra level of protection on your high priority, sensitive data, take advantage of print, save, edit and watermark restrictions.

Use the highly secure 'locked box' submission tool to enable controlled transmission of bidder submissions and workflows.
Handle these submissions securely within a single controlled environment, keeping bidders' identities, files and confidential questions completely segregated.

Inside the procurement process, perform redaction on documents while they remain secure inside the platform.
Maintain integrity of the audit trail and save multiple time-consuming steps, but most importantly, ensure that the bidder's sensitive IP contained in their submission stays protected.

Use the evaluation tool to enter the project's evaluation criteria and create reports that individual evaluators and teams will complete.
Only the evaluators and team leaders can see the submission information, with full visibility for administrators on progress made.
Once the evaluation phase is complete, create a full report extract to use for the award process.