Access the 2025 Professional Services Bid Management Report. Uncover the key trends and forecasts that will power bid teams this year →
Product

Platform

Product overview

Learn how Flowcase works


AI features

Discover our AI capabilities

Use cases


Manage resumes & case studies

Store and update employee and project data



Find winning teams & projects

Search across your entire firm with ease



Tailor content seamlessly

Customize content to meet client demands



Showcase with templates

1-click export resumes and case studies

Built for professional services

Integrations

Discover our native integrations and REST API


Data privacy & security

Improve data privacy with a trusted partner


Skill management system

Track your firm's skills and expertise with ease


Customizable interface

Customizable for firms of all shapes and sizes

Solutions

By industry

IT Consulting

Management Consulting

Engineering

Construction

Law
By role

Executives & Directors

Bid Managers

Marketing

Sales

IT & Systems

HR & Knowledge Management
Customers
Company


About us

Sustainability

Careers

Contact
Pricing
Resources


Blog

Whitepapers

Events

Webinars

Academy

Product updates

Templates
Featured resources

The Most Important Part of Your Proposals? Your People

Why Good Data is the Foundation for AI-Powered Bids and Proposals

CV Partner is now Flowcase


en

English
Norwegian
German
Swedish
Danish
Sign in
Book a demo

Acceptable use policy

Updated: 23th Feb 2023

‍

Use of the CV Partner Solution is subject to this Acceptable Use Policy.

Customer agrees not to, and not to allow third parties to use the Solution:

  • To use attributes in the Solution such profile image, name, gender or age as the basis to discriminate;
  • To violate, or encourage the violation of, the legal rights of others;
  • For any unlawful, invasive, infringing, defamatory or fraudulent purpose including Non-consensual Explicit Imagery (NCEI), violating intellectual property rights of others or phishing;
  • To distribute viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature;
  • To gain unauthorised access to, disrupt, or impair the use of the Solution;
  • To disable, interfere with or circumvent any aspect of the Solution, Software, or the equipment used to provide the Solution;
  • To generate, distribute, publish or facilitate unsolicited mass email, promotions, advertisements, or other solicitations (“spam”).

Schedule a demo

Experience the speed, ease, and limitless scalability of our platform

Book a demo

See it in action
Follow our latest news
Join 4,500 others who subscribe to our newsletter
Button

Button

product
Product overview
AI features
Manage
Find
Tailor
Showcase
Integrations
Data privacy & security
Skill management system
Customizable interface
solutions
IT Consulting
Executives & Directors
Management Consulting
Bid Managers
Marketing
Engineering
Construction
Sales
Law
IT & Systems
HR & Knowledge Management
Company
About us
Sustainability
Careers
Contact
Partnerships
Resources
Blog
Whitepapers
Events
Product updates
Templates
API Docs
Privacy Notice
Consent Preferences
Acceptable use policy
2012-2024 © Flowcase. All Rights Reserved.
Design and development by
stanvision logo white