Podcast Recording and Production Cloud Service

Innopsis provide a podcasting and production service to enable a person, or group of people to record an audio only podcast remotely and without special equipment. The resultant recordings are formatted and prepared for a podcast.

Additional services include music, hosting and publishing recordings to iTunes and other distribution points


  • Remote recording via an IP connection
  • No software to install
  • On demand service
  • High quality recordings
  • No time limit for recordings
  • Multi party recording. Each party is recorded individually
  • Diarised sessions
  • On site recording


  • Quick and cost effective way to broadcast messages
  • Create a community
  • Long self life of material
  • Flexible working. Record from anywhere
  • Full production capability
  • Full distribution capability


£50 to £500 per instance

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

1 3 6 1 5 5 4 7 8 0 8 5 3 1 4



Mike Thomas


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Users must have an internet connection of over 1.5Mbps and a suitable browser (Chrome), computer and headset.
System requirements
  • Chrome Browser for remote recording
  • Headset or microphone for remote recording
  • Suitable location for recording

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within four hours Monday to Friday.

Within 8 hours at Weekends and Bank Holidays
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We can provide an on-site recording engineer if required.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Yes. Support can be provided either via documentation, remotely or on-site.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The recordings and any supporting documentation is provided to the user at the end of the contact period.
End-of-contract process All data is returned to the customer. All services cease.

Using the service

Using the service
Web browser interface Yes
Supported browsers Chrome
Application to install No
Designed for use on mobile devices No
Service interface No
Customisation available No


Independence of resources The service has capacity to run many hundreds of simultaneous sessions.


Service usage metrics Yes
Metrics types If media hosting is provided, then the user will receive the volume of downloads weekly
Reporting types Regular reports


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data is not exported, but sent via email, removable media or via a cloud storage.
Data export formats Other
Other data export formats
  • WAV
  • MP3
  • AAC
Data import formats Other
Other data import formats
  • WAV
  • MP3

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability No SLA's are offered
Approach to resilience This information is available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Email address and password
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Risk Assessment and best practice
Information security policies and processes Internal governance

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Innopsis have a strict Change management control policy. The change process workflow can be summarised as follows:
• Change creation;
• Two Stage Change Approval (Quality / Technical);
• Identification of affected customers
• Customer notification.
• Implementation
Vulnerability management type Supplier-defined controls
Vulnerability management approach Innopsis receive threat information from a number of different sources including active monitoring of the innopsis service and infrastructure, along with regular vendor vulnerability updates and information provided by communities of interest.
Protective monitoring type Undisclosed
Protective monitoring approach Innopsis operate a monitoring process for it’s services which provides
potential security event information, Innopsis facilities are
manned 9 to 5, Monday to Friday and provide as near as possible real-time
response to security events with an escalation process as required.
Incident management type Undisclosed
Incident management approach Innopsis log all Incidents via tickets raised by telephone or email. Tickets are reviewed on a regular basis to identify Problems. Incident reports are provided to the reporting parties or published on the Innopsis web site

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £50 to £500 per instance
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Free 15 minute podcast as a trial for an initial trial

Service documents

Return to top ↑