VideoCentric Ltd

VideoCloud 365 ISDN Gateway

A simple cloud-based ISDN Gateway service. UK hosted with ISO27001 security. Enables ISDN systems to communicate seamlessly with SIP/H.323 systems.


  • Allow any H.320 ISDN-only to collaborate with IP-only SIP/H.323 system.
  • ISO27001, ISO22301, ISO14001 & ISO9001 certified datacentre
  • Entirely UK Hosted & supported service
  • Handles calls from 64kbps to 512kbps
  • Optional DDI number for direct calls
  • Managed & maintained by VideoCentric directly


  • Removes the need for ISDN lines
  • Enables major cost savings; 20% lower than standard ISDN lines
  • No outgoing per-minute billing
  • Invite other organisations using ISDN into your conference rooms
  • Receive calls from ordinary telephones, mobiles & audio conferencing systems


£104 to £319 per unit per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9


VideoCentric Ltd

Emily Shimell


Service scope

Service scope
Service constraints NA
System requirements Users must keep apps/software updated to ensure full compatibility

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Meaningful response within 1 hour
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels VideoCentric's award-winning support levels can include technical & telephone support & email support, interoperability testing, software patches, releases & upgrades from a highly accredited in-house technical team. Services can also include onsite escalation services, training, remote diagnosis and deployment services depending on any service wrap-around requirements (i.e. in room AV/endpoints/networking etc). All customers have a dedicated Account Manager and direct access to 1st, 2nd and 3rd line expert support, and assistance with any direct liaison required with vendors. Access to online resources for both IT administrators and end users and any available ongoing user adoption & onboarding support included. Reporting, ROI & analytics assistance can be added if required. Many of our cloud services do not require full maintenance programmes or relevant support is included within original service, though some services can be added as optional extras or included for related hardware. VideoCentric provide the UK's most comprehensive and flexible range of support programmes which can be tailored to meet individual needs, and can also be provided to enhance simple Manufacturer warranties & support levels. Pricing varies dependent upon tailored or chosen programme.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started VideoCentric provide an overview training session for IT administrators at the beginning of the service.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data for this service is not stored.
End-of-contract process At the end of the contract, organisations can decide to renew the contract, or terminate it. On termination, organisations will no longer be able to access the service.

Using the service

Using the service
Web browser interface No
Command line interface No


Scaling available No
Independence of resources The architecture of VC365 is made up of a highly available cluster call carry server nodes with in-build load balancing capabilities to ensure there’s both capacity and service continuity for customers.Our Network Operations team continually monitors the loading and utilization of the hardware, software and networking to ensure that sufficient capacity is available for our customers. Should the need arise an entirely new data-center can be brought online within hours to cater for increased load, geographic coverage or disaster recovery.
Usage notifications No


Infrastructure or application metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks All sensitive data & physical media is encrypted.
Data protection within supplier network Other
Other protection within supplier network All sensitive data & physical media is encrypted.

Availability and resilience

Availability and resilience
Guaranteed availability 99.9%SLO
Approach to resilience We utilise ARK data centres for our VC365 service. Our Data Centre setup includes load balancing, clustering and configuration to provide automatic failover, measures to reduce the likelihood of server failures, and intelligent direction and distribution of traffic. Our Data Centre is enabled with multiple dark fibre connectivity, 2N data centre main & backup power and infrastructure built to Tier 3 as standard. More information is available upon request.
Outage reporting Outages reported via email alerts.

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels Access to the service is given on a permissions basis, with specific named individuals in specific roles and job responsibilities having access to certain functions, which are managed fully by VideoCentric's Technical Director through role based authentication. Authentication and access tests are carried out on a regular basis to ensure security of the process.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Username or password
  • Other
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Data Centre accredited by BSI
ISO/IEC 27001 accreditation date 28/07/2016
What the ISO/IEC 27001 doesn’t cover The VC365 service is fully hosted and managed within the ISO 27001 data centre.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations
  • ISO 22301 Business Continuity
  • ISO 9001 Quality Management
  • ISO 14001 Environmental Management System
  • ISO 50001 Energy Management
  • ISO 22301 ARRM Statement of Capability & Conformance
  • PCI DSS Certified Compliance
  • HMG Official - Pan Government Accredited
  • HMG Secret/Top Secret Available
  • CAS(T) Comply fully & adhere with current HMG Regulations

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes VideoCentric is committed to a robust implementation of Information Security Management, and aims to ensure the appropriate confidentiality, integrity and availability of its data. Data Centre accredited to ISO 27001 . The management board ensure policies are firmly implemented, adhering to policies including Data Protection, Acceptable Use, Password & network , IT Vulnerability, and privacy, all accredited under ISO 9001 standard.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach VideoCentric operations team handles all infrastructure maintenance/network build-outs, which have a defined change management process. All changes to the system must follow the change management procedures which account for emergency and planned changes. Any emergency change is reviewed with a Root Cause Analysis performed and prevention methods identified to ensure that emergency change is not required in the future. Our change management procedure defines the process of requesting change, analysis, approval, development, implementation & reviewing a change request, alongside full documenting of change. Changes are fully assessed and approved by Technical & Managing Directors.
Vulnerability management type Supplier-defined controls
Vulnerability management approach VideoCentric's IT Security Officer owns the vulnerability process, ensuring it is implemented, scheduled and managed as designed. Our vulnerability management process scans, defines & implements mediating actions, and rescans the service to ensure vulnerability has been mitigated. The service is based upon a Pexip backbone, who provide our IT Security Officer with real-time security bulletins for the virtual software, where patches will be prioritised based on a severity. Our SO is also notified by our ISO 27001 data centre team, alongside ongoing in-house monitoring.
Protective monitoring type Supplier-defined controls
Protective monitoring approach A Protective Monitoring process is included within our information security policy, and aims to monitor and assess attacks and suspicious activity on our service. VideoCentric's Technical Director collects ongoing system logs and audit trails to analyse and assess access to the service to identify potential compromises, which are prioritised by extent, severity and duration of compromise, followed by corrective action & reporting. Regular internal security testing, monitoring and validation is run against environments, further security details can be provided upon request.
Incident management type Supplier-defined controls
Incident management approach If there is a suspected breach or known intrusion, our Security Incident Process is triggered, which defines methods for identifying, classifying, tracking, and responding to incidents that will impact business operations. The incident process is tested/utilised on a quarterly basis, customers are notified on the website prior to change, maintenance or as a result of outage/incident. More security policy information is available upon request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £104 to £319 per unit per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We can provide a trial of this VC365 service, and VideoCentric can also provide trial endpoints from all the leading Video Conferencing manufacturers for you to test in your meeting spaces, free of charge. Trials are flexible and longer trials and proof of concept trials can be utilised.


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑