BlueJeans Meetings Video as a Service
BlueJeans makes it easy to host high quality video meetings connecting many participants, using many different devices, supporting many combinations of business and consumer video endpoints. Hosted in the cloud, buyers can purchase and launch video conferences quickly and efficiently using this software.
- Interoperability with Video Rooms, Desktops, Skype for Business, Jabber
- Multi-Party Meetings - up to 100 participants online
- Global Cloud Service - no need for installation
- Mobile Devices Supported with iOS and Android Apps
- Rich, HD Content and Application Sharing
- Record Meetings to the Cloud and Distribute as needed
- Meeting Security with SSL TLS Encryption
- Command Center - real-tme and historical in-meeting metrics
- Combine with Video Managed Services for Monitoring and Management
- 24/7/365 Customer Support and Escalation Available
- Connect to a wide range of endpoints, platforms and devices
- Enable users with HD Video Conferencing without CAPEX investment
- Flexibility - join meetings anywhere with no additional hardware
- API and Extension Options - Outlook and Google integration
- Collaborate Quicker with Application and Content Sharing
- Redundant network design and scalable, distributed architecture
- Comprehensive support services - 24/7/365 telephone support
- Self Provision new accounts from the Administration Portal
- Full Range of Use Cases Supported - Interviewing, Collaborating, Training
£17 per person per month
- Education pricing available
- Free trial available
1 5 9 4 6 1 9 9 7 0 6 0 5 8 2
Intrado Solutions Ltd
Intrado Solutions Limited
0330 606 8 606
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
As a hosted service, planned maintenance may cause downtime outside business hours; these are communicated to customers.
Customers must configure access to service via appropriate ports.
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Tickets are assigned severity level and response times will vary depending upon these; response times remain the same at weekends. Customers can contact West via Supplier Portal or Phone;
We aim to respond to a P1 issue within ½ an hour.
We aim to respond to a P2 issue within 1 business hour.
We aim to respond to a P3 issue within 24 business hours.
We aim to respond to a P4 issue within 2 business days.
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
West's customer service and technical support is available 24 hours a day, 7 days a week. Support can be accessed via phone or email.
West’s 24/7 live end user support desk delivers first line technical support. End users are provided with a single number which routes to our Help Desk to field/triage the query. The Help Desk escalates matters seamlessly to the appropriate West team for support and timely resolution.
Service Availability SLA is 99.5%
Customers may also have access to a designated BlueJeans Customer Success Manager subject to contractual commitment.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||West will provide access to user guides, getting started videos, and remote training sessions (recorded or live).|
|End-of-contract data extraction||Customer would request data extraction (company and end-user data, for example) during the offboarding process. This would be accomplished via your designated West Solution Manager.|
|End-of-contract process||BlueJeans is a subscription service. Should the customer elect not to continue their subscription by giving the stated written notice, West will work with the customer to confirm a switch-off date and any data or materials the customer can reasonably expect such as end-user reporting. West can provide exit assistance as reasonably required and have a sample reversibility/exit plan that can be reviewed upon request.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||No major differences - people can host or join video conferences, see content and control their experience|
|What users can and can't do using the API||
Wide variety of support is possible including Single Sign On support
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||Service can be branded with logos, colours and watermark. Email invitations can also be branded. This is completed at the site level by site administrators.|
|Independence of resources||
BlueJeans is a convenient scalable enterprise video platform that can be easily increased by adding licenses or virtual ports as needed. Instead of committing large sums of money toward conferencing equipment, you can add access as your company grows.
Capacity is managed and monitored centrally with additional capacity added proactively as global access to the platform increases.
|Service usage metrics||Yes|
Deployment Dashboard. See status, utilization, geographic distribution, and end-of-meeting quality survey results at-a-glance.
Historical Reports. Meeting, endpoint, and network metrics for every conference.
Instant Access. Powered by the BlueJeans cloud, you get deployment-wide reports with nothing to install, configure, or maintain
ROI (return on investment) dashboard that estimates reductions in carbon emissions and travel expenses. By estimating the distances and likely travel methods between meeting participants, the dashboard calculates the miles, carbon emissions, and travel costs saved by conducting these meetings over BlueJeans
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||BlueJeans Network|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Other data at rest protection approach||
Secure containers, racks or cages
Physical access control
Assured by independent validation of assertion
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||By logging into Command Centre, users can export data on users, meetings and even per meeting metrics.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Approach to resilience||Backup, disaster recovery and resilience plan in place. Further information available under NDA.|
Users or administrators can view status via http://status.bluejeans.com/
West can also sign customers up for service status alert emails.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Data is logically seperated|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
West is a reseller of BlueJeans.
The service is hosted in multiple ISO27001 certified top-tier co-location data centers around the world, and in each of these PoPs, dedicated cages and racks are protected with 24x7x365 security and multiple levels of biometric access controls. Access to the cages is restricted to BlueJeans Operations personnel.
|Information security policies and processes||
West has in-place a organisation wide Information Security policy with written processes and procedures. Staff are trained both during onboarding and annually in key security concepts. The West IS policy has a senior member of the board named for responsibility.
BlueJeans also has a full written security policy and key procedures and processes. More can be read here; https://www.bluejeans.com/sites/default/files/pdf/Blue-Jeans-Network-Security.pdf
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
As per the BlueJeans Control Policies and Risk Management policies, all changes to the service go through a change management process that includes notifying our customers in case of any significant change on the BlueJeans architecture.
The formal process includes assessment across departments for risk
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
BlueJeans periodically scans for network, port, and application-level vulnerabilities. Vulnerability scans are conducted by a leading 3rd party SaaS provider, in addition to some special-purpose, in-house scanning tools. Furthermore, all of the 3rd party applications and operating system software is checked for security advisories and is patched periodically.
Routers, firewalls, load balancers, and proxy application servers are all configured to mitigate numerous types of DOS attacks. BlueJeans also engages with 3rd party consultants to perform penetration testing. All of their findings are reviewed and appropriate actions are then taken to address and mitigate vulnerabilities found in the service.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
BlueJeans employs a wide range of security management practices to provide a secure and reliable service to customers. This includes network firewalls throughout the infrastructure to create security zones for different applications and services. BlueJeans deploys proxy servers that terminate all 3rd party / customer traffic at a proxy layer. All web traffic passes through industry-leading load balancers to protect against a suite of application attack vectors.
Compromises are proactively worked by the BlueJeans InfoSec team and escalated based on severity level until completion.
|Incident management type||Supplier-defined controls|
|Incident management approach||Incident management from end users is controlled via Phone or Email. End users can contact West with any incident as our NOC is manned 24/7/365. Incidents are assigned a severity level and prioritised for action. Customers are informed regularly via email and phone for status updates including ticket closure.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£17 per person per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||West would provide a range of fully enabled trial accounts on a limited basis, usually 2 weeks. Beyond this we offer paid Proof of Concept stages prior to any full deployment.|