Intrado Solutions Ltd

BlueJeans Meetings Video as a Service

BlueJeans makes it easy to host high quality video meetings connecting many participants, using many different devices, supporting many combinations of business and consumer video endpoints. Hosted in the cloud, buyers can purchase and launch video conferences quickly and efficiently using this software.


  • Interoperability with Video Rooms, Desktops, Skype for Business, Jabber
  • Multi-Party Meetings - up to 100 participants online
  • Global Cloud Service - no need for installation
  • Mobile Devices Supported with iOS and Android Apps
  • Rich, HD Content and Application Sharing
  • Record Meetings to the Cloud and Distribute as needed
  • Meeting Security with SSL TLS Encryption
  • Command Center - real-tme and historical in-meeting metrics
  • Combine with Video Managed Services for Monitoring and Management
  • 24/7/365 Customer Support and Escalation Available


  • Connect to a wide range of endpoints, platforms and devices
  • Enable users with HD Video Conferencing without CAPEX investment
  • Flexibility - join meetings anywhere with no additional hardware
  • API and Extension Options - Outlook and Google integration
  • Collaborate Quicker with Application and Content Sharing
  • Redundant network design and scalable, distributed architecture
  • Comprehensive support services - 24/7/365 telephone support
  • Self Provision new accounts from the Administration Portal
  • Full Range of Use Cases Supported - Interviewing, Collaborating, Training


£17 per person per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

1 5 9 4 6 1 9 9 7 0 6 0 5 8 2


Intrado Solutions Ltd

Intrado Solutions Limited

0330 606 8 606

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints As a hosted service, planned maintenance may cause downtime outside business hours; these are communicated to customers.

Customers must configure access to service via appropriate ports.
System requirements
  • Licence or Concurrent Port Purchased
  • Desktop - Browser or WebRTC
  • Smartphone or Tablet access via Android or iOS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Tickets are assigned severity level and response times will vary depending upon these; response times remain the same at weekends. Customers can contact West via Supplier Portal or Phone;

We aim to respond to a P1 issue within ½ an hour.
We aim to respond to a P2 issue within 1 business hour.
We aim to respond to a P3 issue within 24 business hours.
We aim to respond to a P4 issue within 2 business days.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels West's customer service and technical support is available 24 hours a day, 7 days a week. Support can be accessed via phone or email.

West’s 24/7 live end user support desk delivers first line technical support. End users are provided with a single number which routes to our Help Desk to field/triage the query. The Help Desk escalates matters seamlessly to the appropriate West team for support and timely resolution.

Service Availability SLA is 99.5%

Customers may also have access to a designated BlueJeans Customer Success Manager subject to contractual commitment.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started West will provide access to user guides, getting started videos, and remote training sessions (recorded or live).
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Customer would request data extraction (company and end-user data, for example) during the offboarding process. This would be accomplished via your designated West Solution Manager.
End-of-contract process BlueJeans is a subscription service. Should the customer elect not to continue their subscription by giving the stated written notice, West will work with the customer to confirm a switch-off date and any data or materials the customer can reasonably expect such as end-user reporting. West can provide exit assistance as reasonably required and have a sample reversibility/exit plan that can be reviewed upon request.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No major differences - people can host or join video conferences, see content and control their experience
Service interface No
What users can and can't do using the API Wide variety of support is possible including Single Sign On support
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Service can be branded with logos, colours and watermark. Email invitations can also be branded. This is completed at the site level by site administrators.


Independence of resources BlueJeans is a convenient scalable enterprise video platform that can be easily increased by adding licenses or virtual ports as needed. Instead of committing large sums of money toward conferencing equipment, you can add access as your company grows.

Capacity is managed and monitored centrally with additional capacity added proactively as global access to the platform increases.


Service usage metrics Yes
Metrics types Deployment Dashboard. See status, utilization, geographic distribution, and end-of-meeting quality survey results at-a-glance.

Historical Reports. Meeting, endpoint, and network metrics for every conference.

Instant Access. Powered by the BlueJeans cloud, you get deployment-wide reports with nothing to install, configure, or maintain

ROI (return on investment) dashboard that estimates reductions in carbon emissions and travel expenses. By estimating the distances and likely travel methods between meeting participants, the dashboard calculates the miles, carbon emissions, and travel costs saved by conducting these meetings over BlueJeans
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold BlueJeans Network

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach FIPS-assured encryption
Other encryption
Secure containers, racks or cages
Physical access control
Assured by independent validation of assertion
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach By logging into Command Centre, users can export data on users, meetings and even per meeting metrics.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99.5%
Approach to resilience Backup, disaster recovery and resilience plan in place. Further information available under NDA.
Outage reporting Users or administrators can view status via

West can also sign customers up for service status alert emails.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Data is logically seperated
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach West is a reseller of BlueJeans.

The service is hosted in multiple ISO27001 certified top-tier co-location data centers around the world, and in each of these PoPs, dedicated cages and racks are protected with 24x7x365 security and multiple levels of biometric access controls. Access to the cages is restricted to BlueJeans Operations personnel.
Information security policies and processes West has in-place a organisation wide Information Security policy with written processes and procedures. Staff are trained both during onboarding and annually in key security concepts. The West IS policy has a senior member of the board named for responsibility.

BlueJeans also has a full written security policy and key procedures and processes. More can be read here;

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach As per the BlueJeans Control Policies and Risk Management policies, all changes to the service go through a change management process that includes notifying our customers in case of any significant change on the BlueJeans architecture.

The formal process includes assessment across departments for risk
Vulnerability management type Supplier-defined controls
Vulnerability management approach BlueJeans periodically scans for network, port, and application-level vulnerabilities. Vulnerability scans are conducted by a leading 3rd party SaaS provider, in addition to some special-purpose, in-house scanning tools. Furthermore, all of the 3rd party applications and operating system software is checked for security advisories and is patched periodically.

Routers, firewalls, load balancers, and proxy application servers are all configured to mitigate numerous types of DOS attacks. BlueJeans also engages with 3rd party consultants to perform penetration testing. All of their findings are reviewed and appropriate actions are then taken to address and mitigate vulnerabilities found in the service.
Protective monitoring type Supplier-defined controls
Protective monitoring approach BlueJeans employs a wide range of security management practices to provide a secure and reliable service to customers. This includes network firewalls throughout the infrastructure to create security zones for different applications and services. BlueJeans deploys proxy servers that terminate all 3rd party / customer traffic at a proxy layer. All web traffic passes through industry-leading load balancers to protect against a suite of application attack vectors.

Compromises are proactively worked by the BlueJeans InfoSec team and escalated based on severity level until completion.
Incident management type Supplier-defined controls
Incident management approach Incident management from end users is controlled via Phone or Email. End users can contact West with any incident as our NOC is manned 24/7/365. Incidents are assigned a severity level and prioritised for action. Customers are informed regularly via email and phone for status updates including ticket closure.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £17 per person per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial West would provide a range of fully enabled trial accounts on a limited basis, usually 2 weeks. Beyond this we offer paid Proof of Concept stages prior to any full deployment.

Service documents

Return to top ↑