Webex Meetings
The Redcentric Webex conferencing service is a hosted, fully managed state of the art solution which provides high-quality video/voice conferencing and collaboration services. The service can be accessed via a range of endpoints from desktop PC's, laptops, mobile devices and room kits, for a fully immersive real-time experience,
Features
- Secure, reliable, easy to use cloud-based service
- Simple, modern video meetings service with easy schedule and join
- Supports mobile, desktop, Cisco room devices and third-party video devices.
- Integration with Microsoft Office Applications.
- Predictable fixed costs
Benefits
- Manage meeting functions easily via secure management portal
- No need to invest and manage expensive video infrastructure
- Video equipment offerings for all room sizes
- Improve your company engagement with suppliers and partners
- Record meetings so others can get up to speed later.
Pricing
£26.63 a user a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
1 6 4 9 1 8 9 1 8 5 7 9 9 6 8
Contact
Redcentric Solutions Limited
Emma Banner
Telephone: 0800 983 2522
Email: tenders@redcentricplc.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Redcentric's Broadsoft IPT & HCS services
- Cloud deployment model
- Public cloud
- Service constraints
- The underlying Cloud platform is subject to regular maintenance releases to ensure that the service maintains the highest levels of security and availability.
- System requirements
-
- Network Connectivity: Internet, or Private Network.
- LAN: Standards-based Power over Ethernet (PoE) to power connected devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to acknowledge all Advice and Guidance requested within 15 minutes. Response times will depend on the request type and level of detail required. We typically aim to provide an initial response within 1 hour of the request being made however this can vary dependent on the nature of the request.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Redcentric’s customer service operation is available 24/7 and can be contacted by telephone, email or via the customer portal. Support is included at no additional cost with Redcentric's services. Redcentric has one direct point of contact for customer support, which deals with all aspects of the service. The Redcentric customer services team takes full responsibility for supporting and logging problems and technical support queries. Their specific role is to ensure that all telephone, email and portal queries are answered and resolved as promptly as possible. Redcentric has a team of Service Delivery Managers and Cloud Support Engineers available. These teams are not included as a standard service and are charged based on the published SFIA rate card.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Redcentric provides an Administrator training is provided either remotely via a Webex session or if required at the customer premise. The training session will be recorded and provided to the customer for future reference.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The Exit Plan shall, unless otherwise agreed with the Customer: • address each of the issues set out in this Exit Plan in order to assist the Customer in facilitating the transition of the Redcentric Services from Redcentric to a replacement supplier, or the Customer ensuring to the extent reasonably possible that there is no disruption in the supply of Services and that there is no deterioration in the quality of delivery of the Services during any period of transitional assistance; • provide an estimate of the scope of transitional assistance that may be required by the Customer and suggest how such assistance might be provided (if required); and • provide an estimate of Redcentric’s personnel that may be required to provide transitional assistance and suggest the management structure to be put in place and employed to provide such transitional assistance. AGREEMENT TERMINATION On termination or expiry of the Service Agreement, the Customer must undertake the following responsibilities: • agree a time and date for the Redcentric owned equipment to be removed, and then • remove the Customer’s equipment at the agreed time on the agreed date in a sequence to be specified by the Customer
- End-of-contract process
- Where the Customer requests the provision of additional transitional assistance, in addition to their initial requirements, Redcentric shall provide such assistance as an additional service. The additional transitional assistance shall be chargeable at the Redcentric prevailing time and materials consultancy day rates.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is a standardised look and feel across devices.
- Service interface
- Yes
- Description of service interface
- The Webex meeting service provides users with the ability to launch a meeting directly from a browser, desktop/mobile app, or video device. The meeting service delivers exceptional audio, video, and content sharing, including digital whiteboards. There are no downloads or plug-ins. Just one simple click to join your meeting.
- Accessibility standards
- None or don’t know
- Description of accessibility
- All Redcentric documentation is released on open source format (PDF) and is compatible with most major accessibility hardware and readers.
- Accessibility testing
- None.
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Cisco deploys a globally distributed dedicated network of high-speed meeting switches. Meeting session data originating from the presenter’s computer and arriving at the attendees’ computers is switched, never persistently stored, through the Cisco Webex Cloud.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Cisco
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Via the Admin portal with secure logins.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
99.5% Availability. Any reduced charges under this Service Level Agreement will be confirmed by credit note issued by Redcentric to our customers, confirming the adjustment to be made to the following monthly charge. The availability Service Level is calculated at the end of each measurement Period and is calculated as follows: Percentage Availability = ((MP-SU)x100)/MP Where: MP = Measurement Period. This is the total number of minutes in the measurement period. SU = Service Unavailability. This is the total number of minutes in the measurement period when the Service is not available for use by the Customer for reasons other than those set out below:
Time associated with scheduled maintenance intervals.
Factors outside of Cisco’s control or outside the scope of the Webex Service,
Issues with external integrations (including those created using Cisco APIs), or related to third-party software or services specific to a
customer;
Delays with posting, inline viewing, downloading or sharing of files;
Performance degradation with certain features, such as search or report generation; or As to Webex Calling, any Downtime caused by the Customer’s PSTN provider.
In calculating Availability, there are no further exclusions above and beyond the exclusions listed in clause [5.7] of the General Terms. - Approach to resilience
-
The Cisco Webex Cloud is a communications infrastructure purpose-built for real-time web communications.
Webex meeting sessions use switching equipment located in multiple data centers around the world. These data centers are strategically placed near major Internet access points and use dedicated high-bandwidth fiber to route traffic around the globe. Cisco operates the entire infrastructure within the Cisco Webex Cloud. Data within the
United States stays within the U.S. region, and data within Europe remains in the European region.
Additionally, Cisco operates network point-of-presence (PoP) locations that facilitate backbone connections, Internet peering, global site backup, and caching technologies used to enhance end-user performance and availability. Cisco personnel are available 24 hours a day, seven days a week, for logistical security, operational, and change management support. - Outage reporting
- During a system outage Redcentric will communicate with our customers via email, updates are also provided via the Redcentric customer portal. The Service Manager will also provide a detailed report following any outage showing the cause of the outage and what mitigation has been put in place to prevent the issue repeating in the future.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
Cisco supports federated authentication for user single sign-on (SSO) using Security Assertion Markup Language
(SAML) 1.1 and 2.0 and the WS-Federation 1.0 protocol. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Standards Institute
- ISO/IEC 27001 accreditation date
- 19/08/2023
- What the ISO/IEC 27001 doesn’t cover
- Hosting in external 3rd parties needs to be brought into scope on a per basis. This is a chargeable extra.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Gemserv Ltd
- PCI DSS accreditation date
- 02/04/2020
- What the PCI DSS doesn’t cover
- Requirement 1, 2, 3, 4, 5, 6, 7, 8, 10, 11. Appendix A1, A2
- Other security certifications
- Yes
- Any other security certifications
-
- Authorised to process HM Government data marked 'Official-Sensitive'
- HSCN CN-SP Network provider
- Certified ISO9001: 2015 - Quality Management Standard
- Certified ISO22301: 2012 - Business Continuity Standard
- Authorised to process and store Person Identifiable Data (PID)
- Certified ISO14001: 2014 - Environmental Management Standard
- Certified ISO20000-1: 2011 - IT Service Management Standard
- PSN accredited for the provision of Infrastructure as a Service
- Information Governance Statement of Compliance (IGSoC)
- Data Security and Protection Toolkit Compliant
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- As a managed service provider that the delivers services into different vertical sectors (central government, NHS, legal, finance, manufacturing and so on), we take several measures to secure these assets. This requires work to implement, manage and be audited against a number of recognised security standards and frameworks. This benefits all our customers and also provides a recognised and repeatable methodology for delivering services to a higher security level, where required, for specific customer environments. Redcentric’s policy is to deploy individual customers using physical and logical segmentation appropriate to the client’s operational requirements. Segmentation techniques and technologies including MPLS IP-VPN security, firewalls and VLAN technology are used to ensure a high level of security. Testing is typically done at a service provider level so as to not impact specific customer deployments. It is the responsibility of Redcentric to provide an assured managed service infrastructure to deploy client services over. Whilst some aspects of security can be abdicated to the client’s service provider Redcentric recommend that customers perform their own assurance testing within the context of their business setting and context. Redcentric will always co-operate with customers around any testing activities and subsequent outcomes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Redcentric maintains an ISO 27001 audited configuration and change management process for customer hosting infrastructure. Initial customer hosting deployments are initially configured by a combination of automated provisioning tools and expert system administrators. Newly deployed infrastructure is subject to a peer review prior to being put live. Customer change management is performed according to Redcentric internal ticketing processes and workflows, providing customers with the ability to request and plan changes by Redcentric system administrators, authorisation mechanisms and visibility of work performed on their hosting environment.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Redcentric proactively manages vulnerabilities within the corporate infrastructure and all infrastructure connected to or participating within 3rd party external networks such as the healthcare network, the public internet and other corporate or partner networks or customer hosting domains. Redcentric conducts quarterly or as required automated in-depth vulnerability scans of critical internal infrastructure including administrative and orchestration systems, underlying customer host servers, backup infrastructure, edge and intermediate firewalls and load balancers using Nessus. These scans are automatically parsed by our internal configuration and change management system and items requiring investigation escalated directly to DevOps.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Redcentric can provides a range of protective monitoring services including vulnerability management and auditing and assessment services (such as SIEM). Redcentric will work with the customer to put in place an approach to Proactive Monitoring which meets the requirements of the customer.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Redcentric maintains a formal incident management process for internal and customer-impacting incidents that includes triage, containment and remediation and root cause analysis. Roles are defined to provide responsibility for overall command, communications and technical authority. Workflows and related information are managed by our centralised internal ticketing system. Redcentric will inform customers of any security incident that directly impacts on their hosting solution in a timely manner once detected. Redcentric defines a customer impacting security incident as a security-related problem which may have actively impacted on the confidentiality, integrity or availability of more than one customer.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £26.63 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- No