4net Technologies Ltd

4net Hosted Video Conferencing

4net offers cloud-based, high quality, secure, video conferencing services engineered to extend video collaboration beyond the boundaries of specialised conference systems. We provide a system agnostic approach which enables interoperability with many standard based video endpoints.


  • Conferences arranged by sending out simple email invitations
  • Always on, always available service
  • Video quality adjusteds based on bandwidth available.
  • WebRTC can be supported, allowing video within a web browser
  • Conference recording and playback
  • External, IP based video room systems can join conferences.
  • Collaboration & Data Sharing Capability
  • Audio only service is available for mobile users
  • Services delivered from secure ISO27001 accredited data centres
  • PC, laptop, tablet devices, mobile compatible service


  • Flexible priced Video Conferencing as a Services (VCaaS)
  • Increase productivity with reduced costs and travel time
  • Collaborate anywhere, anytime on a wide range of devices
  • Scaleable for two users to many hundreds
  • No specialist support required once set-up
  • Integrates with leading business applications
  • Enhansed meeting experience
  • Intuitive and easy to access user interface
  • Application can be embedded in business platforms
  • Pre-deployment design, planning and on-boarding


£20.00 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector@fournet.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 8 3 2 1 1 1 0 6 4 3 8 1 4 6


4net Technologies Ltd Public Sector Team
Telephone: 0845 0556366
Email: publicsector@fournet.co.uk

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
There are no constraints relating to the 4net cloud solution which buyers should be aware of.
System requirements
  • A PC/Laptop/Mac which supports the defined web browser(s)
  • Mobile device - iOS or Android device
  • High speed Internet connection or MPLS link to 4net cloud
  • Handset or headset

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times vary based upon request. Please see support SLAs for response times
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
4net will provide 2nd line support to our customers for this service. 1st line support will be provided by the customer ICT helpdesk so no contact will be from end users to the 4net Service Desk. All support will be provided remotely with onsite support available at an additional charge.

Please see the 4net service definition document which outlines the support levels and associated costs with these levels.

4net will provide a technical account manager to the customer upon request.
Support available to third parties

Onboarding and offboarding

Getting started
4net provide options for onsite / remote training and user documentation to start using the service.
Service documentation
Documentation formats
End-of-contract data extraction
4net provide an excel export of the user data held in the system at the end of the contract.
End-of-contract process
4net will provide an export of the users configured on the system in an excel format. This is included in the contract.
Should the customer require a transition manager and additional support when moving away from the service then this would be charged on a daily rate of £750 per day. The total cost would be agreed with the customer once they have confirmed what level of support is required from 4net and the time required to transition to the new provider from the 4net cloud service.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
There are no differences between the desktop client and mobile app (android & ios).
Service interface
Customisation available
Description of customisation
4net create a dedicated instance of the cloud service for every customer. So every solution is bespoke to their requirements in terms of configuration, integrations, user profiles and how the solution is deployed e.g. private cloud, hybrid or public cloud.


Independence of resources
4net create a dedicated instance of the cloud solution for each customer. So there are no shared resources between the customers of the service so as the user base grows this wont impact on existing users of the service.


Service usage metrics


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Avaya plus other world class vendors

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
4net would export data from the system on their behalf and provide in an appropriate format.
Data export formats
Data import formats
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
4net provide 99.99% availability on core applications when implemented within a single data centre build. Where a customer takes a geo-resilient build we provide 99.999% availability. Where 4net extend private WAN networking out to our customers we offer a 6 hour SLA on Ethernet bearers (fibre and EFM), and 8 hour SLA on broadband (FTTC / DSL) circuits.
Approach to resilience
The resilience of our cloud solution is available upon request.
Outage reporting
Should an outage occur within the platform notifications are automatically sent to the 4net service desk team. Depending upon the severity of the outage then customers will be alerted appropriately via email.

Identity and authentication

User authentication needed
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
4net will manage a list of authorized users who can log support tickets / request changes to the cloud service. Each authorized user will have access to the 4net Service Desk portal where tickets can be logged / updated / closed by the customer. Access to the Service Desk is provided via a secure log-in with no shared log-ins allowed. All requests are tracked by 4net and requests by non authorized individuals over the phone or email would be passed to the customers primary contact for authorization.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Less than 1 month
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
QMS International Ltd
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
4net’s security governance includes –
• All security activities are linked to 4net's goals, business priorities as well as areas such as health & safety and financial governance.
• Director sponsorship and senior management ownership of security governance
• Accountability / empowering individuals at all levels for making decisions
• Internal feedback provided to decision makers regarding impact of their choices
Information security policies and processes
4net adhere to the ISO 27001 information security standard. The standard demands strict and detailed processes and policies to ensure data is fully protected both at rest and in transit, and 4net are committed to meeting these demands.

The Statement of Applicability is available to G-Cloud on request, this document references all of 4net’s policies and procedures including our IT policy, encryption systems and access control along with many other processes.

The SoA also details the reporting structure for adherence to ISO 27001. In brief this consists of our internal IT engineers who form part of our service desk team, reporting into the service desk manager. The service desk manager (for 4net’s information systems) reports to the Chief Technical Officer who has ultimate responsibility for 4net’s Information Systems security, support and development.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
4net can deploy their service management tool – ESP. One element of the tool is Configuration Manager. Configuration Manager holds the audit list of all configuration items, their versions and understands their connections to each other. Configuration Manager provides real-time and historical views the assets, providing data for asset tracking, design and planning.

The Change Management process will ensure the impact of change is minimised, recorded and communicated. The process proactively identifies and handles associated risks and security impacts, thus reducing any adverse effects as a result of change. The process confirms readiness for implementation and transition into service operation
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
4net continually assess software and firmware across the deployed platform, both by assessment of product and security release notes and by ESP’s tool Release Manager.

Release Manager monitors firmware and software revisions at the latest release. Release Manager uses Configuration Manager’s CMDB as a source for the existing release levels, which is updated on a regular basis.

4net assesses the release and our policy is for security breaches and updates, to deploy straightaway and for all other releases to deploy if it is to resolve a known issue or following consultation with the customer.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
4net can deploy ESP, a service management tool that proactively manages and monitors the platform. When an alarm is received, ESP will automatically attempt resolution by running scripts against known problems within its knowledgebase. If an automated resolution is not possible, ESP will email the 4net ServiceDesk with details of the issue.

The 4net ServiceDesk will then create a ticket, notify the customer’s service desk and assign the ticket to a 4net engineer to triage and restore. Response will be in accordance to the designated priority of the issue and the SLA.
Incident management type
Supplier-defined controls
Incident management approach
4net has a documented Incident Management process which is provided with an Operational Services Manual. This will include ‘knowledge
articles’ and ‘templates’, which are updated, for common issues.

All Incidents are reported and logged via the 4net ServiceDesk. Incident logging is either automated via ESP or manually by phone, email or the customer web portal. Outside of automated Incident logging, we ask that Priority 1 and 2 tickets are phoned in and Priority 3 and 4 are either emailed and logged via the portal.

The Service Delivery Manager will provide Incident reports, RCAs and service reviews to an agreed schedule.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£20.00 a unit a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector@fournet.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.