Speakserve Limited

Professional Audio Conference Calls

Speakserve offer an easy to use, highly reliable, secure and cost effective audio conference call service. Call Recording, archiving, transcription, and compliant analytics are included. Global access and high definition audio from any device allows you to deliver crystal clear conference calls for your important meetings.


  • High Quality High Definition Audio Conference Calls
  • Reduce Travel Costs
  • Easy to Use
  • Secure
  • Local and Freephone Access from 120 Countries
  • Automatic Transcription and Compliant Word Search
  • Instant Departmental and Cost Code Billing
  • Free Call Recording, Archiving and Analytics
  • Outlook Integration
  • Post Call Emails


  • Reduce Travel Costs
  • Improve efficiency through better time management
  • Meetings at Short Notice
  • Lock Meetings for additional Security
  • Instant Transcription
  • Sophisticated Analytics (Individual or Word Pack Search)
  • Compliant Call Recording
  • 24 x 7 x 365 Support
  • Regular Team Meetings
  • Cost Allocation


£00.005 per person per minute

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9


Speakserve Limited

Jonathan Grant

0800 980 5155


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times No
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels Support Levels

24 hour Human Answer
10 minute Response time for any enquiry


Priority 3 - 1 hour
Priority 2 - 2 hours
Priority 1 - 48 hours
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The end user can start using the service immediately. An Administrator might require some initial training on using the portal, analytics, and other features.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The user can retain access at no extra cost, or download the information to a local device.
End-of-contract process The only costs are the costs of the calls. There are no further costs.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Accessibility standards None or don’t know
Description of accessibility We use globally accessible telephony networks.
Accessibility testing Not applicable
Customisation available Yes
Description of customisation All features are customisable by the end user:

Portal Features


Independence of resources We have complete control of our utilisation rates and our network operations team control the load and capacity on the platform.


Service usage metrics Yes
Metrics types We offer comprehensive analytics on every aspect of our service. This includes:

Call Data (CDR's)
User Data
Access Data
Audio Data
Analytics Data
Billing Data
Permissions Data
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach File download - audio files are stored in .wav, data can be downloaded as a CSV file.
Data export formats
  • CSV
  • Other
Other data export formats .WAV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99.999% availability

If an issue occurs all calls are r-routed to one of our other data centres.
Approach to resilience We operate a multi data centre architecture with resilient global networks and 7 POP's. This is designed to handle our global telecoms traffic, and has been successful for the last 15 years.
Outage reporting Email Alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Not applicable
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We have robust internal security processes that are regularly audited.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We operate a highly documented change control process that involves multiple sign off and rigorous testing on development platforms.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We run continual traces and PEN tests for our services, reporting by the minute for any vulnerabilities.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We run continual tests for any compromise.

We deal with it immediately and have a range of solutions available.
Incident management type Supplier-defined controls
Incident management approach We have a high escalation process for incidents,which follow the following process:

1) Event mitigation and Automatic Disaster Recovery
2) Event Identification and Isolation
3) Initial Solution and Escalation
4) Solution Implementation and Testing
5) Final Resolution

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £00.005 per person per minute
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Minimum one month free trial on all UK audio conference calls.


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑