West VoiceMaxx CE
VoiceMaxx CE is a hosted voice platform based on Cisco HCS. Customers can leverage their existing telephony alongside or replace it outright with this cloud-based solution that includes integrations into Microsoft, Cisco and contact centre technologies.
- Unified Communication Platform
- Geo-redundant data centres
- Works with hosted MPLS options
- Integrates with Cisco Spark for Voice (Cisco Spark Flex)
- Full Dashboard Reporting for Administrators to view
- Contact Centre Functionality Built-In
- Works across multiple devices
- VoiceMaxx CE includes Cisco Hosted Collaboration Solution
- Complete Unified Communications Solution without the Investment
- Rapid Scalability
- Single platform for Voice, Voicemail, Conferencing and IM/P
- 24/7/365 Customer Support
- Unlimited Calling Capacity - Inbound and Outbound
- No Capacity Constraints
- Competitive dialing rates
- Unlimited Moves, Adds, Changes and Deletions (MACD)
£16.50 per person per month
2 7 4 8 0 2 1 8 2 5 9 0 0 6 1
Intrado Solutions Ltd
Intrado Solutions Limited
0330 606 8 606
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
VoiceMaxx CE can be deployed in a hybrid manner alongside your existing PBX, allowing you to continue leveraging your existing assets.
Can also be deployed as part of a Cisco Spark Flex solution.
|Cloud deployment model||Private cloud|
Service is provided on a named user basis with DDI access provided in UK and other select countries only.
Planned maintenance will be communicated in advance, as required.
User Endpoints have to be Cisco based hardware.
|Email or online ticketing support||Email or online ticketing|
|Support response times||Tickets are assigned severity level and response times will vary depending upon these; response times remain the same at weekends. Customers can contact West via Supplier Portal or Phone; We aim to respond to a P1 issue within ½ an hour. We aim to respond to a P2 issue within 1 business hour. We aim to respond to a P3 issue within 24 business hours. We aim to respond to a P4 issue within 2 business days.|
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Support levels||West support VoiceMaxx CE with Cisco-certified staff 24/7/365. Every customer has a designated solution manager who acts as the single point of contact for queries or escalations of Technical and Commercial nature.|
|Support available to third parties||Yes|
Onboarding and offboarding
During implementation, project management support will work with the customer to define the appropriate training and adoption materials required to onboard each end-user quickly and effectively.
Training is delivered in English. Virtual and pre-recorded training is available. Further support for end users is available via the MaxxPoint portal (user guides and videos) and supporting 24/7 Network Operations Center (NOC).
|End-of-contract data extraction||Customer would request data extraction (company and end-user data, for example) during the offboarding process. This would be accomplished via your designated West Solution Manager.|
Off-Boarding is simply a case of the customer reaching the end of the agreed contract period, followed by both parties jointly agreeing the retirement schedule of their service and associated data. This process is designed to be as quick and seamless as possible, providing the customer with full control of their data.
Data on users, service usage and other service metrics can be requested from your West Solution Manager.
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Cisco Jabber software works on multiple platforms including Andoid and iOS devices. Features and functions are broadly identical across desktop and mobile.
Key differences relate to the network connectivity between customer and the service.
|Description of customisation||
VoiceMaxx CE can be customised in the folowing manner;
- Service branding at company level including welcome messages, menus, auto attendants, IVR, etc
- Specific features at user level i.e. single number ringing, call forwarding, hunt groups, ringtones, etc
Customisation is based upon role-based access, defined by the customer.
|Independence of resources||Each instance is dedicated to each customer; capacity is purchased based on stated user count.|
|Service usage metrics||Yes|
MaxxPoint provides end users with usage data and administrator data can be sourced for the entire company.
i.e. Billing Reports, Usage Reports, Location-based reports
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
End users can run a range of standard reports via the MaxxPoint portal. Reporting availability is based on each end users stated role (Role Based Access).
Administrators have access to company-wide data. In addition reports can be set by users for automatic generation and emailed in their preferred format.
Please note for data import this needs to be sent manually via the West NOC.
|Data export formats||
|Other data export formats||
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||Voice SLA target is 99.999%|
|Approach to resilience||
Our VoiceMaxx CE platform is designed for redundancy and this is demonstrated through the fact that redundancy is inherent and built in to the service at multiple levels:
• Within the node on application and VM level
• At network access
• Across the nodes
• Across the global nodes
All West solutions are designed and implemented on fully redundant hardware. The redundancy capabilities extend to our core network infrastructure and connectivity with customer locations.
|Outage reporting||The West NOC will contact the customer's primary contact to inform them of the outage via phone and email. After initial contact, based on severity of outage, regular updates will be sent from the Solution Management team.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Single Sign On via customer defined access control|
|Access restrictions in management interfaces and support channels||Role based access for all customer staff, defined by customer or via Active Directory integration.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Objectives: - Protecting confidentiality, integrity, and availability of data and information systems - Preventing illicit use of data and information systems - Ensuring effectiveness of security controls - Recognizing Information Security risks. - Development, review, and maintenance of minimum security controls - Acquaint employees, subcontractors, with ways to protect information resources and responsibilities Policies, standards, procedures apply to all data, information systems, activities, and assets owned, leased, controlled or used by West or business partners. These apply to all employees, contractors, sub-contractors, and respective facilities supporting West business operations, wherever West data is stored or processed, including any third-party.|
|Information security policies and processes||The West Information Security Policy Manual is aligned with ISO 27002:2013 and includes controls and objectives. A separate Risk Management Framework has been implemented to document and calculate risk. We ensure policy is followed through onboarding training, annual reminders and constant communication by the security management team.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||West have a documented change management process. This tracks change requests from point of origination through risk analysis and mitigation through to change planning, implementation and testing. West’s Change Control process is built on a single, integrated system which is used by all IT support groups and business units. All approvals are permanently tracked in the system and include the name of the approver, the date/time, and what business unit. Risk Surveys are used to assess risk and levels of approvals necessary. Risk survey questions are driven by the Change Category and will vary based on the type of work.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Cisco and Microsoft announce Security Advisories and Alerts regularly to all vendors including West. In addition West have in-house Information Security staff who monitor our platforms for vulnerabilities, unusual usage patterns and more.
Patch deployment is deployed via our standard or emergency change management processes depending on severity of threat.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
As stated previously, we actively monitor our platforms 24/7/365 via a dedicated Network Operations Center which is manned by Cisco-certified staff. The platform is monitored for unusual usage patterns, threats, compromises, etc.
Any threats or unusual usage is flagged and if required patches or changes are raised via the aforementioned change management process.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Incident management from end users is controlled via Phone or MaxxPoint portal. End users can contact West with any incident as our NOC is manned 24/7/365 with Cisco-certified staff.
Incidents are assigned a severity level and prioritised for action. Customers are informed regularly via email and phone for status updates including ticket closure.
Severity 1 incidents are managed by a dedicated Incident Manager and Incident Engineer who own the resolution process from start to finish.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£16.50 per person per month|
|Discount for educational organisations||No|
|Free trial available||No|