LogMeIn

GoToRoom

GoToRoom allows you to configure a video conferencing solution in your physical conference room.

Features

  • Conference Room Solution
  • Online Meetings
  • Video Conferencing
  • Easy management and dashboard
  • Crystal clear audio and video
  • Intuitive User Interface
  • Unified Communications
  • Calendar Integration (MSFT & GOOG)

Benefits

  • Simple and Fast deployment
  • turnkey installation in minutes
  • Easy management with room dashboard
  • Industry Leading Reliability
  • Streamlined Join Experience
  • Intuitive User Interface
  • Crystal Clear Audio and Video

Pricing

£1,899 a unit a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at PartnerOps-International@logmein.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

2 8 0 9 0 2 3 2 0 0 2 4 0 9 8

Contact

LogMeIn Channel Sales operations @ LogMeIn
Telephone: 00353858885888
Email: PartnerOps-International@logmein.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
GoToMeeting
Cloud deployment model
Public cloud
Service constraints
A display (TV or Monitor that accepts HDMI), Ethernet cable, a HDMI cable, and power outlets are required to set up a GoToRoom. Note: A powered Ethernet jack is required for the Medium option. If the customer does not have this, they can purchase the power injector.
Additional details at: https://support.goto.com/meeting/help/set-up-your-gotoroom-system-medium-room-g2m090161 (note this is for a Medium Room; there is an option for a Small room as well)
System requirements
  • A display (TV or monitor that accepts HDMI)
  • Eternet cable
  • HDMI Cable & power utilities

User support

Email or online ticketing support
Email or online ticketing
Support response times
For customer support, 24/7 phone and web support is provided. Our customer support center hosts support channels and contact methods across all products, free of charge. This is a central reference point when requesting support. The support site contains: Answers to commony asked questions and technical issues Getting started advice, account and billing topics, audio set up, webcam and recording topics, and troubleshooting advice Helpful training videos Technical documents designed to help you get the most out of your investment in the product
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We conducted 3rd party independent assessments to train our teams on development practices and tools required to achieve WCAG 2.1 Level AA compliance for Bold360, which powers the support chatbot. These include the following testing methods:
•JAWS 15 (or above) screen reader with Internet Explorer 11
• NVDA screen reader with Firefox
• Dragon naturally speaking 12+ with IE
• ZoomText 10+ with Internet Explorer
• Ensure the service can be used without a mouse – Chrome
• Ensure the service is accessible to people who have a disability but do not require
assistive technology – Chrome/Safari
Colour Blind, Dyslexic, Learning Disabilities, Deaf, Aspergers, and Anxiety/Panic
disorder
• Testing on iPad and iPhone using native browser
• VoiceOver with Safari on iPhone
• Zoom with Safari on iPad
• TalkBack on Android

These were conducted both via automated and manual testing approaches
Onsite support
Yes, at extra cost
Support levels
Your CSM will provide and discuss all training options that will best fit your organizational needs. We can be as involved as hosting private, tailored training for your users or educate them about our online resources and live, public trainings offered almost daily. A successful deployment of GoToMeeting for your business is our number one goal, and we are here to help!

In addition, you will have
Localized, 24/7 phone & web support on EVERY plan
Dedicated account management for major accounts

Your CSM and Account Manager is dedicated to your account. Our 24x7 support is shared, however we have experts at all levels to make sure your inquiries are addressed in an efficient and effective way.

SLA can be provided
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The Early Life Customer Success Manager (CSM) is your GoTo onboarding specialist. They are dedicated to a successful deployment of GoTo within your organization and will work with you to ensure a quick return on your investment.

During the first 90 days of your GoToRoom/GoToMeeting experience, your CSM is your dedicated resource to help you implement and adopt GoToRoom/GoToMeeting. Your CSM will work with you to tailor your experience to fit your desired outcome. They’ll provide you with tools and resources to ensure a smooth roll-out and adoption within your organization. Your organizers will be up and running, confidently hosting meetings and making an impact in no time.

We proudly offer a broad range of fee-based event services and training designed to help you maximize the benefit of our services. We also offer free live training. to quickly gain key skills to optimize your new service. You will have the opportunity to submit questions to our experts and get answers in real time. Many classes are held daily, several product offerings offer multiple classes per day. Visit this support site article to sign up for Ask the Pros and training for organizers and administrators.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Video
End-of-contract data extraction
GoToMeeting users can delete their recordings within their services environment. Further, at any time, GoTo Services Customers may request the return or deletion of their content through standardized interfaces. If these interfaces are not available, LogMeIn will otherwise make a commercially reasonable effort to support the Customer, subject to technical feasibility, in the retrieval or deletion of their Content. Additionally, Customer Content will be deleted within thirty (30) days of Customer request.
Upon the expiration or termination of a paid subscription to GoToMeeting, Customer's accounts shall automatically be deleted after two (2) years of user inactivity (e.g. no logins). Upon written request, LogMeIn will certify to relevant account and Content deletion.
End-of-contract process
As specified in the "End-of-contract" process, each customer may delete or export relevant Customer Content, and in any regard, such Content would be subject to reasonable retention periods (as specified in the "end-of-contract data extraction" section above). Additional information can be found at the product-specific Security and Privacy Operational Controls found at: https://www.logmeininc.com/trust/resource-center. LogMeIn is always seeking feedback and areas for improvement, both throughout the contract lifecycle, as well as thereafter; this may include, if permitted to do so, soliciting input from our users.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
GoToRoom operates the same as GoToMeeting – users can join from a mobile device. For mobile devices that support presenting content (i.e. Android & iOS phones/tablets) using the GoToMeeting app, they can join and present content to other GoToMeeting attendees including GoToRoom systems.
Service interface
Yes
Description of service interface
Each user with G2Mlicence can start their meetings over GoToRoom. Since each user can have a personalized meeting page, you can create your own personalized meeting page by reserving a URL and customizing the look and feel. Reserving a meeting page allows you to quickly launch a meeting and have attendees join at the same URL each time .

Within your Meeting Page: can choose the name, customize URL, choose audio options, add co-organizers to launch meetings on your behalf and enable a password that attendees need to join

GoToRoom AdminCenter- choose name for device and add logo to screen.
Accessibility standards
None or don’t know
Description of accessibility
We are working towards making our products and services more accessible for assistive technology users and may provide a VPAT that outlines how we meet accessibility needs upon request. Closed Captioning for GTM Cloud Recording available for all GTM Pro and Plus users. Additionally we have high contrast mode on Windows, Font Size and Color Scheme configuration, Tab navigation and Keyboard Shortcuts.
Accessibility testing
LogMeIn is continuously evaluating ways to deliver our products and services to become more accessible for assistive technology users. Several means in which accessibility is considered, taking into account WCAG standards, include: refresh rates, color contrast ratio, text zooming, keyboard shortcuts, design patterns to reduce cognitive loads and conducting usability testing.
API
Yes
What users can and can't do using the API
GoToRoom is running our GoToMeeting application, which has an open API. This gives you the ability to seamlessly integrate GoToMeeting. There are many integrations that are already built and can be found in the Integration Marketplace (https://www.goto.com/integrations), however if you want to create an integration you can utilize the Developer Center (https://goto-developer.logmeininc.com/apis/apis-overview) .
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Create a personalized meeting room, reserve and customize a URL, add a name to Meeting Page, customise the look and feel, add co-organizers tab so co-organizers can launch meetings on your behalf, enable a password that attendees would need to join. These are customised by the Meeting Organizer.
Admin Center: Choose a name for the device, add a picture or your logo to be shown on the screen in the conference room; these are customised by Admin

Scaling

Independence of resources
LogMeIn leverages a multi-tenant architecture which is logically separated at the database level based on the organization’s LogMeIn account. Only authenticated parties are granted access. Solution is built with full redundancy of our data centers, reducing the risk of downtime and single-point-of-failure.

Analytics

Service usage metrics
Yes
Metrics types
AdminCenter Reports
Meeting Diagnostic Reports
Activity report of each organizer
User status report
Toll-free(OpenVoice) usage report
Meeting history report
Scheduled meetings report
Attendee report
Billing history report
Rates/phone numbers report type
Usage reports– Shows OpenVoice usage in your organizers' conferences
Conference room reports–Shows OpenVoice conference rooms and organizers.

In the AdminCenter you can monitor GoToRoom device status. Available info: System, TV-Display, Touchscreen, Audio Input and Audio Output info
Reporting types
  • API access
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
.csv or excel format for reports in g2m. Transcripts are copied to the clipboard and pasted as a text file. or of course via the apis
Organizers and co-organizers can save a log of the chat messages as a Rich Text file (.RTF).
Organizers can download a .MP4 version of their online recordings to their computer.
Reports can be exported in .csv or .xls format
Data export formats
  • CSV
  • Other
Other data export formats
  • HTML
  • JSON (via API)
  • .MP4
  • .RTF
  • .XLS
Data import formats
  • CSV
  • Other
Other data import formats
JSON via API

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
The LogMeIn network architecture is segmented into public, private, and integrated lights out (iLO) management network zones. The public zone contains internet-facing servers; all traffic that enters this network must transit a firewall. Only required network traffic is allowed; all other network traffic is denied; no network access is permitted from the public zone to either the private or iLO management network zones.

The private network hosts application-level administrative and monitoring systems, and the iLO management network zone is for hardware and network administration and monitoring. Access to these networks is restricted to authorized employees via two-factor authentication.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
The LogMeIn network architecture is segmented into public, private, and integrated lights out (iLO) management network zones. The public zone contains internet-facing servers; all traffic that enters this network must transit a firewall. Only required network traffic is allowed; all other network traffic is denied; no network access is permitted from the public zone to either the private or iLO management network zones.

The private network hosts application-level administrative and monitoring systems, and the iLO management network zone is for hardware and network administration and monitoring. Access to these networks is restricted to authorized employees via two-factor authentication.

Availability and resilience

Guaranteed availability
LogMeIn strives for high redundancy and availability of our services and infrastructure. Service Level Agreements are mutually agreed upon and covered in the Terms of Service and/or written agreement for the LogMeIn services with our customers.
Approach to resilience
The architecture has been designed for maximum performance, reliability and scalability. The GoToMeeting solution that runs on the GoToRoom device is driven by industry-standard, high-capacity servers and network equipment with the latest security patches in place. Redundant switches and routers are built into the architecture to ensure that there is never one single point of failure. Clustered servers and backup systems help guarantee a seamless flow of application processes — even in the event of a heavy load or system failure. For optimal performance, the GoToMeeting brokers load balance the client/server sessions across geographically distributed communication servers.
Outage reporting
A public dashboard available at status page. Status updates can be provided via phone, e-mail, RSS Feed, etc. through the Trust Center webpage.

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
Any user can sit down at a GoToRoom and host or join meetings. Any users who do happen to have their own GoToMeeting account will have the additional option of starting their own pre-scheduled meetings from the system. Using the calendar integration or the mobile application, users do not need to be authenticated when using our service.
Access restrictions in management interfaces and support channels
Logical Access Control procedures are in place, designed to prevent or mitigate the thread of unauthorized application access and data loss in corporate and production environments. Employees are granted minimum (or "least privilege") access to specified LogMeIn systems, applications, networks and devices as needed. Further, user privileges are segregated based on functional role and environment. Users shall only be provided with access to the network and services that they have been specifically authorized to use.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • LogMeIn is EU-U.S. and Swiss Privacy Shield Certified
  • TRUSTe Verified Privacy
  • TRUSTe Verified Privacy
  • APEC CBPR and PRP Certification

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
LogMeIn is EU-U.S. and Swiss Privacy Shield Certified
TRUSTe Verified Privacy
APEC CBPR and PRP Certification
For additional certifications, please visit the Product Resources page of LogMeIn's Trust & Privacy Center at www.logmeininc.com/trust
Information security policies and processes
An Information Security Policy has been established at LogMeIn and assist in defining the role of technology and management at our organization. It is aligned to ISO27001:2013.
At least annually, applicable policies are reviewed by management to ensure that any procedures or standards are updated in accordance with contractual and legal commitments and company requirements/standards. In order to ensure the confidentiality, integrity, and availability of LMI Information and IT systems we do not send customers these documents.
Security Policies are relayed to employees at the time of hire and available in the Employee Handbook. They are also communicated to all Global Employees on a regular basis. Additionally, they are hosted on our internal site. LogMeIn employees and temporary workers are informed on a continuous basis, as determined by the company, about security and privacy guidelines, procedures, policies and standards through various mediums of communication such as awareness campaigns, new hire on-boarding kits, webinars with the CISO, annual policy compliance, security training targeting specific roles (such as software developers), security champion programs, as well as visual media campaigns.
Please reference our Trust Center for further details: https://www.logmeininc.com/trust

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
A Change Management Policy has been developed in accordance with relevant commitments and requirements detailing the procedures for infrastructure and development changes, including design, implementation, configuration, testing, modification, and maintenance of systems. Further, processes and procedures are in place in order to verify that changes have been authorized, approved and tested before being applied to a production environment. Policies are in place to provide guidance for the management, modification, and implementation of system changes to infrastructure and supporting applications.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Internal and external system and network vulnerability scanning is conducted monthly. Dynamic and static application vulnerability testing, as well as penetration testing activities for targeted environments, are also performed periodically. These scanning and testing results are reported into network monitoring tools and, where appropriate and predicated on the criticality of any identified vulnerabilities, remediation action is taken. Vulnerabilities are also communicated and managed with monthly and quarterly reports provided to the relevant development teams, as well as management.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
LogMeIn collects identified anomalous or suspicious traffic into relevant security logs in applicable production systems. They are received/reviewed by our NOC team, who respond immediately.
LMI incorporates vulnerability management and intrusion detection programs into its production and corporate IT environments, as well as perimeter devices designed to protect the network from external attacks. LMI regularly reviews relevant risks that may threaten the achievement of service commitments and updates to existing control activities and infosec policies are performed as deemed needed. The system is architectured to be able to identify, respond to and recover from potential availability events or security incidents.
Incident management type
Supplier-defined controls
Incident management approach
Our SOC is responsible for detecting and responding to security events using security sensors and analysis systems to identify potential issues.
The Incident Response Plan has been developed to include appropriate security incident response process and is aligned with LogMeIn's communication and information security incident management polices and procedures. It is designed to manage, identify, and resolve relevant suspected, and/or identified security events across its systems and Services. Personnel are in place to identify, document, escalate, and triage potential information security-related events
and vulnerabilities, based on criticality, as well as escalate relevant events to management, where appropriate.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1,899 a unit a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at PartnerOps-International@logmein.com. Tell them what format you need. It will help if you say what assistive technology you use.