Six Degrees Technology Group Limited

Unified Communications as a Service ( UCaaS )

Cloud based Unified Communications as a Service (UCaaS).

Providing Unified Communications and Collaboration (UC&C) services from the cloud.

Features

  • Connects multiple Office locations and remote users
  • Integrated Voice, IM, Conferencing, Video and mobility
  • Built-in Call Recording and Reporting/Call Logging
  • Secure access with definable user rights
  • Web Collaboration & Web based User Portal
  • Conference Scheduling
  • Centralised Licencing, per user per month pricing
  • Range of handsets, conference devices and soft-clients
  • 24/7/365 monitoring of UCaaS in Six Degrees-owned Data Centres
  • Integration options for CRM and Microsoft Skype for Business

Benefits

  • Handle more calls with fewer people using built-in intelligence
  • Open architecture- not locked into a single vendor/deployment strategy
  • Global voice services
  • Supports existing dialling plans and policies
  • Delivers consistency and reduction in desk phone related expense
  • Intuitive interface reduces user learning time and helpdesk cost
  • Sharp high definition video that’s cost effective to deploy
  • Video Collaboration browser based on WebRTC- no plug-ins required
  • User interface tailored to business tasks and individual profiles
  • Built-in business continuity, secure remote user log in

Pricing

£6.00 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.sales@6dg.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 3 0 1 6 1 2 3 6 5 4 8 4 2 2

Contact

Six Degrees Technology Group Limited Rob Walton
Telephone: 07813303485
Email: publicsector.sales@6dg.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None.
System requirements
  • Bandwidth to support expected voice and video traffic
  • POE Switching for physical handsets
  • Connectivity to Cloud service via 6DG network or Internet

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLAs for response times can be found in the attached Service Description document.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
None.
Onsite support
Yes, at extra cost
Support levels
Full support of services are provided as standard via our Support Desk. The Support Desk is available 24x7 and is manned by 1st/2nd line support engineers. The service desk has direct escalation to the operations team where full 3rd line support is provided.

Full out of hours support is also provided for all P1 and P2 incidents with clear escalation paths.

All customers are allocated a service delivery manager who is responsible for ensuring the smooth delivery of the service, acts as an escalation point for all incidents, and provides full monthly service reporting.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide implementation services as well as training of users and administrators in a train-the-trainer methodology.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data is destroyed - Voice recordings can be downloaded prior to termination of service. Config can also be downloaded and Six Degrees can provide full exports of certain records as required.
End-of-contract process
We will provide transition services within reason to help customer move to another service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference - the application has been designed to provide a consistent user experience for desktop as well as mobile.
Service interface
Yes
Description of service interface
Users can raise support tickets and change requests etc. through Six Degrees' online customer portal, which is provided via our chosen IT Service Management tool.

Additional buyer access to vendors management portals is available based on buyer needs
Accessibility standards
WCAG 2.1 A
Accessibility testing
None.
API
Yes
What users can and can't do using the API
API interfaces available through centralised Web Services API (CTI), Centralised Web Management API.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Self-service Web Management portal provides ability to manage the service, customise users/groups/DDIs and manage call flows amongst others. Access rights are restricted to Administrators. A self-admin web portal is also available for end users to manage their own settings, such as call forwarding, mobile twinning and security (password changes etc.)

Scaling

Independence of resources
All services are born in the cloud allowing for expansion of services as demand requires utilizing a multi-tenant platform. Multiple Data Centers (world wide for 8x8 and Microsoft solutions) to support quality and expandability.

Analytics

Service usage metrics
Yes
Metrics types
Six Degrees can provide various metrics for the platform and the service. These include but are not limited to reports on availability, performance against SLAs, call details, calling statistics, voice quality across the Six Degrees network, and key service KPIs such as support response times and incident/problem management. The voice platform can also provide comprehensive call analytics to monitor business performance / identify key trends.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft Office 365 with voice enabled teams, 8x8 Inc., Avaya

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can download voice recordings and export config. Six Degrees can also provide full exports of any data when required.
Data export formats
  • CSV
  • Other
Other data export formats
  • Audio files (WAV)
  • SQL
  • MDB
  • Call details record
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Plain Text

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
99.99% uptime of UCaaS system, all customer assets are redundant and deployment provides for redundant communication links where feasible. Please see Service Description for how users are refunded (Service Credits).
Approach to resilience
Redundant Cloud platform, Redundant virtual servers and redundant communications links. Public Cloud services and geographically dispersed data centers, including global diversity for Microsoft and 8x8 services.
Outage reporting
Automated Monitoring of system using SNMP and other API. Email alerts are also provided from our IT Service Management system.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Only authorised contacts are granted access rights to the service. The Support Desk will only accept requests from authorised contacts. Communication with anybody at Six Degrees will need to be pre-approved by a known individual in writing. Management of the infrastructure is via dedicated connectivity and out of band of customer data and customer networks
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LRQA ( Lloyd's Register Quality Assurance Limited)
ISO/IEC 27001 accreditation date
17/04/2020
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
01/01/2019
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
N/A
PCI certification
Yes
Who accredited the PCI DSS certification
Convergent Network Solutions
PCI DSS accreditation date
01/06/2018
What the PCI DSS doesn’t cover
Only the physical and environmental security at Six Degrees' data centres in Birmingham, London and Studley were included in this assessment. The relates to the provision of the secure physical environment for the Colocation Services with Six Degrees provides to its clients. All other services provided by Six Degrees, internal systems supporting business operations or for other clients are specifically excluded from this assessment.
Other security certifications
Yes
Any other security certifications
  • PSN Compliance Certified
  • Cyber Essentials Plus
  • GDPR
  • HIPAA BAA
  • UK Govn ATO
  • FISMA
  • FIPS 140-2
  • CPNI
  • Privacy Shield

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO 27001:2013, Cyber Essentials, PSN
Information security policies and processes
All ISO 27001:2013 controls and associated policies are in place. Enhanced weekly and also quarterly external approved scanning vendor (ASV) vulnerability scanning. Six Degrees also comply with our PSN CoCo which is aligned to our security principles that allows us to deliver our customers PSN Secure and Protect.
Six Degrees operate a rolling internal audit programme to ensure continuity of compliance to our various accreditations , as well as internal technical auditing of our systems through the use of various integrity checks. This is ensures that there is always a fully justified and documented Change Request for any modification of our secure systems.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All non-standard changes must be pre-authorised by going through a peer, senior and CAB approval process. Standard changes are created in template form and are approved in CAB before being implement into Change controls.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Six Degrees (Public Sector) run an internal vulnerability test once a week. All reported vulnerabilities that are reported are categorised into priority depending on the severity and a case is logged with the operation team who will fix the vulnerability under the time frames dictated by Public sector patching policy. This conforms to the PCI-DSS standard.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Six Degrees (Public Sector) have a protective monitoring system where all logs are centralised and checked on a daily basis for security breaches using several key search filters. Alerts are sent out for high risk activity and are pro-actively responded to by the operations and security teams. This conforms to the PCI-DSS standard.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Six Degrees operate an ITIL aligned incident management process with associated procedures for security related incidents. The process has a clearly defined governance framework, including roles & responsibilities, clear policies and associated KPIs. This process conforms to PCI DSS.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Pricing

Price
£6.00 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
2 week Proof of Concept

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.sales@6dg.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.