Secure Fax
SecureFax is a cloud fax service to help organisations reduce costs & improve operational efficiency, while keeping faxes secure. Faxes can be sent and received via a 256-bit encrypted web portal from any device with no extra software or hardware required, or integrated into back-end software using our REST API.
Features
- Secure fax service, encrypts each fax upon reception
- Send & receive faxes via secure web portal or API
- View and download faxes via 256-bit encrypted secure website
- No software or hardware to install, vendor lock-in or per-seat
- Feature-rich API access available and supported
- Access faxes from anywhere, any device, on the move etc.
- Only one month minimum contract with free trial option
- Search faxes for particular content
- Bring your existing fax number(s) or select a new one
- 20 years' experience operating fax services
Benefits
- Reduce costs & improve efficiency by using cloud-based fax
- Reduce Energy, Stationary and maintenance costs
- Enable faxes to become digital enabling a paperless office
- Do away with expensive phone lines and fax machines
- Used by many UK Councils, NHS Trusts, CCG's etc
- No Paper; Reduce Data Protection and Information Governance leaks
- Ideal drop-in replacement for a single or multiple fax machines
- Ideal replacement for NHS Fax
- Unlimited secure encrypted storage for the life of the account
- Easy-to-use API allows integration into back-office software
Pricing
£45.00 to £3,000.00 an instance a month
Service documents
Request an accessible format
Framework
G-Cloud 9
Service ID
3 6 5 3 2 6 5 8 0 1 5 9 7 1 5
Contact
Telecoms Cloud Limited
<removed>
Telephone: <removed>
Email: <removed>@04d9bb6c-476a-4683-962e-a98352f569f6.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Computer
- Mobile Device
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Same business day
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
- Support packages are from £350 per month (Silver) to £3000 (Platinum) depending on requirements and come with a technical account manager.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- User documentation and telephone training if required.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Can be downloaded as PDF documents.
- End-of-contract process
- The setup and running of the service, only support packages and the sending of faxes are an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10+
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None, it is responsive.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Has not been tested with every assistive technology system
- Accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- Users can setup services, download faxes and send faxes using the API.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Users are segregated on our platforms.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Downloading PDF Documents.
- Data export formats
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.999% with 4 hour fix. Users are refunded for failure.
- Approach to resilience
- It is available on request
- Outage reporting
-
Public dashboard
an API & email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- Protected by TLS and 2-factor, and combination of security questions and answers.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security accreditations
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance accreditation
- No
- Security governance approach
- Covered by internal controls and policies.
- Information security policies and processes
- Internal security policies and processes as determined by management, inspected regularly for compliance
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Using internal change management processes, track, and changes, project planning/management tools, security audits and review completed after each change
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Managed by third party provider on SLA.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- 24/7 network tools, inspections, alerting systems and proactive PEN testing,
- Incident management type
- Supplier-defined controls
- Incident management approach
- Pre-defined processes and reporting tools for users to report incidents and gain followup reporting.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £45.00 to £3,000.00 an instance a month
- Discount for educational organisations
- No
- Free trial available
- No
Documents
- Pricing document
- Pricing document
- Skills Framework for the Information Age rate card
- Skills Framework for the Information Age rate card
- Service definition document
- Service definition document
- Terms and conditions document
- Terms and conditions document