MeetingZone Ltd

Cisco Webex Meetings with fixed price audio from MeetingZone

Unlimited audio access to Webex Meetings and Webex Teams- fixed monthly charge.
1) Toll Audio: Unlimited dial-in audio to Webex Meetings using local “toll” numbers in approximately 45 countries
2) Toll Plus Audio: Toll Audio plus unlimited dial-back calls from Webex Meetings to UK numbers.
Both include unlimited VoIP.


  • Unlimited dial in using local "toll" numbers in 27 countries
  • Unlimited dial-back calls from Webex Meetings to UK numbers
  • Unlimited VOIP calls
  • Full control of telephone participant lines from host's screen
  • Interactive two-way video with switching to live speaker
  • Integrated audience chat and feedback features
  • Comprehensive invitation and recording tools for meeting organisers
  • Live Presentation content or preloaded content including Video
  • Interactive whiteboard and audience opinion polling
  • Start instant meetings or schedule from Microsoft Office Applications.


  • Predictable fixed audio costs
  • Discuss and debate important issues, with key people, without travel
  • Improve interaction with remote employees or suppliers and customers
  • Conduct regular team meetings at low cost
  • Disseminate important information, quickly and consistently
  • Hold lively, effective, creative sessions with remote people
  • Keep a record of what is presented and decisons made


£10.35 per licence per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

3 9 3 9 2 6 4 3 8 8 8 6 5 6 9


MeetingZone Ltd

The Sales Team

020 3107 0207

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Occasionally we do planned maintenance. This is always scheduled for outside of normal working hours and is always fully communicated to customers. New releases may require upgrading. No mobile clients for Windows mobile.
System requirements
  • Most PCs will be satisfactory if running current Microsoft OS
  • Current IOS or Android mobile devices will work
  • Windows mobile clients not available
  • Most Macs will be satisfactory if running current Apple OSX

User support

Email or online ticketing support
Email or online ticketing
Support response times
Critical 1 hour Important 4 hours Normal 6 hours Low 12 hours
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Service is at the core of MeetingZone, our offer includes: - Unlimited number of tickets - System experts on hand to handle requests/ issues - Proactive monitoring for all services - Service reviews with both Service Desk Manager and Account Manager
Support available to third parties

Onboarding and offboarding

Getting started
Online and onsite training can be provided. User guides available online. Test and training can also be provided.
Service documentation
Documentation formats
End-of-contract data extraction
All data relating to usage, bookings and history can be provided to customers when leaving us.
End-of-contract process
No additional costs at the end of a contract.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
Dynamic adapts same content
Service interface
Description of service interface
Intuitive interface providing control on any device
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Customisation available
Description of customisation
Elements of UI can be branded


Independence of resources
Cisco deploys a globally distributed dedicated network of high-speed meeting switches. Meeting session data originating from the presenter’s computer and arriving at the attendees’ computers is switched, never persistently stored, through the Cisco Webex Cloud.


Service usage metrics


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Via the Admin/Members portal with secure log ins.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
End to end encryption option using Advanced Encryption Standard (AES)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Cisco have no SLAs for this
Approach to resilience
The Cisco Webex Cloud is a communications infrastructure purpose-built for real-time web communications.
Webex meeting sessions use switching equipment located in multiple data centers around the world. These data centers are strategically placed near major Internet access points and use dedicated high-bandwidth fiber to route traffic around the globe. Cisco operates the entire infrastructure within the Cisco Webex Cloud. Data within the
United States stays within the U.S. region, and data within Europe remains in the European region.
Additionally, Cisco operates network point-of-presence (PoP) locations that facilitate backbone connections, Internet peering, global site backup, and caching technologies used to enhance end-user performance and availability. Cisco personnel are available 24 hours a day, seven days a week, for logistical security, operational, and change-management support.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Cisco supports federated authentication for user single sign-on (SSO) using Security Assertion Markup Language
(SAML) 1.1 and 2.0 and the WS-Federation 1.0 protocols.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
Lloyds Bank PLC
PCI DSS accreditation date
What the PCI DSS doesn’t cover
Covers all of MeetingZone Ltd credit and debit card transaction.
Other security certifications
Any other security certifications
ISO 27001 assured to standard.

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO 27001 assured to standard.
Information security policies and processes
We have a ISMS system in place which details all of our policies and procedures. This system is managed by our Head of IT & Security

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All changes in configurations are requested by internal online portal and tracked. Includes testing and roll back planning. Each change before implementation is reviewed against a set of criteria including security by the Change Control Board.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Cisco network monitoring tools analyse threats. Patches are available from Cisco as soon as fix is available. Services vary by severity. Head of IT & Security, working with Cisco who provide this information, as well as Internet Resources, customers,Twitter etc.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Use of monitoring systems by Cisco. Disable access to compromised system and investigate who, what where, when and how. Immediately. Work with Cisco team to fix in real time.
Incident management type
Supplier-defined controls
Incident management approach
Physical security incidents, e.g. an unauthorised person gaining access to a building or theft of a physical asset (computer, removable media). Third party IT security policy violations, attacks or intrusions, e.g. a denial of service attack against MeetingZone Ltd from a network connection belonging to a remote third party. Internal IT security policy violations, attacks or intrusions, e.g. an employee breaching the MeetingZone Ltd Acceptable Use Policy by surfing to unauthorised sites or downloading malware. Attempted policy violations, attacks or intrusions, e.g. failed attack against a login mechanism (multiple failed login attempts) that was detected by an intrusion detection system.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£10.35 per licence per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑