Number Insight

A method that ensuring numbers are active by checking that they are valid and connected. It allows users to look up network information for a mobile phone number.


  • Identifies numbers
  • Provides network information
  • Determines risk based on numbers
  • Determines number reachability/presence


  • Protection against fraud and spam
  • Determine fraud risk based on carrier and IP location comparison
  • Works on a global scale
  • Allows users to identify phone numbers which are invalid


£0.019 to £0.023 per unit

Service documents

G-Cloud 9



Hannah Giles

+44 (0)20 8114 7008


Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Any website app which needs a Number Insight solution
Cloud deployment model Public cloud
Service constraints No
System requirements Internet access

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within a day
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels Support desk, phone, email
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started There is range of technical documentation available in different coding languages to facilitate integrating Number Insight into applications. There are tutorials and an online help hub available to help businesses get started.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction N/A
End-of-contract process Accounts and account history will still be able to access but they will not be able to send or receive any text messages.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service N/A
Accessibility standards None or don’t know
Description of accessibility This is an API
Accessibility testing This is an API and is fully tested.
What users can and can't do using the API Users can integrate with the API to send messages.
API documentation Yes
API documentation formats HTML
API sandbox or test environment No
Customisation available No


Independence of resources Zensend has direct connections with all of the UK carriers. This means that customers can send as many messages as possible without speed and reliability being affected.


Service usage metrics Yes
Metrics types Full access of analytics within the Zensend platform
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach It is up to the user how they export their own data.
Data export formats
  • CSV
  • ODF
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability The Platform availability is guaranteed to 99.9%.
The availability target excludes planned maintenance, any mobile network operator availability and performance and anything outside Fonix’s reasonable control.
Approach to resilience The platform is built on a high-performance and resilient queuing architecture. It has been designed without single-point-of failure and has been deployed in an active/active configuration across two physically separate data centres (more then 40km apart).
Outage reporting By email and on the real-time status section of our website

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels By having different levels of administration. We do not share passwords.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Fonix complies with the ISO 27001:2013 information security standard and aims to achieve accreditation in the near future.
Information security policies and processes We adhere to ISO 27001 standards

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Continuous delivery and testing on a daily basis; an audit trail of releases. Commercial communication on any releases that may affect service level. Penetration tests are also carried out yearly.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We use a security/compliance company to detect intrusions and vulnerability used to assess potential threats and secure applications and data. We deploy patches within 1 and 5 working days.
Protective monitoring type Supplier-defined controls
Protective monitoring approach The same compliance/security company is used.
Incident management type Supplier-defined controls
Incident management approach Clients can subscribe to our status page and receive operational communication. We notify clients of issues as soon as they are identified. We update clients until issues are solved. We provide incident reports on request.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £0.019 to £0.023 per unit
Discount for educational organisations No
Free trial available Yes
Description of free trial Users are offered £1 of free credit with no time limit. Users can test sending a text message. All access to code samples is publicly available on the website free of charge.
Link to free trial https://zensend.io/try-for-free


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑