VideoCentric Ltd

Cloud Video Interoperability (CVI) for Google G-Suite (Hangouts Meet)

Cloud Video Interoperability (CVI) Gateway for Google G-Suite seamlessly integrates existing video room systems, connecting people in meetings across board rooms, conference rooms, and huddle spaces. Provided by certified provider Pexip & accredited reseller VideoCentric.


  • Native calling experience for SIP/H.323 users
  • Connect standards-based systems with Google Cloud
  • Call Hangouts Meet
  • Full HD video & content sharing
  • Automatic burst capacity
  • Secure call & media encryption
  • Connectivity with Google Cloud
  • One Touch Dial - single "click to join" meeting


  • Operated & supported on your behalf
  • Familiar outlook scheduling workflow
  • Operated within secure & resilient Google Cloud
  • Protect existing video investments
  • Enables smooth migration to cloud without service disruption
  • Get everyone into the same meeting, whatever device they use


£168.04 per unit

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

5 2 3 5 0 9 4 9 2 9 1 7 9 5 9


VideoCentric Ltd

Emily Shimell


Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Pexip-as-a-Service
Cloud deployment model Public cloud
Service constraints NA
System requirements NA

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 1 hour meaningful response.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels VideoCentric's award-winning support levels can include technical & telephone support & email support, interoperability testing, software patches, releases & upgrades from a highly accredited in-house technical team. Services can also include onsite escalation services, training, remote diagnosis and deployment services depending on any service wrap-around requirements (i.e. in room AV/endpoints/networking etc). All customers have a dedicated Account Manager and direct access to 1st, 2nd and 3rd line expert support, and assistance with any direct liaison required with vendors. Access to online resources for both IT administrators and end users and any available ongoing user adoption & onboarding support included. Reporting, ROI & analytics assistance can be added if required. Many of our cloud services do not require full maintenance programmes or relevant support is included within original service, though some services can be added as optional extras or included for related hardware. VideoCentric provide the UK's most comprehensive and flexible range of support programmes which can be tailored to meet individual needs, and can also be provided to enhance simple Manufacturer warranties & support levels. Pricing varies dependent upon tailored or chosen programme.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Customers are assigned a Client Success Manager who is responsible for assisting with user training, adoption and problem resolution. The CSM is assigned for the life of the account.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction When customers' contracts ends and their subscription is terminated. Data is removed or extracted upon request in a suitable transferable format.
End-of-contract process The CVI is a subscription service. Should the customer elect not to continue their subscription by giving the stated written notice, we will work with the customer to confirm a switch-off date and any data or materials the customer can reasonably expect such as end-user reporting. The customer will no longer be able to use the service after the end of contract.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service NA
Service interface No
Customisation available No


Independence of resources Peak usage is checked weekly and reported. Capacity is re-evaluated after each release using controlled load testing and upon approximately 50% capacity, additional capacity is added.


Service usage metrics Yes
Metrics types VideoCentric and Pexip can provide usage metrics in report form upon request. Further indepth reporting & statistic services can be subscribed to separately.
Reporting types
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold Pexip

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach This is a gateway service and data is not held for this. Any user/organisation data held within VideoCentric's databases may be exported, modified and deleted upon request as necessary alongside GDPR practice.
Data export formats CSV
Data import formats Other

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability SLAs.Service Level Agreements are agreed upon and covered in the Master Service Agreement with our customers.
Approach to resilience The entire service is hosted on multiple geographically distributed Google Cloud data centers. Detailed information is available upon request.
Outage reporting Outages can be communicated by multiple methods including Dashboards, accessible via APIs, email alerts and via phone.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Administrators control the setting up and termination of accounts. These are username and password protected.
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Google Cloud is certified to ISO 27001, 27017, 27018
  • Google Cloud is certified to CSA STAR, SOC 1/2/3
  • Google Cloud is certified to PCI DSS

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards Google Cloud Data Centres where the service is hosted adhere to ISO/IEC 27001
Information security policies and processes Google Cloud Audited & certified datacentres to ISO 27001, security and privacy policies and controls are aligned with ISO 27001 and, ISO 27017, SOC 1/2/3, PCI DSS, ISO 27018 and CSA STAR

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach The Pexip service is deployed within Google Cloud data centres, with fully aligned & certified change management procedures, including security impact assessments & life cycle tracking. Devices on the network do periodic scanning for vulnerabilities and security threats.
All changes to the system must follow the change management procedures. Any emergency change must be reviewed with a Root Cause Analysis performed and prevention methods identified to ensure that emergency change is not required in the future. More information available on Google Cloud on request.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Pexip & Google periodically scans for network, port, and application-level vulnerabilities. Vulnerability scans are conducted by a leading 3rd party SaaS provider, in addition to some special-purpose, in-house scanning tools. Furthermore, all of the 3rd party applications and operating system software is checked for security advisories and is patched periodically.

More information on vulnerability management of the Google Cloud is available upon request.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Pexip and Google employs a wide range of security management practices to provide a secure and reliable service to customers. This includes network firewalls throughout the infrastructure to create security zones for different applications and services. Web traffic passes through industry-leading load balancers to protect against a suite of application attack vectors. Predefined processes & procedures from Pexip & Google can be obtained on request.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach If there is a suspected breach or known intrusion, the Security Incident and Reporting Process is triggered. Pexip and Google have policies for Standard Incident Management to define methods for identifying, classifying, tracking, and responding to incidents that will impact business operations. Incident response programmes are tested/utilised on a procedure defined basis, customers are notified on the website prior to change, maintenance or as a result of outage/incident. More Information available upon request.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £168.04 per unit
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Proof of concept & free trials can be set up and tailored to the organisations needs.

Service documents

Return to top ↑