Webcasting services (pay-as-you-go)

Live streaming services available pay-as-you-go by the hour. Full software download to enable webcasting from a Windows running laptop or tablet. Connect your camera and audio device directly into the device's built in ports. Turn on Wifi or 4G and broadcast live from anywhere.


  • Pay-as-you-go hours
  • Software download for laptop and tablet
  • Live and on-demand streaming
  • Responsive design
  • Branded microsite with online archive and interactive timeline
  • Agenda points, speaker profiles and slides
  • Social media integration
  • Automatic archiving
  • Content statistics
  • Modern.Gov and CMIS integration


  • Book, capture and stream from one device
  • Record and stream from anywhere
  • Only pay for the hours you use
  • Publish webcasts instantly
  • Hide content for internal purposes
  • Content rich user experience
  • Live and local streaming
  • Use with social media as part of your communications strategy
  • Real time support from our Service Desk
  • Cost-effective way to trial webcasting


£75 per unit

Service documents


G-Cloud 11

Service ID

5 3 1 2 9 3 1 1 7 4 8 6 2 5 7



Robert Saunders

01273 821 282

Service scope

Software add-on or extension
Cloud deployment model
Hybrid cloud
Service constraints
Currently only suitable for Windows running laptops and tablets.
System requirements
  • Must have Windows running laptop or tablet
  • Connect hardware via USB or HDMI
  • Stream via Wi-Fi or mobile data

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within office hours we have the following response times -

Critical issue - Response within 15 minutes
Major issue - Response within 30 minutes
Minor issue - Response within 1 working day
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
All of our web applications are compliant with the WCAG guidelines and are AA level accessible
Onsite support
Support levels
We will include our standard service level agreement (SLA) at no additional cost. This includes access to our Service Desk availability via phone, messenger (cloud support) and our support portal.

The Service Desk is available as follows:
o Monday to Thursday 8:30am to 6pm
o Friday 8:30am to 5pm

General incoming requests are categorised as follows with the indicated response times:

Critical service outage / security breach:
Response within 15 minutes. Resolved within 1 hour.

Major service issue / non-critical fault / Training requests:
Response within 30 minutes. Resolved within 4 hours (unless onsite training is required).

Minor request for changes:
Response within 1 Working Day. Resolved within a timescale agreed with client. Request for changes will be added to our Roadmap.
Support available to third parties

Onboarding and offboarding

Getting started
As standard with the service, we include online training and user documentation. We provide a standard template for the site and then offer guidance on how to customise the shell. Public-i can also offer onsite training at an additional cost.
Service documentation
End-of-contract data extraction
There will be a copy of the webcast data on the client's machine. However, we can provide copies of the archive video in a format that suits the client upon request.
End-of-contract process
All costs are inclusive in the contract. There will be no additional offboarding charges.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
End viewers of the webcast can watch the live or on demand stream from any mobile device.
Service interface
Customisation available
Description of customisation
The Connect microsite can be customised with various pages and widgets. The "look and feel" can be styled in accordance with an organisations corporate branding. Most of the text content on the site can also be customised.


Independence of resources
Due to the advancements in our technology provision (e.g. viewing through mobile devices) the audiences our clients attract have increased and so we have had to cater for significant numbers of simultaneous users. From thorough testing of these changes we can guarantee 10,000 simultaneous users on the microsite homepage and 6,000 simultaneous users able to watch live and archived webcasts without any disruption to the service and playback.


Service usage metrics
Metrics types
As standard, we provide admin statistics via login on the microsite. These detailed reports cover webcast views, viewers and a range of other statistics for a custom date range. Reports are viewable on a webpage but can also be exported as CSV.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The desktop software includes a section called "Publisher". This allows the export, import and publishing of webcast data in the form of a XML data file and MPEG4 video file.
Data export formats
Other data export formats
  • XML
  • MP4
Data import formats
Other data import formats
  • MP4
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Public-i can confirm that Connect has a proven level of resiliency. Over our entire client base our resiliency rate is more than 99.9%. To ensure that no downtime is encountered we have invested in our infrastructure and have dedicated servers on the Amazon CDN and Level3 CDN for live and on-demand streaming respectively. Included as standard is our SLA which includes monitoring of every live webcast. A member of Public-i staff is available on the Service Desk to test every live webcast and available for support via telephone, email and messenger.
Approach to resilience
Public-i can confirm that Connect has a proven level of resiliency. To ensure that no downtime is encountered we have invested in our infrastructure and have dedicated servers on the Amazon CDN and Level3 CDN for live and on-demand streaming respectively.
Outage reporting
In an instance of service outage we would email the address in each client admin to notify client staff.

We are monitored on this page: which logs recent down time. It is open for clients to visit as and when to check our network performance.

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
Public-i operate user access with role based accounts.

The Connect application has the following hierarchical privileges:
• super user ( public-i infrastructure / dev staff )
• admin ( client site administrator, public-i account manager, public-i support staff )
• moderator ( client moderator )
• user ( logged in user )
• guest ( not logged in user )
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
PCI DSS accreditation date
What the PCI DSS doesn’t cover
Nothing, all areas of payment card data security are covered by the certification.
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We comply with EU and British Standard security legislation. Public-i is an ISO accredited company and have a comprehensive Information Security Policy in place
Information security policies and processes
Public-i has an Information Security Policy which is available to clients upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We make frequent small changes as opposed to infrequent large changes. Code changes are subject to peer review and unit testing. Code is then rolled out into a testing environment and subject to further review before being published live.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our staff monitor for new vulnerabilities within thrid party packages.

Standard package updates are applied on a monthly basis. Security upates are applied immediately - upon availability.

Our infrastructure department follow alerts from as well as the wider community.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Public-i employ tripwire techniques to monitor any unauthorised changes to server systems or data.

We would restore the data compromised with an earlier version (prior to the compromise). Our staff would look to close the vulnerability that allowed the compromise.

Any affected clients would be notified as soon as when we become aware of the incident and also when we have resolved it.
Incident management type
Supplier-defined controls
Incident management approach
Public-i has an Information Security Policy in place which defines processes for common events such as intrusion attempts.

Users can report incidents via our Service Desk, online ticketing service and live monitoring.

Reports will be sent via email immediately in the event of an incident occuring and once it has been resolved.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£75 per unit
Discount for educational organisations
Free trial available

Service documents

Return to top ↑