Webcasting services (pay-as-you-go)

Live streaming services available pay-as-you-go by the hour. Full software download to enable webcasting from a Windows running laptop or tablet. Connect your camera and audio device directly into the device's built in ports. Turn on Wifi or 4G and broadcast live from anywhere.


  • Pay-as-you-go hours
  • Software download for laptop and tablet
  • Live and on-demand streaming
  • Responsive design
  • Branded microsite with online archive and interactive timeline
  • Agenda points, speaker profiles and slides
  • Social media integration
  • Automatic archiving
  • Content statistics
  • Modern.Gov and CMIS integration


  • Book, capture and stream from one device
  • Record and stream from anywhere
  • Only pay for the hours you use
  • Publish webcasts instantly
  • Hide content for internal purposes
  • Content rich user experience
  • Live and local streaming
  • Use with social media as part of your communications strategy
  • Real time support from our Service Desk
  • Cost-effective way to trial webcasting


£75 per unit

Service documents

G-Cloud 11



Robert Saunders

01273 821 282

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints Currently only suitable for Windows running laptops and tablets.
System requirements
  • Must have Windows running laptop or tablet
  • Connect hardware via USB or HDMI
  • Stream via Wi-Fi or mobile data

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within office hours we have the following response times -

Critical issue - Response within 15 minutes
Major issue - Response within 30 minutes
Minor issue - Response within 1 working day
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing All of our web applications are compliant with the WCAG guidelines and are AA level accessible
Onsite support No
Support levels We will include our standard service level agreement (SLA) at no additional cost. This includes access to our Service Desk availability via phone, messenger (cloud support) and our support portal.

The Service Desk is available as follows:
o Monday to Thursday 8:30am to 6pm
o Friday 8:30am to 5pm

General incoming requests are categorised as follows with the indicated response times:

Critical service outage / security breach:
Response within 15 minutes. Resolved within 1 hour.

Major service issue / non-critical fault / Training requests:
Response within 30 minutes. Resolved within 4 hours (unless onsite training is required).

Minor request for changes:
Response within 1 Working Day. Resolved within a timescale agreed with client. Request for changes will be added to our Roadmap.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started As standard with the service, we include online training and user documentation. We provide a standard template for the site and then offer guidance on how to customise the shell. Public-i can also offer onsite training at an additional cost.
Service documentation No
End-of-contract data extraction There will be a copy of the webcast data on the client's machine. However, we can provide copies of the archive video in a format that suits the client upon request.
End-of-contract process All costs are inclusive in the contract. There will be no additional offboarding charges.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service End viewers of the webcast can watch the live or on demand stream from any mobile device.
Service interface No
Customisation available Yes
Description of customisation The Connect microsite can be customised with various pages and widgets. The "look and feel" can be styled in accordance with an organisations corporate branding. Most of the text content on the site can also be customised.


Independence of resources Due to the advancements in our technology provision (e.g. viewing through mobile devices) the audiences our clients attract have increased and so we have had to cater for significant numbers of simultaneous users. From thorough testing of these changes we can guarantee 10,000 simultaneous users on the microsite homepage and 6,000 simultaneous users able to watch live and archived webcasts without any disruption to the service and playback.


Service usage metrics Yes
Metrics types As standard, we provide admin statistics via login on the microsite. These detailed reports cover webcast views, viewers and a range of other statistics for a custom date range. Reports are viewable on a webpage but can also be exported as CSV.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The desktop software includes a section called "Publisher". This allows the export, import and publishing of webcast data in the form of a XML data file and MPEG4 video file.
Data export formats Other
Other data export formats
  • XML
  • MP4
Data import formats Other
Other data import formats
  • MP4
  • XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Public-i can confirm that Connect has a proven level of resiliency. Over our entire client base our resiliency rate is more than 99.9%. To ensure that no downtime is encountered we have invested in our infrastructure and have dedicated servers on the Amazon CDN and Level3 CDN for live and on-demand streaming respectively. Included as standard is our SLA which includes monitoring of every live webcast. A member of Public-i staff is available on the Service Desk to test every live webcast and available for support via telephone, email and messenger.
Approach to resilience Public-i can confirm that Connect has a proven level of resiliency. To ensure that no downtime is encountered we have invested in our infrastructure and have dedicated servers on the Amazon CDN and Level3 CDN for live and on-demand streaming respectively.
Outage reporting In an instance of service outage we would email the address in each client admin to notify client staff.

We are monitored on this page: which logs recent down time. It is open for clients to visit as and when to check our network performance.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Public-i operate user access with role based accounts.

The Connect application has the following hierarchical privileges:
• super user ( public-i infrastructure / dev staff )
• admin ( client site administrator, public-i account manager, public-i support staff )
• moderator ( client moderator )
• user ( logged in user )
• guest ( not logged in user )
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Trustwave
PCI DSS accreditation date 13/04/16
What the PCI DSS doesn’t cover Nothing, all areas of payment card data security are covered by the certification.
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We comply with EU and British Standard security legislation. Public-i is an ISO accredited company and have a comprehensive Information Security Policy in place
Information security policies and processes Public-i has an Information Security Policy which is available to clients upon request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We make frequent small changes as opposed to infrequent large changes. Code changes are subject to peer review and unit testing. Code is then rolled out into a testing environment and subject to further review before being published live.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Our staff monitor for new vulnerabilities within thrid party packages.

Standard package updates are applied on a monthly basis. Security upates are applied immediately - upon availability.

Our infrastructure department follow alerts from as well as the wider community.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Public-i employ tripwire techniques to monitor any unauthorised changes to server systems or data.

We would restore the data compromised with an earlier version (prior to the compromise). Our staff would look to close the vulnerability that allowed the compromise.

Any affected clients would be notified as soon as when we become aware of the incident and also when we have resolved it.
Incident management type Supplier-defined controls
Incident management approach Public-i has an Information Security Policy in place which defines processes for common events such as intrusion attempts.

Users can report incidents via our Service Desk, online ticketing service and live monitoring.

Reports will be sent via email immediately in the event of an incident occuring and once it has been resolved.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £75 per unit
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑