West UC Limited

BlueJeans

BlueJeans makes it easy to host high quality video meetings connecting many participants, using many different devices, supporting many combinations of business and consumer video endpoints. Hosted in the cloud, customers can purchase and launch video conferences quickly and efficiently.

Features

  • Interoperability with Video Rooms, Desktops, Skype for Business, Jabber
  • Multi-Party Meetings - up to 100 participants online
  • Global Cloud Service - no need for installation
  • Mobile Devices Supported with iOS and Android Apps
  • Rich, HD Content and Application Sharing
  • Record Meetings to the Cloud and Distribute as needed
  • Meeting Security with SSL TLS Encryption
  • Command Center - real-tme and historical in-meeting metrics
  • Combine with Video Managed Services for Monitoring and Management
  • 24/7/365 Customer Support and Escalation Available

Benefits

  • Connect to a wide range of endpoints, platforms and devices
  • Enable users with HD Video Conferencing without CAPEX investment
  • Flexibility - join meetings anywhere with no additional hardware
  • API and Extension Options - Outlook and Google integration
  • Collaborate Quicker with Application and Content Sharing
  • Redundant network design and scalable, distributed architecture
  • Comprehensive support services - 24/7/365 telephone support
  • Self Provision new accounts from the Administration Portal
  • Full Range of Use Cases Supported - Interviewing, Collaborating, Training

Pricing

£17 per person per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

546849572738708

West UC Limited

West UC and Collaboration Team

02031947102

ciscocollaborationEMEA@west.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints As a hosted service, planned maintenance may cause downtime outside business hours; these are communicated to customers.

Customers must configure access to service via appropriate ports.
System requirements
  • Licence or Concurrent Port Purchased
  • Desktop - Browser or WebRTC
  • Smartphone or Tablet access via Android or iOS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Emails are responded to - SLA is 95% within 12 Hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels West's customer service and technical support is available 24 hours a day, 7 days a week. Support can be accessed via phone or email.

West’s 24/7 live end user support desk delivers first line technical support. End users are provided with a single number which routes to our Help Desk to field/triage the query. The Help Desk escalates matters seamlessly to the appropriate West team for support and timely resolution.

Service Availability SLA is 99.5%

Customers may also have access to a designated BlueJeans Customer Success Manager subject to contractual commitment.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started West will provide access to user guides, getting started videos, and remote training sessions (recorded or live).
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction End user data and company data is stored in-region at West and BlueJeans owned operation centers and co-location data centers. Additionally the data is stored in the US. West is EU Safe Harbor certified. After Safe Harbor invalidation in October 2015 a new data protection mechanism between the US and EMEA has been developed and is called US EU Privacy Shield. West is working on the certification which should be completed in 2017. In the meantime West is using the EU model clauses released by the EU Commission in order to arrange a secure data transfer. Customer data is controlled under these principles including when customers' contracts ends and their subscription is terminated. Data is removed or extracted upon request in a suitable transferable format.
End-of-contract process BlueJeans is a subscription service. Should the customer elect not to continue their subscription by giving the stated written notice, West will work with the customer to confirm a switch-off date and any data or materials the customer can reasonably expect such as end-user reporting. West can provide exit assistance as reasonably required and have a sample reversibility/exit plan that can be reviewed upon request.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No major differences - people can host or join video conferences, see content and control their experience
Accessibility standards WCAG 2.0 A
Accessibility testing BlueJeans accessibility features enable customers with disabilities such as visual and hearing impairment to attend and participate in a BlueJeans meeting from any computer or mobile device.

These enhancements to the service are based on the Web Content Accessibility Guidelines 2.0 and the 21st Century Communications & Video Accessibility Act requirements and are made in order to expand BlueJeans’ accessibility to customers with disabilities.
API Yes
What users can and can't do using the API Wide variety of support is possible including Single Sign On support

https://github.com/bluejeans
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Service can be branded with logos, colours and watermark. Email invitations can also be branded. This is completed at the site level by site administrators.

Scaling

Scaling
Independence of resources BlueJeans is a convenient scalable enterprise video platform that can be easily increased by adding licenses or virtual ports as needed. Instead of committing large sums of money toward conferencing equipment, you can add access as your company grows.

Capacity is managed and monitored centrally with additional capacity added proactively as global access to the platform increases.

Analytics

Analytics
Service usage metrics Yes
Metrics types Deployment Dashboard. See status, utilization, geographic distribution, and end-of-meeting quality survey results at-a-glance.

Historical Reports. Meeting, endpoint, and network metrics for every conference.

Instant Access. Powered by the BlueJeans cloud, you get deployment-wide reports with nothing to install, configure, or maintain

ROI (return on investment) dashboard that estimates reductions in carbon emissions and travel expenses. By estimating the distances and likely travel methods between meeting participants, the dashboard calculates the miles, carbon emissions, and travel costs saved by conducting these meetings over BlueJeans
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold BlueJeans Network

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach FIPS-assured encryption
Other encryption
Secure containers, racks or cages
Physical access control
Assured by independent validation of assertion
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach By logging into Command Centre, users can export data on users, meetings and even per meeting metrics.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99.5%
Approach to resilience Backup, disaster recovery and resilience plan in place. Further information available under NDA.
Outage reporting Users or administrators can view status via http://status.bluejeans.com/

West can also sign customers up for service status alert emails.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Data is logically seperated
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach West is a reseller of BlueJeans.

The service is hosted in multiple ISO27001 certified top-tier co-location data centers around the world, and in each of these PoPs, dedicated cages and racks are protected with 24x7x365 security and multiple levels of biometric access controls. Access to the cages is restricted to BlueJeans Operations personnel.
Information security policies and processes West has in-place a organisation wide Information Security policy with written processes and procedures. Staff are trained both during onboarding and annually in key security concepts. The West IS policy has a senior member of the board named for responsibility.

BlueJeans also has a full written security policy and key procedures and processes. More can be read here; https://www.bluejeans.com/sites/default/files/pdf/Blue-Jeans-Network-Security.pdf

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach As per the BlueJeans Control Policies and Risk Management policies, all changes to the service go through a change management process that includes notifying our customers in case of any significant change on the BlueJeans architecture.

The formal process includes assessment across departments for risk
Vulnerability management type Supplier-defined controls
Vulnerability management approach BlueJeans periodically scans for network, port, and application-level vulnerabilities. Vulnerability scans are conducted by a leading 3rd party SaaS provider, in addition to some special-purpose, in-house scanning tools. Furthermore, all of the 3rd party applications and operating system software is checked for security advisories and is patched periodically.

Routers, firewalls, load balancers, and proxy application servers are all configured to mitigate numerous types of DOS attacks. BlueJeans also engages with 3rd party consultants to perform penetration testing. All of their findings are reviewed and appropriate actions are then taken to address and mitigate vulnerabilities found in the service.
Protective monitoring type Supplier-defined controls
Protective monitoring approach BlueJeans employs a wide range of security management practices to provide a secure and reliable service to customers. This includes network firewalls throughout the infrastructure to create security zones for different applications and services. BlueJeans deploys proxy servers that terminate all 3rd party / customer traffic at a proxy layer. All web traffic passes through industry-leading load balancers to protect against a suite of application attack vectors.

Compromises are proactively worked by the BlueJeans InfoSec team and escalated based on severity level until completion.
Incident management type Supplier-defined controls
Incident management approach Incident management from end users is controlled via Phone or Email. End users can contact West with any incident as our NOC is manned 24/7/365. Incidents are assigned a severity level and prioritised for action. Customers are informed regularly via email and phone for status updates including ticket closure.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £17 per person per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial West would provide a range of fully enabled trial accounts on a limited basis, usually 2 weeks. Beyond this we offer paid Proof of Concept stages prior to any full deployment.

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑