Konica Minolta Business Solutions (UK) Ltd

Cloud SMS Platform

SMS messaging service developed and supported by ProcessFlows UK Limited – a fully-owned Konica Minolta subsidiary.

The solution is cloud-based, built on Microsoft Azure platform, with guaranteed uptime, available from any Internet connection, no need for in-house hardware or mobile contracts – only pay for messages sent, not the platform.

Features

  • SMS surveys and campaigns
  • Advanced bulk messaging
  • SMS developers APIs
  • Quick and easy set-up
  • Pay-as-you-go or periodic invoicing available
  • Restful APIs
  • SMPP Gateway
  • Two-way SMS messaging
  • Alpha IDs for outbound campaigns
  • 24/7 support options

Benefits

  • Online-web portal to track all message activity
  • Your messages accessible from any device that has Internet connectivity
  • Short and long numbers provided to support campaigns etc.
  • SMS email Gateway
  • SMS Gateway adds text function to all email applications
  • Online real-time reports
  • Schedule message activity
  • Message a group of contacts at the same time
  • Free SMS Web Client
  • Pay only for messages sent

Pricing

£0.02 to £0.06 per unit

Service documents

G-Cloud 10

580297360726313

Konica Minolta Business Solutions (UK) Ltd

Grace Ejiga

01268 534444

bidsandtenders@konicaminolta.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints None
System requirements
  • Supported Web Browsers (Internet Explorer, Chrome, Firefox, Edge, Safari, Opera)
  • No other system requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 1 – 4 hours, depending on the severity of the call.
Standard UK office hours are 09:00 to 17:00. Outside of these hours, a 24/7 call-logging service is made available (please see our SMS Service Definition document for further details)
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible The web chat is accessible via the following link https://www.tawk.to/legal/.
This is for tawk.to subscribers and suppliers who have questions about our terms, policies, privacy and compliance.
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels We offer an additional Enterprise Support Level, which we tailor to the customer’s requirements. Costs are dependent on the additional requirements requested.
Technical account management, and access to support engineers, are included within our standard support offering.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Our platform is considered intuitive enough to be classified as ‘self-service’. We also offer remote access support and training to get administrators and users familiar with the platform.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Microsoft Word
  • Via our website
  • Via our Sales line on 01962 835000
  • The UI also provides users with ‘information’ hover buttons throughout
End-of-contract data extraction Via our support team. Following a customer request, up to 12 months’ data associated with the client’s use of our system can be compiled and emailed to the client (free), or ‘FTP'd’ to the client (free), or physically posted on DVD(s) (for a fee).
End-of-contract process Accounts on our platform remain active indefinitely, and can be used to send and receive SMS messages, subject to credits being available on the account.
Credits remain on an active account indefinitely. If or when a customer decides to leave the platform, they can request that their data be purged/extracted.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service There are no differences between the mobile and desktop versions; all features are available to users accessing the platform from any device. Web interface will fit to screen, based on the device used.
Accessibility standards None or don’t know
Description of accessibility Service is simply accessed via laptop/tablet/mobile device.
Accessibility testing None
API Yes
What users can and can't do using the API The RESTful API permits programmatic access to SMS messaging features available on the SMS messaging platform. It allows you to simply and quickly enable text applications from within your existing and familiar development environments.

Please review our code samples, but if you are unable to find what you are looking for please contact us for development advice and assistance.
We are a Microsoft Gold Partner, with almost 30 years’ experience of developing and integrating business solutions.
Our experienced SMS development team can assist you with your development queries, or you can outsource the development to us. Either way, we will ensure that SMS integrates with your existing IT investments perfectly and fits your exact requirements.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The SMS Web user interface (UI) can be ‘white labelled’ in order to present the interface with the end user’s logo/colour scheme etc.
This service is at an additional cost, and is provided by our SMS development team.

Scaling

Scaling
Independence of resources We implement Microsoft Azure’s ability to scale instances of services, and web applications based on utilisation metrics.

Analytics

Analytics
Service usage metrics Yes
Metrics types Customer usage reports are sent out on a monthly basis. These reports show traffic volumes over the month / day, as well as run-rate predictions based on the previous month’s data – 60, 30 and 7 days.
Reporting types Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach By contacting the support team.
Data export formats
  • CSV
  • ODF
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Other
Other protection within supplier network All the components that make up the 123-txt platform are connected via the same VLAN. Unrelated services hosted on Azure cannot fake traffic or eavesdrop on traffic within the 123-txt VLAN.
Connectivity from the front end to the backend is via TLS v1.2.

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% assured by contractual commitment
Approach to resilience Multi-instance applications working together via loosely coupled communication. Instance monitoring with automatic restart depending on gathered metrics. We only use third party services that provide fault tolerance in the form of multi server connections. We have automatic alerting to administrators on service outage.
Further information can be provided on request.
Outage reporting Email alert to 123-txt admins, not clients.
Email alerts are based on notification provided by the mobile networks status emails and planned maintenance. In most cases, there is no detriment to services.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Leverage Microsoft Azure security controls
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 NQA
ISO/IEC 27001 accreditation date 26/11/2013
What the ISO/IEC 27001 doesn’t cover All relevant and applicable products, services and processes are covered
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Cyber Essentials, and Cyber Essentials Plus
  • Common Criteria and ISO 15408

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards • Cyber Essentials, and Cyber Essentials Plus
• Common Criteria and ISO 15408
Information security policies and processes Konica Minolta is committed to operating an effective Information Security Management System that will ensure information is protected from a loss of confidentiality, integrity and availability.

Given this, our basic approach to information security is to continuously make improvements by measuring and assessing risks associated with important information assets and applying effective measures to mitigate those risks.

To support this, we have identified key information security principles; and to ensure these key principles are met, we have established a set of information security objectives as part of our Integrated Business Management System which are monitored and reviewed regularly.

This Policy covers Konica Minolta Business Solutions (UK) Ltd and all relevant subsidiaries, including all UK regional offices. It is applicable to all colleagues, visitors, suppliers, customers and contractors related to business activities, products or services.

Compliance with the Information Security Policy is mandatory. All Leaders are directly responsible for implementing this policy and ensuring colleagues’ compliance within their Business Units and Shared Functions.

In terms of the cloud-based platform, the system creates a full audit of all activities that occur on the platform. In addition to ongoing training and staff awareness, we monitor audit activity for signs of suspicious activity.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We employ a development and test environment. Bugs, enhancements and new features are documented, considered and actioned. Changes are pushed onto the test platform and thoroughly tested before being considered for deployment to the production environment.

We use a full featured code base management product for holding our code, documenting and testing, which includes a ticketing system for tracking bugs/enhancements/feature requests from notification to completion.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability patches are made available as a matter of urgency, and we would anticipate a secure workaround or patch being made available within 8 working hours of being reported.
We stay abreast of security threats by monitoring various news feeds and journals, both public and private sources.
Protective monitoring type Undisclosed
Protective monitoring approach We would anticipate a compromise workaround or patch being made available within 8 working hours of being reported.
Incident management type Supplier-defined controls
Incident management approach As per our Service Definition document, incidents can be reported via email at support@processflows.co.uk, or by phone on 01962 835001.
The Service Desk operates Monday to Friday, 09:00 to 17:00, and works within a 1 – 4 hour response time, depending on the severity of the call.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £0.02 to £0.06 per unit
Discount for educational organisations No
Free trial available Yes
Description of free trial Set up of an account with 500 free messages, with access to Account Manager and Support Desk. No time limit.
Link to free trial http://123-txt.com/

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑