Specialist Computer Centres plc

Video Conferencing as a Service (VCaaS) powered by BlueJeans - Video enabled Meetings

BlueJeans Meetings enables easy to use, cross platform enterprise-grade video calls - all in high definition Dolby audio. Connect instantly with colleagues and customers from virtually any mobile device, Browser, laptop or conference VC room system. Platform Capabilities - Video meetings - Web meetings - PSTN audio & Dolby VoIP.


  • Meet with up to 150 Participants Mix any device
  • Join from Desktop /Browser/Mobile/VC system/Skype Client
  • Best in class Dolby voice audio
  • Screen Sharing & Collaboration
  • One Click Scheduling - Microsoft 0365 - Exchange - Gmail
  • One click join workflow All mediums - consistent UI
  • Cloud Recording and Streaming ( unlimited recordings )
  • Compatible with Cisco/Polycom/Lifesize All H.323/SIP systems
  • Intelligence & Analytics
  • Video - Web - PSTN - VoiP (4 in 1)


  • Meet anywhere, anytime, on any device
  • Simple , Intuitive end user focused interface
  • Better than being there meeting experience
  • Friendly integrations into all leading business applications
  • All inclusive flat cost service
  • Pre-deployment planning & on-boarding
  • 24/7/365 Support (Dedicated support team included)
  • Global PSTN included at no additional charge 50 + Countries
  • Consolidate all of your meeting types into a single solution
  • Reduce travel - Save time - Increase productivity


£156 to £774 per user per year

Service documents

G-Cloud 10


Specialist Computer Centres plc

Mike Nelson



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Maintenance, upgrades or updates will be pre-arranged with customers and due to the resilient nature of the solution will typically not impact normal running. The solution will be completely managed by SCC, utilising their 2nd and 3rd line Network Operations Centre (NOC) resources.
System requirements
  • Windows, Mac, Linux
  • Intel i3/ i5/ i7, Core2Duo
  • RAM: minimum 1GB
  • Memory: At-least 50MB of free space available
  • 1 Mbps recommended for high video resolution
  • BlueJeans Network Readiness Guide

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 1 Hour Advanced Service plan - 4 hour in basic plan
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels Dedicated Account Manager - Technical Account Manager - Solutions Engineer -Deployment Manager - Customer Support Manager -Tier 1 & Tier 2 (24x7 support)
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide both onsite and online training through our Post Sales Support and Customer Success Managers as well as rich documentation publicly available on our website
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Users can download their recordings prior to the contract expiration. In addition End user data can be deleted upon request. For historical meeting data (meeting times, duration, number of endpoints, etc.), upon request we can anonymize the data so that it cannot be tracked back to a particular user or enterprise.
End-of-contract process We strive to provide the best service to our users. Throughout the lifecycle of our contract with you, we want to make sure that we understand what is working and where we may have an opportunity to improve for you. This approach include end of contracts with our users. Our team would like the opportunity to understand over all feedback of our service during the contract as well any reason for no longer renewing with us

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The service works in the same way across platforms. BlueJeans delivers a consistent interface and single touch to join workflow on Mobile & Desktop app.
Accessibility standards WCAG 2.0 A
Accessibility testing Our development team works based on the Web Content Accessibility Guidelines (WCAG) 2.0 Level A conformance for the BlueJeans In-Meeting Experience using Google Chrome browser plus ChromeVox Extension For more information please see: https://www.bluejeans.com/features/accessibility And https://support.bluejeans.com/knowledge/accessibility-features
What users can and can't do using the API The BlueJeans API is a JSON REST service that communicates over HTTPS to api.bluejeans.com. JSON: JavaScript Object Notation REST: Representational State Transfer HTTPS: Hypertext Transfer Protocol (secure) Each API request must include a valid token, which is issued to the user at the time of consuming the Authentication API. Tokens are time‐based token that remains active for one hour. Keys are rotated annually or as needed upon termination of operational employees. An Enterprise customer can request an API trial and access to a API test site to test against. Changes can be made available to the BlueJeans API team that can add code as required.
API documentation Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Customizing the dial-in phone numbers that appear in email invitations and meeting web app. Replacing the BlueJeans logo with your own branding. Adding a customized header to your meeting invitation emails. Adding customized text in the body of your email invitations


Independence of resources 60/40 reorder rule – Upon reaching 60% capacity in any given POP for 5 minutes, we begin ordering enough capacity to lower to 40%. Peak usage is checked weekly and reported. Capacity is re-evaluated after each release using controlled load testing


Service usage metrics Yes
Metrics types Real-Time Meeting Metrics - Review metrics like host names, size, and recording status Real-Time Endpoint Metrics - Monitor quality-of-experience metrics for every endpoint Real-Time Network Metrics - Graph quality metrics like bitrate, jitter, and packet loss
Reporting types
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold BlueJeans

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach The core of the Blue Jeans infrastructure that provides the meeting services are hosted in Equinix data centers on BJN owned hardware. From a security perspective, Equinix provides physical security, power and environmental controls (HVAC, Fire Suppression, etc.). Equinix does not have logical access to any systems owned by Blue Jeans or systems that host customer data.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach End users can download their recordings anytime from their respective portal and the IT admin can download reporting information from Command Center in a CSV format.
Data export formats
  • CSV
  • Other
Other data export formats
  • PNG
  • PDF
  • JPEG
  • SVG
Data import formats
  • CSV
  • Other
Other data import formats Single Sign On User Data via AD connection with SAML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Service Level Agreements are mutually agreed upon and covered in the Master Service Agreement with our customers.
Approach to resilience The service was built from the ground up by Blue Jeans and consists of software that runs on cloud-compute clusters from a leading global server vendor. The service is hosted in multiple top tier co-location data centers around the world, and in each of these PoPs, dedicated cages that only Blue Jeans personnel have access to and are protected with 24x7x365 security and multiple levels of biometric access controls. At least N+1 redundancy in power distribution, UPS systems and generator backup with 48 hours worth of generator fuel and contracts with multiple fuel providers. Per Equinix Website: http://www.equinix.com/resources/infopapers/equinix-colocation-brochure/ BlueJeans has built a redundant network infrastructure to support our global cloud service. The service is hosted in multiple tier-4 co-location data centers around the world. We have a complete disaster recovery plan in place. This includes a full DR site via our US east coast data center. This should allow operational recovery in the event of a disaster within our targeted 4 hour RTO (Recovery Time Objective). This is tested periodically and in our last test of this we were able to overachieve our target.
Outage reporting In the event there is severe degradation or outage of the System, communication procedures are followed. If there is a suspected breach or known intrusion, the Security Incident and Reporting Process is triggered. The process begins when “notification” occurs or is initiated from an internal source or external customer source. All incidents are logged into the issue tracking and planning software application and tracked through to completion by Engineering/Support/IT/NetOps teams. IT/NetOps will be responsible for performing an RCA (Root Cause Analysis) and communicating these incidents. NetOps and Security are responsible for communicating these incidents to the CTO and to log into the Company’s private chat service to communicate specifics of an incident, status updates and continued posts for the duration of the incident. If the production environments are inaccessible for any significant period of time, Customer Support will notify affected customers and provide updates when the Blue Jeans service is restored. The incident response program has been tested and utilized from an availability perspective on a quarterly basis. Changes that impact system Security, Availability and Confidentiality are communicated to customers on the website prior to the change, maintenance or as a result of an outage/incident.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication BlueJeans uses the secure and widely adopted industry standard Security Assertion Markup Language (SAML), for Single Sign On method. This also means BlueJeans implementation of SSO integrates easily with any large Identity Provider (IdP) that supports SAML. If you've built your own SAML-based federated authentication process, we integrate with that too. We support service-provider-initiated SAML and identity-provider-initiated SAML.
Access restrictions in management interfaces and support channels Access is given on a permissions basis. Only specific users in specific roles and job responsibilities will get Access to certain functions. Employee (user) and contractors access to production systems is granted based on role and functional responsibility. Access changes are approved by the business owner. Employee terminations follow Human Resources’ (“HR”) off boarding process. HR sends an email communication to IT, Operations and other internal service groups to disable/remove access as necessary.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • SOC 2 & SOC 3 Certified. Renewed Annually
  • BlueJeans information security program is based on the ISO27001 framework
  • BlueJeans utilizes ISO27001 Hosting providers
  • BlueJeans working to map controls with COBIT and CSA

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards We follow an ISO 27001 framework and BlueJeans are SSAE 16 SOC2 Type II certified.
Information security policies and processes BlueJeans information security program is based on the ISO27001 framework and we are working to map controls with COBIT and CSA . An information security policy is currently set in place and has been reviewed by management and is being communicated to appropriate constituents. The information security policy is owned and maintained by the acting Security Officer. Policies are reviewed annually. In the event that a security incident occurs, personnel would immediately inform the Security Officer, CTO and Support Organizations. We have an incident management standard. It ensures the following: - Security incidents are communicated quickly and allow for corrective action to be taken - Implementation of a reporting and response mechanism to address incidents as they arise - Loss of service is prevented or mitigated quickly - Compliance with legal requirements The incident response program has been tested and utilized from an availability perspective on a quarterly basis. Changes that impact system security, availability and confidentiality are communicated to customers on the website prior to the change, maintenance or as a result of an outage/incident.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All externally facing services are scanned periodically for network, port and application-level vulnerabilities. Blue Jeans uses a leading 3rd party SaaS service for vulnerability scans as well as special purpose scanning tools run in-house. Blue Jeans also engages with 3rd party consultants to perform penetration testing of the service on a quarterly basis. Each outside provider has undergone controls suitable for the Blue Jeans service as per our criteria and partakes in vulnerability assessments by third parties. 3rd party organisations must submit SOC1/SOC2 reports and security questions as well as agree to Security requirements set forth in contracts.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach BlueJeans takes a pro‐active approach to identify, understand, and mitigate risks to the Company, its business and technical operations as well as to its customers. The risk assessment and overall risk effort is multi‐step beginning with the (1) Security Engineer’s review of critical risks (internal and external), (2) a subsequent review with the CTO, (3) follow‐up with ongoing and independent third‐party provider performing independent and dynamic security tests, (4) a risk assessment meeting with key executives and teams and (5) final compilation, creation and updating of significant operational and technical risks.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach In the event of a defined incident, Blue Jeans will follow the incident response plan and ensure the disaster recovery team executes a resolution during this real‐world impacting event. Employees and industry standard tools provide continuous coverage to detect incidents and to manage the impact and provide resolutions in a timely manner. Key TechOps, Security personnel as well as Executive management members review this plan annually. 
Security, availability, data confidentiality and protection are the highest priorities. In an effort to raise the bar we’re implementing a solution for data protection against complete site failure of our primary data center.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Management has communicated to staff the procedures for identifying and reporting incidents. Depending on severity of the incident, communication is established to Support, Operations, Security Engineer and/or CTO. The Standard Incident Management policy describes and defines the methods for identifying, classifying, tracking, and responding to security and incidents that will impact the business operations at Blue Jeans. To meet and exceed Blue Jeans' ability to address any incidents, the following plans are in place: Incidents and Rapid Response plan, Security Incident Reporting and Communication plan, Prevention of Incidents, Breech Notification Protocol, Customer Notification, Internal Notification, External Breech Notification.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Joint Academic Network (JANET)


Price £156 to £774 per user per year
Discount for educational organisations No
Free trial available Yes
Description of free trial 30 day Free Trial. BlueJeans Meetings / BlueJeans Event / BlueJeans Rooms with Dolby Conference phone
Link to free trial https://www.bluejeans.com/trial/experience


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑