MeetingZone Ltd

Cisco Spark Video Conferencing Room Systems from MeetingZone

Spark Room Systems consist of a range of video conferencing systems to meet the full range of customer requirements for meeting rooms.
Using the Spark cloud based platform, Spark Room Systems can collaborate seamlessly with other room systems.


  • Portfolio of video conferencing devices
  • Cloud-based service
  • Spark Board: an “all in one” communication device
  • Wireless presentation, digital white boarding, audio and video conferencing
  • DX series: desk-based touchscreen devices idea for individuals
  • SX series: turns any flat-panel display into a video system
  • MX series: turn any conference room into a video hub
  • All connect with the Cisco Spark service
  • Easy set up
  • Secure, reliable open systems


  • No need to invest and manage expensive video infrastructure
  • Full range for small, medium and large rooms
  • Make use of existing kit
  • Bring together physical and virtual teams
  • Discuss and debate important issues, with key people, without travel
  • Improve interaction with remote employees or suppliers and customers
  • Conduct regular team meetings at low cost
  • Disseminate important information, quickly and consistently
  • Hold lively, effective, creative sessions with remote people


£1460.27 per unit

  • Education pricing available

Service documents

G-Cloud 9


MeetingZone Ltd

The Sales Team

0 1844 265 518

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Occasionally we do planned maintenance. This is always scheduled for outside of normal working hours and is always fully communicated to customers. New releases may require upgrading. No mobile clients for Windows mobile.
System requirements
  • Most PCs will be satisfactory if running current Microsoft OS
  • Current IOS or Android mobile devices will work
  • Windows mobile clients not available
  • Most Macs will be satisfactory if running current Apple OSX

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical 1 hour Important 4 hours Normal 6 hours Low 12 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Service is at the core of MeetingZone, our offer includes: - Unlimited number of tickets - System experts on hand to handle requests/ issues - Proactive monitoring for all services - Service reviews with both Service Desk Manager and Account Manager
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Online and onsite training can be provided. User guides available online. Test and training can also be provided.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction All data relating to usage, bookings and history can be provided to customers when leaving us.
End-of-contract process No additional costs at the end of a contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Dynamic adapts same content
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing NA
Customisation available Yes
Description of customisation Elements of UI can be branded


Independence of resources Cisco deploys a globally distributed dedicated network of high-speed meeting switches. Meeting session data originating from the presenter’s computer and arriving at the attendees’ computers is switched, never persistently stored, through the Cisco WebEx Cloud.


Service usage metrics No


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Cisco

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Via the Admin/Members portal with secure log ins.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks End to end encryption option using Advanced Encryption Standard (AES)
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Cisco have no SLAs for this
Approach to resilience The Cisco WebEx Cloud is a communications infrastructure purpose-built for real-time web communications.
WebEx meeting sessions use switching equipment located in multiple data centers around the world. These data centers are strategically placed near major Internet access points and use dedicated high-bandwidth fiber to route traffic around the globe. Cisco operates the entire infrastructure within the Cisco WebEx Cloud. Data within the
United States stays within the U.S. region, and data within Europe remains in the European region.
Additionally, Cisco operates network point-of-presence (PoP) locations that facilitate backbone connections, Internet peering, global site backup, and caching technologies used to enhance end-user performance and availability. Cisco personnel are available 24 hours a day, seven days a week, for logistical security, operational, and change-management support.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Cisco supports federated authentication for user single sign-on (SSO) using Security Assertion Markup Language
(SAML) 1.1 and 2.0 and the WS-Federation 1.0 protocols.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Lloyds Bank PLC
PCI DSS accreditation date 12/01/16
What the PCI DSS doesn’t cover Covers all of MeetingZone Ltd credit and debit card transaction.
Other security accreditations Yes
Any other security accreditations ISO 27001 assured to standard. Full BSI audit Sept 2017

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards ISO 27001 assured to standard. Full BSI audit scheduled Sept 2017
Information security policies and processes We have a ISMS system in place which details all our polices and procedures. This system is managed by our Head of IT & Security

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes in configurations are requested by internal online portal and tracked. Includes testing and roll back planning. Each change before implementation is reviewed against a set of criteria including security by the Change Control Board.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Cisco network monitoring tools analyse threats. Patches are available from Cisco as soon as fix is available. Services vary by severity. Head of IT & Security, working with Cisco who provide this information, as well as Internet Resources, customers,Twitter etc.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Use of monitoring systems by Cisco. Disable access to compromised system and investigate who, what where, when and how. Immediately. Work with Cisco team to fix in real time.
Incident management type Supplier-defined controls
Incident management approach Physical security incidents, e.g. an unauthorised person gaining access to a building or theft of a physical asset (computer, removable media). Third party IT security policy violations, attacks or intrusions, e.g. a denial of service attack against MeetingZone Ltd from a network connection belonging to a remote third party. Internal IT security policy violations, attacks or intrusions, e.g. an employee breaching the MeetingZone Ltd Acceptable Use Policy by surfing to unauthorised sites or downloading malware. Attempted policy violations, attacks or intrusions, e.g. failed attack against a login mechanism (multiple failed login attempts) that was detected by an intrusion detection system.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £1460.27 per unit
Discount for educational organisations Yes
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑