Video Conferencing

Cloud, subscription based Video conferencing service. End to encrypted, on demand service delivering High Definition Video with Microsoft teams Cloud Video Interop. We offer room capacity up to 100 participants with interoperability for all major platforms.


  • Plug and Play, activate in minutes, no plug--in required
  • Scaleable, host up to 100 partcipants
  • Encrypted, End-to-end encryption provides maximum security
  • Ubiquitous, works as bridge of bridges across disparate platforms/hardware
  • Fast, launch meetings in seconds
  • Reliable, Ensure consistent streaming with our intelligent platform & redundancy
  • Managed, Securely delivered from our fully-managed public or private cloud
  • Content sharing
  • Enhanced levels of secuity
  • One click joining from Cisco and Poly devices


  • Intuitive, user friendly platform
  • No lower limit, users can begin deployment with one licence
  • Microsoft teams interop bridges the virtual and physical video environment
  • Engage naturally with clients and colleagues
  • Bring teams together securely and confidently
  • Manage rooms by addition of passwords
  • Increase security by creating unique rooms for each meeting
  • Easily share allow all guests to share content
  • 24/7/365 help desk support


£17.50 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 7 5 8 9 1 6 0 5 3 1 7 4 8 3


Telephone: 07485015930

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
System requirements
  • Desktop client Microsoft Windows 7 and later & MAC
  • Webclients, Google Chrome, Mozilla Firefox, Opera, Internet Explorer, Apple Safari
  • CPU, Recommend Intel Xeon E5-2600/4600 series, 2.7GHz or higher.

User support

Email or online ticketing support
Email or online ticketing
Support response times
CommuniCloud shall use reasonable endeavours to meet any performance dates or service levels specified in a Schedule or Order but, unless otherwise expressly agreed within a Schedule, all timescales shall be estimates onl
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Support levels
Full helpdesk and remote support available. Agents will provide support and guidance to resolve common errors and can provide VPN access where necessary
Support available to third parties

Onboarding and offboarding

Getting started
Customers will be assigned a named contact as an account manager. The account manager will own each stage of the onboarding process from capturing the customer requirements to activation and handover. Each end user will receive an invitation to attend an online training session with one of our specialists who will deliver full user training. In-life, users can request refresh training or access our library of content
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Communicloud deletes user information per our information retention policy and in compliance with GDPR requirements. On request, users can request that their data be retained for longer than the standard period
End-of-contract process
The service is a software based offering. Upon the end of a fixed term contract the contractual terms change to a rolling 30 day contract. Customers can cancer their service at this stage at any time by submitting their intention to cancel, providing a minimum of 30 days written notice.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Differences between the mobile and desktop service
Full feature service is available on our desktop or mobile client. Use of the app is not a pre requisite as WEB RTC is available as an alternative
Service interface
What users can and can't do using the API
Embed the platform into 3rd party software and websites. Link provisioning to 3rd party solutions such as Active Directory
API documentation
API documentation formats
API sandbox or test environment
Customisation available


Independence of resources
Our platform is a flexible, cloud based service. Utilisation is constantly monitored and adjusted according to actual and predicted demand. Our service is built on the Pexip platform, with a global array of POPs with our intelligent routing ensuring the calls will seek the path of least congestion. Our contingency measures have been robustly tested during the Covid pandemic where no congestion was experienced and no calls failed. Our Quality Assurance measures run automated and manual tests against a range of scenarios and load testing to verify platform resilience and failover.


Service usage metrics
Metrics types
A) Conference Activity
b) Customer Invoice
c) Ticket reporting
d) Video Quality reporting
e) Site information reporting
f) User reporting
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Standard reports can be exported to CSV format. The reports include all user information.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our services availability target to Customers is 24x7x365 and include a SLA for system availability as well as call quality. We use commercially reasonable efforts to provide Customers with average annual Services availability equal to or greater than 99.95%.
Approach to resilience
Application level resiliency greatly improves on a conference experience during for instance temporary network outages, as our service will automatically re-establish the conference when the network connection is re-established. At the heart of our deployment are global conferencing nodes. This ensures local capacity where it’s needed, enabling local media traffic and local capabilities, such as interoperability, transcoding, endpoint registrations, and more.

Local capacity also means reduced latency, enhancing face-to-face meetings. It also means distributed conferences, where everybody sees the same meeting layout and content. Local conferencing nodes means no cascading, and perhaps most importantly, significantly reduced bandwidth consumption and added resiliency. This distributed architecture is a patent protected technology.
Outage reporting
Our NOC delivers alerts for any customer affecting outage. This is delivered using a multi-channel approach, in the first instance va your dedicated service delivery partner and also via email distribution.

Where the service is at platform, or global scale, a master soutage ticket is raised and all nominated contacts will be notified as this ticket cycles through it's stages of resolution.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interfaces and support functions have enhanced levels of access. Out approach to security is always zero trust. Administrators, managers and support functions must be specifically nominated for enhanced privileges
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Commercially sensitive, available on request
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Available on request
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
Available on request
PCI DSS accreditation date
Available on request
What the PCI DSS doesn’t cover
Available on request
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our information security policies and processes are defined in line with GDPR requirements - full copy available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The Communicloud helpdesk will act as a single point of contact for the Customer regarding faults, incidents and change requests. Incidents are managed my Communicloud on the customers behalf
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request
Incident management type
Supplier-defined controls
Incident management approach
Available on request

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£17.50 a licence a month
Discount for educational organisations
Free trial available
Description of free trial
Full service deployment for 30 day access to all features and functions
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.