LogMeIn

GoToWebinar

GoToWebinar enables organizations to conduct do-it-yourself, one-to-many information presentation events reaching local and global Attendees over the Internet. Webinars are scheduled, convened and moderated using the GoToWebinar web site and/or executable customer software.

Features

  • HD Video Conferencing
  • VOIP, Phone & Toll Free
  • Integrations and Open APIs
  • Online & Local Recording
  • Polls, Handouts, and Q&A
  • Reports, Analytics
  • Simulated Live Events
  • Video Editor & Video Sharing
  • Support up to 2,000 participants

Benefits

  • All-hands and town halls
  • Expand your reach
  • Generate Leads easily
  • Integrate & automate your users and registrations
  • Internal training
  • Onboard new customers
  • Reduce overall expenses
  • Reliable, Scalable & Secure

Pricing

£55.20 per licence per month

Service documents

G-Cloud 11

896381173652139

LogMeIn

Channel Sales operations @ LogMeIn

00353858885888

PartnerOps-International@logmein.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Recomended Hardware: 2GB of RAM (minimum), 4GB or more of RAM (recommended)
Webcam for HDFaces
Microphone and speakers (USB headset recommended)

Further details at: https://support.logmeininc.com/gotowebinar

We regularly discontinue support for older operating systems once Microsoft and Apple discontinues their support of them. Therefore if you are a GoToWebinar organizer with an older operating system, then you will not be able to start sessions from these operating systems. Since it is not possible for you to host sessions using the browser-based Instant Join app, you will need to upgrade your operating system to download the latest build of the desktop app.
System requirements
  • Internet Connection on Computer: 1 Mbps or better (broadband recommended)
  • GoToWebinar Desktop app for Staff/Organizers (Javascript enabled)
  • Windows 7-10 or Mac OSX10.9 - macOS Mjjave (10.4)
  • Supported Web Browser for scheduling webinars

User support

User support
Email or online ticketing support Email or online ticketing
Support response times For customer support, a 24 hr ticketing response time and 5 minute chat response time is supported. Further information about customer support found at following link:https://support.logmeininc.com/contactus . Our customer support center hosts support channels and contact methods across all products, free of charge. This is a central reference point when requesting support. The support site contains: Answers to commonly asked questions and technical issues Getting started advice, account and billing topics, audio set up, webcam and recording topics, and troubleshooting advice Helpful training videos Technical documents designed to help you get the most out of your investment in the product
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Your CSM will provide and discuss all training options that will best fit your organizational needs. We can be as involved as hosting private, tailored training for your users or educate them about our online resources and live, public trainings offered almost daily. A successful deployment of GoToMeeting for your business is our number one goal, and we are here to help!

In addition, you will have
Localized, 24/7 phone & web support on EVERY plan
Dedicated account management for major accounts

Your CSM and Account Manager is dedicated to your account. Our 24x7 support is shared, however we have experts at all levels to make sure your inquiries are addressed in an efficient and effective way.

SLA can be provided
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The Early Life Customer Success Manager (CSM) is your GoTo onboarding specialist. They are dedicated to a successful deployment of GoTo within your organization and will work with you to ensure a quick return on your investment.

During the first 90 days of your GoToMeeting/GoToWebinar experience, your CSM is your dedicated resource to help you implement and adopt GoToMeeting/GoToWebinar Your CSM will work with you to tailor your experience to fit your desired outcome. They’ll provide you with tools and resources to ensure a smooth roll-out and adoption within your organization. Your organizers will be up and running, confidently hosting meetings and making an impact in no time.

We proudly offer a broad range of fee-based event services and training designed to help you maximize the benefit of our services.  We also offer free live training. to quickly gain key skills to optimize your new service. You will have the opportunity to submit questions to our experts and get answers in real time. Many classes are held daily, several product offerings offer multiple classes per day. Visit this support site article to sign up for Ask the Pros and training for organizers and administrators.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Video
  • TBD based on onboarding and deployment
End-of-contract data extraction GoToWebinar users can delete their recordings within their services environment. Further, at any time, GoTo Services Customers may request the return or deletion of their content through standardized interfaces. If these interfaces are not available, LogMeIn will otherwise make a commercially reasonable effort to support the Customer, subject to technical feasibility, in the retrieval or deletion of their Content. Additionally, Customer Content will be deleted within thirty (30) days of Customer request.
To account for a seasonal user base, GoToWebinar accounts shall be deleted two (2) years after expiration or termination of the then-final term. GoToStage users may unpublish/remove any published webinars at any time, during an active GoToWebinar subscription, via self-service through the GoToWebinar services environment and/or by submitting a support request to LogMeIn. Upon written request, LogMeIn will certify to relevant account and Content deletion.
End-of-contract process As specified in the "End-of-contract" process, each customer may delete or export relevant Customer Content, and in any regard, such Content would be subject to reasonable retention periods (as specified in the "end-of-contract data extraction" section above). Additional information can be found at the product-specific Security and Privacy Operational Controls found at: https://www.logmeininc.com/trust/resource-center. LogMeIn is always seeking feedback and areas for improvement, both throughout the contract lifecycle, as well as thereafter; this may include, if permitted to do so, soliciting input from our users.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Please reference: https://support.logmeininc.com/gotowebinar/help/mobile-feature-comparison-g2w070004
Accessibility standards None or don’t know
Description of accessibility We are working towards making our products and services more accessible for assistive technology users and may provide a VPAT that outlines how we meet accessibility needs upon request.
Accessibility testing LogMeIn is continuously evaluating ways to deliver our products and services to become more accessible for assistive technology users.
API Yes
What users can and can't do using the API GoToMeeting and GoToWebinar have an open API. This gives you the ability to seamlessly integrate GoToMeeting and GoToWebinar with a plethora of your systems. There are many integrations that are already built and can be found in the Integration Marketplace (https://www.gotomeeting.com/integration-marketplace), however if you want to create an integration you can utilize the Developer Center (https://goto-developer.logmeininc.com/apis/apis-overview) .
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation After you've scheduled a webinar, you can customize the way that it looks and what options will be available to attendees. Customization abilities include but are not limited to:
• Edittitle and description
• Edit date, time, timezone or language
• Add another session to a webinar series or sequence
• Add a session to your calendar
• Cancel a session in a series
• Add co-organizers
• Change the audio options
• Customize the branding and theme for the webinar
• Add panelists

Fully customizable invitations and reminders are available. Branded registration pages are supported OOTB. There are customizable registration settings, can choose registration fields and questions, add logo and picture and ensure that you're GDPR compliant with ability to get consent of attendee. From the Share Your Webinar section you can Copy Webinar Information: Copy and paste the webinar registration information onto a web page, document or wherever you'd like. To select all the text shown, click Select All to highlight everything, and then copy and paste it by right-clicking the highlighted text and selecting Copy. Or, you can select the highlighted text and press Ctrl+C on your keyboard to copy then Ctrl V to paste

Scaling

Scaling
Independence of resources LogMeIn leverages a multi-tenant architecture which is logically separated at the database level based on the organization’s LogMeIn account. Only authenticated parties are granted access. Solution is built with full redundancy of our data centers, reducing the risk of downtime and single-point-of-failure.

Analytics

Analytics
Service usage metrics Yes
Metrics types Organizers can view key metrics for BOTH Live Events and recordings, directly from the GoToWebinar Analytics Dashboard!
The "Live" tab shows analytics for Live webinars hosted, while the "Recording" tab shows analytics for recordings.
Within each webinar, the organizer has a dashboard to monitor the session at-a-glance. You can quickly view the timer (duration of the session), attendance, audience attentiveness, questions and raised hands.
Details on reports available at: https://support.logmeininc.com/gotowebinar/help/create-a-report-g2w500018
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach .csv or excel format for reports in g2m or g2w. Transcripts (GA by end of Q2 2019) are copied to the clipboard and pasted as a text file. or of course via the apis.
GoToWebinar users can delete their recordings within the services. At any time, GoToServices Customers may request the return or deletion of their content through standardized interfaces. If these interfaces aren't available, LogMeIn will otherwise make a commercially reasonable effort to support Customer, subject to technical feasibility, in the retrieval or deletion of their Content. Additionally, Customer Content will be deleted within thirty(30) days of Customer request.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON (via API)
  • Excel
  • HTML
Data import formats
  • CSV
  • Other
Other data import formats JSON via API

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks The LogMeIn network architecture is segmented into public, private, and integrated lights out (iLO) management network zones. The public zone contains internet-facing servers; all traffic that enters this network must transit a firewall. Only required network traffic is allowed; all other network traffic is denied; no network access is permitted from the public zone to either the private or iLO management network zones.

The private network hosts application-level administrative and monitoring systems, and the iLO management network zone is for hardware and network administration and monitoring. Access to these networks is restricted to authorized employees via two-factor authentication.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network The LogMeIn network architecture is segmented into public, private, and integrated lights out (iLO) management network zones. The public zone contains internet-facing servers; all traffic that enters this network must transit a firewall. Only required network traffic is allowed; all other network traffic is denied; no network access is permitted from the public zone to either the private or iLO management network zones.

The private network hosts application-level administrative and monitoring systems, and the iLO management network zone is for hardware and network administration and monitoring. Access to these networks is restricted to authorized employees via two-factor authentication.

Availability and resilience

Availability and resilience
Guaranteed availability LogMeIn strives for high redundancy and availability of our services and infrastructure. Publicly available status updates are available at: https://status.gotomeeting.com/. Service Level Agreements are mutually agreed upon and covered in the Terms of Service and/or written agreement for the LogMeIn services with our customers.
Approach to resilience The architecture has been designed for maximum performance, reliability and scalability. The GoToMeeting, GoToWebinar and GoToTraining solutions are driven by industry-standard, high-capacity servers and network equipment with the latest security patches in place. Redundant switches and routers are built into the architecture to ensure that there is never one single point of failure. Clustered servers and backup systems help guarantee a seamless flow of application processes — even in the event of a heavy load or system failure. For optimal performance, the GoToMeeting, GoToWebinar and GoToTraining brokers load balance the client/server sessions across geographically distributed communication servers.
Outage reporting The status of your solution, with notification of any outages, updates, etc is always available at status.gotomeeting.com (this is a public dashboard)
Email alerts are also sent

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication Enterprise Sign-In is delivered, depending on your preferences, as fully packaged offerings from third-party IdentityandAccess Management (IAM) providers, as a set of GoTo-provided tools, or via identity and licensing APIs that allow you to design and build fully custom solutions. They're available to new and existing customers
Can be configured using the SAML-specification to allow users in the validated email domains to be authenticated for sign-on through an Identity Provider. Your options are:
Implement ADFS 2.0 |ADFS 3.0
Choose one of the managed Identity and Access Management Providers that provide Single Sign-On
Implement a custom or new IdP SAML configuration
Access restrictions in management interfaces and support channels Logical Access Control procedures are in place, designed to prevent or mitigate the thread of unauthorized application access and data loss in corporate and production environments. Employees are granted minimum (or "least privilege") access to specified LogMeIn systems, applications, networks and devices as needed. Further, user privileges are segregated based on functional role and environment. Users shall only be provided with access to the network and services that they have been specifically authorized to use.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information No audit information available
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • AICPA SOC2 T2
  • Workings towards ISO 27001

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards SOC2 Type II, SOC 3
BSI C5
LogMeIn is EU-U.S. and Swiss Privacy Shield Certified
TRUSTe Verified Privacy
Information security policies and processes An Information Security Policy has been established at LogMeIn and assist in defining the role of technology and management at our organization. It is aligned to ISO27001:2013.
At least annually, applicable policies are reviewed by management to ensure that any procedures or standards are updated in accordance with contractual and legal commitments and company requirements/standards.
Security Policies are relayed to employees at the time of hire and available in the Employee Handbook. They are also communicated to all Global Employees on a regular basis. Additionally, they are hosted on our internal site. LogMeIn employees and temporary workers are informed on a continuous basis, as determined by the company, about security and privacy guidelines, procedures, policies and standards through various mediums of communication such as awareness campaigns, new hire on-boarding kits, webinars with the CISO, annual policy compliance, security training targeting specific roles (such as software developers), security champion programs, as well as visual media campaigns.
Please reference our Trust Center for further details: https://www.logmeininc.com/trust

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach A Change Management Policy has been developed in accordance with relevant commitments and requirements detailing the procedures for infrastructure and development changes, including design, implementation, configuration, testing, modification, and maintenance of systems, Further, processes and procedures are in place in order to verify that changes have been authorized, approved and tested before being applied to a production environment. Policies are in place to provide guidance for the management, modification, and implementation of system changes to infrastructure and supporting applications.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Internal and external system and network vulnerability scanning is conducted quarterly. Dynamic and static application vulnerability testing, as well as penetration testing activities for targeted environments, are also performed periodically. These scanning and testing results are reported into network monitoring tools and, where appropriate and predicated on the criticality of any identified vulnerabilities, remediation action is taken. Vulnerabilities are also communicated and managed with monthly and quarterly reports provided to the relevant development teams, as well as management.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach LogMeIn collects identified anomalous or suspicious traffic into relevant security logs in applicable production systems. They are received/reviewed by our NOC team, who respond immediately.
LMI incorporates vulnerability management and intrusion detection programs into its production and corporate IT environments, as well as perimeter devices designed to protect the network from external attacks. LMI regularly reviews relevant risks that may threaten the achievement of service commitments and updates to existing control activities and infosec policies are performed as deemed needed. The system is architectured to be able to identify, respond to and recover from potential availability events or security incidents.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Our SOC is responsible for detecting and responding to security events using security sensors and analysis systems to identify potential issues.
The Incident Response Plan has been developed to include appropriate security incident response process and is aligned with LogMeIn's communication and information security incident management polices and procedures. It is designed to manage, identify, and resolve relevant suspected, and/or identified security events across its systems and Services. Personnel are in place to identify, document, escalate, and triage potential information security-related events
and vulnerabilities, based on criticality, as well as escalate relevant events to management, where appropriate.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £55.20 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial 7 Day trial
INSIGHTS AT A GLANCE

Explore attendee data and track webinar performance with our new analytics dashboard and updated reporting.

RECORD & PUBLISH
Automatically record and publish webinars to your video library for easy sharing.
NEW FEATURES
We're always adding new features to make your workflows easier
Link to free trial https://www.gotomeeting.com/webinar/try

Service documents

ods document: Pricing document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑