Inzite - The video, phone and scheduling solution for customer meetings

Inzite - Scheduled video and phone calling solutions for organisations

The video, phone and scheduling solution for customer communication.

Fully integrated and custom solutions with direct messaging, phone & video calling, screen sharing and scheduling.


  • Communication: Video calls, Phone meetings, Screen Sharing
  • Integration: Website integration, Custom widgets, CRM integration
  • Scheduling: Realtime availability calendars, Calendar synchronisation, Meeting agendas
  • Reporting: Admin dashboards, Archiving & transaction logging, Call recording
  • Marketplace: Advisor profiles, Search & discoverability. Paid or free calls
  • Compliance & Safeguarding: GDPR compliant, Enterprise grade security, Safeguarding tools


  • Efficiencies and scalability - manage many advisors, users and departments
  • An interactive experience - video, screen & document sharing
  • A green initiative - eliminates unnecessary travel
  • Inclusion and diversity - cost and travel are no barrier
  • Automated safeguarding - real-time triggers and alerts


£1,250 a licence a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 7 8 3 5 6 9 2 7 9 4 6 2 6 1


Inzite - The video, phone and scheduling solution for customer meetings Inzite Sales
Telephone: 020 3856 8577

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Platform maintenance updates usually require less that 30 seconds of downtime. These will be done during quiet periods.
System requirements
Latest versions of Chrome, Internet Explorer, Safari, Edge, or Safari

User support

Email or online ticketing support
Email or online ticketing
Support response times
We provide support only directly to clients and not for users of the platform.

Response time is typically within 24 hours, or less for serious issues.

Normal working hours weekdays 8.30 to 5.30pm.

Out of hours and weekend support is at extra cost.
User can manage status and priority of support tickets
Phone support
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Via Zendesk directly to admin users only (on request). Or we can use our own internal tools.
Web chat accessibility testing
None, since we currently only support admin users directly, but we are more than open to working with clients on this.
Onsite support
Yes, at extra cost
Support levels
Direct support is subject to contract. Standard support SLAs are contained in our terms and conditions document.
Support available to third parties

Onboarding and offboarding

Getting started
Typically this is provided via screen sharing sessions with Inzite support staff although on-site training is available subject to contract.
Service documentation
Documentation formats
End-of-contract data extraction
We provide CSV exports on all major reports, including user data. More specific data is also available on request.

Post -contract, we will retain data as specified by the client. Typically, we will provide a data export at the end of the contract.
End-of-contract process
Given the flexibility of the contract, this can vary. Generally we price based on the number of advisors and do not limit the number of calls or messaging within fair-use.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
None other than minor UI differences for responsiveness.
Service interface
Description of service interface
There is a full administration dashboard for user and advisor on-boarding and information. Also full reporting and analytics and the ability to create custom widgets for external website integration.
Accessibility standards
None or don’t know
Description of accessibility
There are no restrictions and we are constantly improving features.
Accessibility testing
Currently we have not done specific testing, but we are willing to provide this for the customer.
Customisation available
Description of customisation
Full customisation is possible from general configuration, assets, copy and styling.

Customisation is possible via the admin interface. Other customisations are available on request.


Independence of resources
We are easily able to increase hardware on demand. Each platform instance runs on a private standalone server instance, hosted on an EU Digital Ocean data center. We use CDN’s load balancers to direct client traffic to servers that have enough available resources to handle incoming requests. We also have monitoring and real-time altering of all key indicators to track performance across our platform.


Service usage metrics
Metrics types
There are tools in the admin dashboard to run reports and monitor full user activity. We also allow inclusion of GTM or Google Analytics.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data can be exported using the admin dashboard. Users without high-level access permissions can make a request to support team to have their data exported.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
Other data import formats
  • PDF
  • XLS

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
We support only the following TLS versions: TLSv1, TLSv1.1 TLSv1.2. SSLv2 and SSLv3 are disabled. All weak TLS cipher suites are disabled on our servers.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We provide a 99.9% uptime guarantee. Service credits are provided outside of 99.8% and are subject to contract.
Approach to resilience
Available on request.
Outage reporting
Automated Email and notification alerting.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Admin accounts are required to supply a password with an increased level of security. This can be configured based on length, upper-case count, numeral count and number of special characters.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
CSA CCM version 3.0
Information security policies and processes
We have a named person responsible for all security policies and processes. We adhere to the highest standard and ensure all third party supplies also conform to a similar standard.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Feature requests processed by our management team for initial review. After that development team introduces a plan for implementing, testing and deployment. Every new feature goes through peer review. All feature changes go through the staging testing phase to ensure there are no errors/disruptions to security and prior workflow. Feature changes always scheduled in advance and released live at an available time window to not affect active users. We inform stakeholders of an additional impact if there is any.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Regular reviews of the system are being made to ensure no vulnerabilities. We rely on system alerts, external tools and manual code reviews to achieve that. Full penetration testing is carried out regularly and before every release using external service. We additionally have unit testing and regression tests that are performed on every release. Third-party software updated regularly to mitigate risks.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our platform using a variety of technical solutions against cyber-attacks and all kinds of intrusions. We use iptables firewall for stateful packet inspection (SPI) and OSSEC as our host-based intrusion detection system. We monitor access to sensitive and PII data for each client using low-level and high-level logging/alerts. All HTTP traffic from web application monitored, filtered and blocked (if necessary) by NAXSI (web application firewall). All of the mentioned tools provide 24/7 protective monitoring and allows to respond immediately for identified incidents.
Incident management type
Supplier-defined controls
Incident management approach
Clients have an agreed upon communication channel to provide incident reports to the incident management team. Team analyzes incoming incident reports to determine its severity. Necessary actions to notify affected parties and resolve incident are taken immediately. Incident resolution goes through high-order workflow to ensure no additional problems are introduced. Steps for resolving incidents requiring business continuity actions are defined within the Business Continuity Plan (DRP/BCP). After the incident is resolved we provide a report to clients regarding the cause of the incident, what data was affected, what measures were taken.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£1,250 a licence a month
Discount for educational organisations
Free trial available
Description of free trial
We provide a 30 day pilot of the full service.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.