Inzite - Scheduled video and phone calling solutions for organisations
The video, phone and scheduling solution for customer communication.
Fully integrated and custom solutions with direct messaging, phone & video calling, screen sharing and scheduling.
Features
- Communication: Video calls, Phone meetings, Screen Sharing
- Integration: Website integration, Custom widgets, CRM integration
- Scheduling: Realtime availability calendars, Calendar synchronisation, Meeting agendas
- Reporting: Admin dashboards, Archiving & transaction logging, Call recording
- Marketplace: Advisor profiles, Search & discoverability. Paid or free calls
- Compliance & Safeguarding: GDPR compliant, Enterprise grade security, Safeguarding tools
Benefits
- Efficiencies and scalability - manage many advisors, users and departments
- An interactive experience - video, screen & document sharing
- A green initiative - eliminates unnecessary travel
- Inclusion and diversity - cost and travel are no barrier
- Automated safeguarding - real-time triggers and alerts
Pricing
£1,250 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at demo@inzite.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 12
Service ID
9 7 8 3 5 6 9 2 7 9 4 6 2 6 1
Contact
Inzite - The video, phone and scheduling solution for customer meetings
Inzite Sales
Telephone: 020 3856 8577
Email: demo@inzite.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Platform maintenance updates usually require less that 30 seconds of downtime. These will be done during quiet periods.
- System requirements
- Latest versions of Chrome, Internet Explorer, Safari, Edge, or Safari
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We provide support only directly to clients and not for users of the platform.
Response time is typically within 24 hours, or less for serious issues.
Normal working hours weekdays 8.30 to 5.30pm.
Out of hours and weekend support is at extra cost. - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Via Zendesk directly to admin users only (on request). Or we can use our own internal tools.
- Web chat accessibility testing
- None, since we currently only support admin users directly, but we are more than open to working with clients on this.
- Onsite support
- Yes, at extra cost
- Support levels
- Direct support is subject to contract. Standard support SLAs are contained in our terms and conditions document.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Typically this is provided via screen sharing sessions with Inzite support staff although on-site training is available subject to contract.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
We provide CSV exports on all major reports, including user data. More specific data is also available on request.
Post -contract, we will retain data as specified by the client. Typically, we will provide a data export at the end of the contract. - End-of-contract process
- Given the flexibility of the contract, this can vary. Generally we price based on the number of advisors and do not limit the number of calls or messaging within fair-use.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None other than minor UI differences for responsiveness.
- Service interface
- Yes
- Description of service interface
- There is a full administration dashboard for user and advisor on-boarding and information. Also full reporting and analytics and the ability to create custom widgets for external website integration.
- Accessibility standards
- None or don’t know
- Description of accessibility
- There are no restrictions and we are constantly improving features.
- Accessibility testing
- Currently we have not done specific testing, but we are willing to provide this for the customer.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Full customisation is possible from general configuration, assets, copy and styling.
Customisation is possible via the admin interface. Other customisations are available on request.
Scaling
- Independence of resources
- We are easily able to increase hardware on demand. Each platform instance runs on a private standalone server instance, hosted on an EU Digital Ocean data center. We use CDN’s load balancers to direct client traffic to servers that have enough available resources to handle incoming requests. We also have monitoring and real-time altering of all key indicators to track performance across our platform.
Analytics
- Service usage metrics
- Yes
- Metrics types
- There are tools in the admin dashboard to run reports and monitor full user activity. We also allow inclusion of GTM or Google Analytics.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data can be exported using the admin dashboard. Users without high-level access permissions can make a request to support team to have their data exported.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
- Other
- Other data import formats
-
- XLS
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- We support only the following TLS versions: TLSv1, TLSv1.1 TLSv1.2. SSLv2 and SSLv3 are disabled. All weak TLS cipher suites are disabled on our servers.
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We provide a 99.9% uptime guarantee. Service credits are provided outside of 99.8% and are subject to contract.
- Approach to resilience
- Available on request.
- Outage reporting
- Automated Email and notification alerting.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Admin accounts are required to supply a password with an increased level of security. This can be configured based on length, upper-case count, numeral count and number of special characters.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- We have a named person responsible for all security policies and processes. We adhere to the highest standard and ensure all third party supplies also conform to a similar standard.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Feature requests processed by our management team for initial review. After that development team introduces a plan for implementing, testing and deployment. Every new feature goes through peer review. All feature changes go through the staging testing phase to ensure there are no errors/disruptions to security and prior workflow. Feature changes always scheduled in advance and released live at an available time window to not affect active users. We inform stakeholders of an additional impact if there is any.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Regular reviews of the system are being made to ensure no vulnerabilities. We rely on system alerts, external tools and manual code reviews to achieve that. Full penetration testing is carried out regularly and before every release using external service. We additionally have unit testing and regression tests that are performed on every release. Third-party software updated regularly to mitigate risks.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our platform using a variety of technical solutions against cyber-attacks and all kinds of intrusions. We use iptables firewall for stateful packet inspection (SPI) and OSSEC as our host-based intrusion detection system. We monitor access to sensitive and PII data for each client using low-level and high-level logging/alerts. All HTTP traffic from web application monitored, filtered and blocked (if necessary) by NAXSI (web application firewall). All of the mentioned tools provide 24/7 protective monitoring and allows to respond immediately for identified incidents.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Clients have an agreed upon communication channel to provide incident reports to the incident management team. Team analyzes incoming incident reports to determine its severity. Necessary actions to notify affected parties and resolve incident are taken immediately. Incident resolution goes through high-order workflow to ensure no additional problems are introduced. Steps for resolving incidents requiring business continuity actions are defined within the Business Continuity Plan (DRP/BCP). After the incident is resolved we provide a report to clients regarding the cause of the incident, what data was affected, what measures were taken.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £1,250 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We provide a 30 day pilot of the full service.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at demo@inzite.com.
Tell them what format you need. It will help if you say what assistive technology you use.