AXIA COMPUTER SYSTEMS LIMITED
Hosted PBX VOIP Service
Hosted PBX VOIP Service, included Audio and video conferancing
Features
- Hosted Estensions or PBX Systems
- Cloud or Hybrid Model
- Deskphone and Mobile Apps
- Audio Conferencing
- Video Conferencing
- Contact Center Options
- Competitive Call Bundles
Benefits
- Fraud Prevention
- Cost effective
- Mangaged Service
- Lower Cost of Ownership
Pricing
£100.00 a terabyte a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at a.ali@axia.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
1 0 9 3 6 7 6 5 5 1 3 4 5 8 3
Contact
AXIA COMPUTER SYSTEMS LIMITED
Asgher Ali
Telephone: 01923333111
Email: a.ali@axia.co.uk
Service scope
- Service constraints
- Upto 1000 Extensions
- System requirements
-
- Virtual Environment
- Physical Environment
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
4hour response between 9am to 6pm Monday to Friday
8 hours response over Weekends - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Through our website
- Web chat accessibility testing
- Uses 3cx Backend technology
- Onsite support
- Yes, at extra cost
- Support levels
- We are able to provide various support levels from remote to onsite service. Each service is tailored to the customers needs
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Remote support and onboarding
- Service documentation
- No
- End-of-contract data extraction
- If required but may cost
- End-of-contract process
- Data extration may cost.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Provision extensions
Manage system - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Through SSL
- Web interface accessibility testing
- Web interface as well as Apps and Accessability features
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Restricted resource so it cannot impend on other services
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- 3cx
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- Virtual Machines
- Backup controls
- Schedule
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
SLA Service Level 99.9%
Service Credits given - Approach to resilience
- Replicated to another Datacenter
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Only key users with security clearance may access this
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Meet current standards
- Information security policies and processes
-
Cyber Essentials Plus
ITL level Standard
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Internal Change management process which is overseen by a security engineer
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Patches are deployed immediatelyif they are critical
threat management firewall and IDS - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- IDS firwall destection
- Incident management type
- Undisclosed
- Incident management approach
-
Incident are reported tohelpdesk systems
reports are also provided by are helpdesk systems
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Seperate VPN Tunnels
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Reduced Travel, Reduced and Recycle waste and packaging.
Plan to Install Solar Panels with 12 months
Investment in energy saving products and equipment
Become Carbon neutral by 2030Covid-19 recovery
Develop and implement a ‘Future Ways of Working’ Strategy that is informed by the learning from the remote working implemented during the pandemic and builds-in the strengths into our future approach.
Continue to develop a responsive, collaborative and innovative working culture.
Develop the ICT strategy to ensure that it is more agile and responsive to changing business need.
Develop our people strategy, investing in our staff’s skills, capabilities and wellbeing.
Continue to develop and implement our staff wellbeing approach in light of learning from the pandemic, anticipated longer term health impacts and staff needs/expectations.
Identify lessons learnt from the experience of the pandemic, impacts on services, performance and resilience, and any forthcoming challenges.
Review our Emergency Planning and Business Continuity Planning arrangements to make sure we have the correct resources and contingencies to meet future emergencies.Tackling economic inequality
Businesses should embed serving the needs of low-income and marginalized communities across all aspects of purpose, strategy, and operations.
By adopting a more systemic focus on inclusion, businesses can uncover unseen opportunities to generate long-term value for both themselves and society.
Contribute their due taxes.
Promote non-discrimination.
Adhere to social and environmental regulations.
Uphold human rights.
Eliminating these issues fosters a more consistent and reliable corporate culture
Prioritize the human capital of employees:
Pay them fairly.
Provide training and support.
Reducing pay disparities within organizations contributes to overall societal equality
Transfer profits to charitable causes.
Reduce prices to make products and services accessible.
Employ more staff, creating job opportunities.
Engage in supplier diversity to support local communitiesEqual opportunity
Axia is committed to encouraging equality, diversity, and inclusion among our workforce, and eliminating unlawful discrimination. Our aim is for our workforce to be truly representative of all sections of society and our customers, and for each employee to feel respected and able to give their best.
Our policy’s purpose is to:
Provide equality, fairness, and respect for all in our employment, whether temporary, part-time, or full-time.
Not unlawfully discriminate because of the Equality Act 2010 protected characteristics, including:
Age
Disability
Gender reassignment
Marriage and civil partnership
Pregnancy and maternity
Race (including color, nationality, and ethnic or national origin)
Religion or belief
Sex
Sexual orientation
Oppose and avoid all forms of unlawful discrimination. This includes in:
Pay and benefits
Terms and conditions of employment
Dealing with grievances and discipline
Dismissal
Redundancy
Leave for parents
Requests for flexible working
Selection for employment, promotion, training, or other development opportunities
Our commitments include:
Encouraging equality, diversity, and inclusion in the workplace as they are good practice and make business sense.
Creating a working environment free of bullying, harassment, victimization, and unlawful discrimination, promoting dignity and respect for all. We train managers and all other employees about their rights and responsibilities under the equality, diversity, and inclusion policy.
Taking complaints of bullying, harassment, victimization, and unlawful discrimination seriously and addressing them promptly.
All staff should understand that they, as well as their employer, can be held liable for acts of bullying, harassment, victimization, and unlawful discrimination against fellow employees, customers, suppliers, and the public.Wellbeing
Why Wellbeing Matters:
Good health and wellbeing serve as core enablers for employee engagement and organizational performance.
Promoting wellbeing helps prevent stress and fosters positive working environments where everyone can thrive.
Domains of Wellbeing:
A holistic approach to wellbeing involves several interconnected domains:
Physical Health: Encouraging exercise, nutrition, and regular health check-ups.
Mental and Emotional Wellbeing: Supporting mental health, managing stress, and promoting work-life balance.
Social Connections: Building positive relationships and a sense of community.
Financial Wellness: Providing resources for financial planning and stability.
Career Development: Offering growth opportunities and meaningful work.
Environmental Factors: Creating a safe and supportive workplace.
Stakeholder Roles:
Employers and Managers:
Foster a culture of wellbeing.
Provide resources for physical and mental health.
Encourage work-life balance.
Employees:
Take responsibility for their own wellbeing.
Seek support when needed.
Government and Policy Makers:
Advocate for policies that promote employee health and wellbeing.
Pricing
- Price
- £100.00 a terabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30day trial
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at a.ali@axia.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.