IMImobile Europe Ltd

Webex Connect

Webex Connect is an Enterprise Cloud Communications Platform that enables businesses to orchestrate and automate contextual, real-time interactions and end-to-end journeys across customer touchpoints including SMS, RCS, Email, Video, Push, In-App, WhatsApp, Apple Business & Facebook Messenger. Webex Connect also offers live agent conversations capabilities and integrations with other systems.

Features

  • Centralized orchestration of customer interactions across 10+ channels.
  • Rapid build, test and launch using our Low Code environment.
  • Full visibility into customer communications with real-time reporting.
  • Visual flow builder, Email Composer, Template Management.
  • Global connectivity for international SMS and voice routes.
  • Flexibly integrate over REST/SOAP APIs, message queues, FTP/sFTP.
  • Inuitive UI, dashboards and reports with planned WCAG compliance.
  • Centralised HLR lookup service for 200+ networks worldwide.
  • APIs to send and receive communications including rich messaging.
  • Omni-channel contact centre software with unified management of all channels.

Benefits

  • Deliver joined-up customer experiences.
  • Build multichannel customer journeys 10x faster.
  • Reduce customer service and support costs through self-service automation.
  • Improve customer engagement with intelligent, context-aware messaging.
  • Natural Language Processing and Artificial Intelligence for conversation automation.
  • Easily test, deploy, and make iterative changes to your workflows.
  • Improve efficiency by seamlessly blending inbound and pro-active engagement.
  • Build and manage comprehensive customer profiles.
  • Maximize response rates using features such as geofencing & smartlinks.
  • Seamlessly integrate enterprise applications.

Pricing

£3,000 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gauts@cisco.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

1 1 5 8 4 6 8 0 5 7 1 5 4 4 0

Contact

IMImobile Europe Ltd Simon Gaut
Telephone: 08432 163500
Email: gauts@cisco.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Webex connect is an omnichannel communications workflow and orchestration platform and complete suite of omnichannel contact handling software which can be used standalone, or as an add-on to the following applications which together form the CPaaS Suite - Webex Notify, Webex Campaign, Webex Assist and the complete Envoy portfolio.
Cloud deployment model
Public cloud
Service constraints
None
System requirements
  • Internet connectivity
  • Web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
We try to get back to the client as quickly as we can. We commit to the below SLA for response times. Our response time SLAs are based on the priority of the incident.
Priority Level 1- Response time- 30minutes
Priority Level 2- Response time- 1 hour
Priority Level 3- Response time- 6 hours
Priority Level 4- Response time- 24 hours
Note" The response time is the target time from the time an incident report is logged at the Service Desk to the time an initial response is sent back to the Client.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our Standard level of support is included as part of our service offering. This includes access to support via email to our Virtual Network Operations Centre (VNOC) 24x7. The VNOC uses a ticketing tool to automatically raise incidents for any report raised via email. Indicative response and resolution time are: Priority 1 (critical), A complete outage where the Service cannot be accessed, affecting more than 75% of users - response time- 15 minutes; resolution Time - 4 hours. Priority 2 (Major)- Service affecting or partial outage, including intermittent failures, affecting more than 50% of users Response time- 1 hour, Resolution time - 8 hours - Priority 3(Minor)- Minor Service impact on system functions or affecting only single users. No direct impact on full-service availability. Response time- 6 hours, Resolution time- 3 business days - Priority 4(Low)- Low impact on the Service or system functions Response time- 1 business day; Resolution time- 1 week. Our Gold level support is available which offers enhanced response and resolution times. Enhanced support requirements should be discussed during the buying process and will be quoted separately. Regardless of support level your Customer Success Manager will also serve as your dedicated Technical Account Manager.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
AnWebex Connect account will be created and the login details will be shared with the Buyer who can now login and access their service. A dedicated Customer Success Manager (CSM) will be assigned to define and document specific service requirements and deliverables in collaboration with the Buyer. The CSM will build the specified service configuration and hand-over to the Buyer for user acceptance testing (UAT). On successful completion of UAT the service will be made ready for go-live. To supplement this process we provide: 1/ Online help documentation 2/ Training sessions and go-live support as agreed with the CSM 3/ In service support and advice to make sure that the Buyer is achieving best value.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
We support users to extract their data when the contract ends. This can be done by the user themselves using the service tools or as an additional service. To request this service users must contact their Customer Success Manager and raise a request for data extraction. IMIconnect supports exporting of data into files that can be ingested into the client’s own systems or data storage locations.
End-of-contract process
At the end of the contract we follow an offboarding and decommissioning process. We delete customer related, profile related and configuration related data following our disposal policies. Our data-destruction policies and procedures provide strict controls for governing the physical and logical destruction of data storage devices and data. Physical destruction is undertaken by a certified provider under a controlled process, and is fully-logged. Destruction providers are audited as part of our ongoing 3rd party review process. Devices to be re-used are hard-wiped using industry-approved data destruction tools. As part of the end-of-contract offboarding process the Buyer can request extraction or deletion of their data. Where data extraction is to be completed by IMImobile this activity may be chargeable depending on scope and complexity.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interface is accessible through web based GUI. Depending on the role, users will be able to access below features:
1. Service creation, management & flow configuration
2. Reports & Dashboards
3. Service Logs
4. Configure assets and integration details
5. Online documentation, Knowledge base and sample code.

For Live Agent Conversations, users can manage:
1. Agents, groups, teams and skills
2. Inbound contact queuing, routing and channel assets
3. IVR and BOT automation and messages
4. Outbound campaign and proactive contact strategies
5. Reports, dashboards, report scheduling
6. Contact recordings, live agent monitoring, quality scoring
7. User-interface customisation
Accessibility standards
None or don’t know
Description of accessibility
We are not fully WCAG compliant. But we do try to follow the guidelines to an extent.

To make our platform accessible, we use

• Text color contrast is used according to the standards to make information distinguishable
• Keyboard shortcuts for controls (Though there are some keyboard traps)
• Labels or tooltips on visual elements like icons and imagery (for relevant ones)
• Distinction in different states of same elements
• Error handling for all the input fields
• Hierarchy in the typography, descriptive headings and proper descriptions
Accessibility testing
We have not completed formal testing with users of assistive technology. However, our agent and administration interfaces are used by people with physical impairments. Their requirements are identified and specified at an individual customer level and addressed with tailored user interface changes.
API
Yes
What users can and can't do using the API
Our products include a comprehensive library of REST APIs and full documentation is available upon request. Our onboarding process includes the agreement and documentation of all service deliverables, including the identification of appropriate APIs. As part of this process we will also provide best practice recommendations on accessing and consuming the data from the API library. Our services are designed to make configuration and customisation as simple as possible with intuitive interfaces which use drag and drop, ‘low code’ tools. This means that users do not usually need to interact directly with the APIs themselves. However, users with the relevant administrative permissions are free to access the APIs and make changes to the ways that the data and functionality delivered via the APIs is consumed. Furthermore, users with relevant permissions can access the API Hub to access resources exposed in a secure way using Oauth 2.0 standards.

Live Agent Conversations module exposes the following API resource along with appropriate HTTP endpoints with the ability to manage granular permissions
1. Queues
2. Agent Groups
3. Users
4. Chats
5. Campaigns – Outbound Voice and Proactive SMS outreach.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Through solution design and the rich set of APIs, IMIconnect can be used as a platform for customised usage.

Other Level of customisation available are:
1) Workflows through drag and drop workflow builder- Different use/cases, business flows can be built as per business need/ use case using visual drag and drop flow builder, which offers 30+ nodes to enable rapid orchestration and automation of end-to-end flows.
2) custom node- IMIconnect offers the ability to configure reusable integrations with any REST/SOAP API compliant system using custom node integration features.
3) channel assets- buyer can choose to select various channels assets like short codes, keywords, long codes, landline numbers etc. we have tie-ups with multiple telecom operators in UK that gives us flexibility to expose numbers and channel assets.
4) customized reports and analytics

For Live Agent Conversations module, following customisation is possible:

1. Agents, groups, teams and skills
2. Inbound contact flows, queuing, routing and channel assets
3. IVR and BOT automation and messages
4. Outbound campaign and proactive contact strategies
5. Reports, dashboards and report scheduling
6. Contact recordings, live agent monitoring and quality scoring
7. User-interface and dashboard customisation

Scaling

Independence of resources
The service will allocate a fixed capacity that is agreed with each Buyer. Allocation is controlled automatically by the service platform to guarantee that users aren't affected by the demand other users are placing on the service.

Analytics

Service usage metrics
Yes
Metrics types
Webex Connect offers access to Dashboard and reports, which contain aggregate data across all services, assets, and channels. The following types of reports can be generated:
1)Summary of incoming and outgoing messages across all channels and services;
2)Service-wise reports;
3)App-wise reports;
4)Number-wise reports;
5)Workflow-wise reports;
6)Agent activity and performance;
7)Inbound and outbound contact demand;
8)Contact volume and outcomes;
9)Campaign performance;
10)Trend analysis;
11)Service activity logs.

The following data is available for each channel: Requests; Messages submitted; Messages Rejected;Messages delivered; Messages read; Messages failed.

Customised reports can also be provided.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
Webex Connect is hosted in AWS cloud and supports multi-tenancy. The data of each customer is virtually segregated based on the client id. The data at rest is encrypted and encryption keys are stored separately, and only authorized users will have access to the keys.
- All confidential data are encrypted using strong encryption algorithms such as AES 256
- All customer transaction data is encrypted using encryption keys
- The encryption key is generated at the client level and are rotated at frequent intervals
- Regular backups of all transaction data and logs done using cloud storage are encrypt
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Webex Connect has functionality within the UI that allows users to export transactional data for an agreed period. Any additional requirements should be raised with your Customer Success Manager.

For Live Agent Conversations Module, users can export (and import) their data using the standard tools provided in the service interface under permissions control. This can be done as a manual or scheduled activity using the standard scheduling capabilities of the service. Data can also be exported (and imported) automatically under API control.
Data export formats
  • CSV
  • Other
Other data export formats
  • SQL Database
  • JSON
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • .TXT
  • JSON
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We guarantee a service availability of 99.95% with our historical performance exceeding this guarantee. As such no service credit or refund process has been necessary or is offered.
Approach to resilience
The service is deployed over two availability zones (AZ). Each of the AZs can work independently and with full capacity. However, to support High Availability (HA), both the AZs work in Hybrid mode. Therefore, in the case of a failure the service traffic would still be processed. All components are designed with N+1 redundancy (Database with N+N redundancy- master-master or master-slave configuration; storage with 1+1 redundancy). The service is deployed in active-active mode across two availability zones, so deployment on one zone acts as a disaster recovery for the deployment on the other zone. Proactive monitoring is achieved with traps and alerts setup in various modules not just within applications but also our gateways, application servers, databases and our middleware. Alerts are automatically sent to our NOC which is available 24x7. Technical support looks into these alerts to mitigate issues at an early stage. We also monitor system capacity and analyse traffic to identify any anomalies and identify potential issues.
Outage reporting
We proactively monitor the service with traps and alerts setup in various modules not just within applications but also our gateways, application servers, databases and our middleware. Alerts are automatically sent to our NOC which is available 24x7. Technical support looks into these alerts to mitigate issues at an early stage. We also monitor system capacity and analyse traffic to identify any anomalies and identify potential issues. Support tickets are created in our ticketing tool (ServiceNow) with service affecting issues reported to users via email.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Every user has a unique username and password that they need to enter to login and access the service. We also support integration with Single Sign on (SSO) over SAML. Each user is configured with a set of permissions that restrict access to management information and support channels as required.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BM TRADA, certificate # 157
ISO/IEC 27001 accreditation date
27/05/2016
What the ISO/IEC 27001 doesn’t cover
Not Applicable
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Dionach PCI QSA
PCI DSS accreditation date
28/08/2019
What the PCI DSS doesn’t cover
Not Applicable
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISO 9001:2015

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We are registered with the UK Data Protection/Information Commission registrar. We are compliant to GDPR regulation. We operate a comprehensive IMS (Information Management System) to ensure that all customer data is protected by strong controls against unauthorised access, theft, interception or compromise. This system is implemented as part of our ISO/IEC 27001:2013 processes and operated in-line with PCI-DSS requirements and UK data protection requirements. We confirm that we will comply with Local and other territorial legislation and regulatory controls as required. We understand the risks of storing and processing data in territories with extra-territorial reach (such as the US Patriot Act) and take all measures to ensure the security, availability and integrity of all customer data. Clear controls, roles and responsibilities are defined with respect to storage, processing, encryption and transmission of customer data.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
IMImobile provides its services to clients with scheduled quarterly upgrade cycles. All upgrades go through a defined change management process including a Change Advisory Board (CAB) that comprises technical and business stakeholders. The CAB assesses proposed changes to the service platform which includes the impact on service availability, performance and security. The lifetime tracking of changes to the components of our service is managed and documented within our ISO9001 accredited process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management process assesses potential threats to our service based the following test schedule: monthly internal vulnerability scans, quarterly internal penetration tests and annual external penetration tests carried out by certified third party. Identified threats are impact assessed and prioritised based on severity with patches applied appropriately which could be immediately for severe threats. Information about potential threats comes directly from our testing activity, from our customers and suppliers and our security team who are trained and supported by SANS Cyber Security.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We identify potential compromises using high industry standards such as ASVS and CIS. We utilise a continuous monitoring and analysing Security Operations Centre (SOC) team. Along with this we regularly orchestrate up to date CREST approved penetrations tests and run regular vulnerability scans across our platforms to ensure we have no known exploitable areas. We have an defined incident management process compliant with ISO 27001 requirements. Responsibilities and procedures are in place to handle information security events and weaknesses effectively once they have been reported. Logs and security events are monitored and acted upon by our 24 hour SOC team.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
IMImobile has an established incident management process compliant with ISO 27001. Responsibilities and procedures are in place to handle incidents effectively once they have been identified. A process of continual improvement is applied to the response, monitoring, evaluation, and overall management of information security incidents. In case of a failure of our services, it is communicated to the relevant stakeholders with appropriate information. All logs and security events are configured to centralised SIEM solutions and monitored by our 24 hour Security Operations Centre team. Incidents are logged and tracked until closure with full incident reporting and analysis provided.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Imimobile was acquired by Cisco in 2021. For more than 15 years, Cisco has worked toward a sustainable future by reducing emissions, reducing waste, building more efficient products, and setting and achieving ambitious goals. Cisco's products are built with sustainability in mind – whether that be smart city and smart building technologies that reduce energy consumption, or remote collaboration tools that allow people to work from anywhere, Cisco technologies are helping to reduce emissions.
The Cisco Foundation has committed $100 million over ten years to help reverse the impact of climate change. Cisco focuses on technology-based solutions, GHG and carbon reduction, climate resilience, green jobs, and community education and activation. Cisco continues its efforts to reduce emissions, reduce waste and set ambitious goals in our supply chain model and our technology development and production.
Cisco has achieved 100% renewable energy in several countries around the world and is on track to reach its goals to use electricity generated from renewable sources for at least 85% of Cisco's global electricity in 2022 and to reduce its Scope 1 and 2 GHG emissions by 60% in 2022. Cisco is also working with its suppliers to reduce emissions throughout our supply chain.
Cisco is committed to designing and managing its products and packaging for reuse, repair and resource efficiency. Cisco is on track to design 100% of new Cisco products and packaging to incorporate Circular Design Principles by 2025. Cisco also continues to deliver and improve its product service, takeback and reuse programs, supporting the 100% product return pledge.
Cisco commits to reaching net zero across all scopes of emissions by 2040, which includes our product use, operations, and supply chain
Cisco also commits to reaching net zero for all global Scope 1 and Scope 2 emissions by 2025.
Covid-19 recovery

Covid-19 recovery

Imimobile was acquired by Cisco in 2021. When the pandemic first shut down businesses, schools, and society, Cisco immediately sought to address the needs of the most vulnerable. This included supporting nonprofits that were helping first responders and people in need of food, rental assistance, or financial support due to income loss.
Cisco and its partners are working on networking, security, and IoT solutions that support everything from development and shipping of vaccines to administration and patient follow-up. Quality control, for example, is supported by AI-powered sensors and cameras that track temperature, spoilage, cartage efficiency and other factors. Security solutions — both cyber and physical — ensure that only the right people gain access to vaccines and information.
Cisco have helped organizations large and small with technology donations and flexible pricing solutions. As we move past the pandemic, work won’t be the same. Many people won’t ever return to the office full time, which could have a positive impact on traffic jams, environmental pressures, and employment opportunities beyond major cities.
To make that work-from-home experience as seamless and flexible as possible, Webex is incorporating AI and other emerging technologies. Data sharing, brainstorming, instant messaging, or large meetings are all possible on a single platform that integrates work and creativity.
Cisco has worked with governments to build in secure remote connections for workers, empower citizen engagement, and to ensure that critical services function under the most challenging circumstances.
Cisco technologies have also smoothed the transition to remote learning, as have our corporate social responsibility programs, like Cisco Networking Academy, and our partnerships with nonprofits like Talking Points and MIND Research Institute.
But to drive real change, partnerships are critical. Working closely with MuralNet, Cisco is providing financial support, along with technical and market expertise, to support a Sustainable Tribal Networks program.
Tackling economic inequality

Tackling economic inequality

Imimobile was acquired by Cisco in 2021. We power inclusivity through our Conscious Culture and social impact initiatives. Our Conscious Culture informs all aspects of the employee experience—from how we support employees across the full spectrum of diversity to how we engage teams and give back to communities.
At its core, to Power an Inclusive Future for All means helping the underserved and most vulnerable. Cisco believes that technology can be used to help solve our greatest social challenges, such as addressing critical human needs and disaster relief, economic inequality, digital inclusion, and education, including training in digital skills. Cisco set a goal in 2016 to positively impact one billion people by 2025 through our social impact grants and signature CSR programs. We engage with nonprofit partners to invest in early-stage solutions and form long-term partnerships that allow organizations to put technology to its highest and best use.
Cisco leads the private sector in responding to humanitarian challenges. In 2021, we merged two existing functions within Cisco—the Critical Human Needs portfolio team and the Tactical Operations (TacOps) team—to form Cisco Crisis Response. CCR brings together our Critical Human Needs investment portfolio, which provides cash and product grants to organizations responding to humanitarian crises and natural disasters, with our TacOps team, which, since 2005, has responded to more than 60 worldwide incidents, from natural disasters to forced mass migration, providing free crisis communication networks to support recovery. We are teaching IT skills to millions of students every year through the Cisco Networking Academy. In fiscal 2021, three million people participated in Cisco Networking Academy courses in 180 countries, bringing the total to 15 million students. We expanded the Cisco Networking Academy by launching Skills for All, a mobile-first platform offering learners a personalized pathway to entry-level technology jobs.
Equal opportunity

Equal opportunity

Imimobile was acquired by Cisco in 2021. At Cisco, diversity, equity and inclusion starts at the top: 46% of our ELT are women and 54% are diverse in terms of gender or ethnicity. With respect to our Board of Directors, 36% are women, 64% are men, 9% are Asian, 9% are African American or Black, and Native American, 82% are White, and 18% are diverse in terms of sexual orientation.
Based on our annual fiscal 2020 data, our global employee base was comprised of 27% women and 73% men, and our U.S. employee base was comprised of the following ethnicities: 51.8% White/ Caucasian, 36.5% Asian, 5.8% Hispanic/ Latinx, 4.1% African American/Black, 1.4% two or more races (not Hispanic or Latinx), and 0.4% additional groups (including American Indian, Alaska Native, and Native Hawaiian or other Pacific Islander).
This year, we continued our momentum and growth in the diversity of our workforce. We have continued to make significant gains in diverse talent even while we continue to navigate the impacts of pandemic. Of special note is the accelerated progress Cisco is making in attracting African American/Black talent at both the non-executive and Director/VP levels.
Cisco has signed the CEO Action for Diversity and Inclusion Pledge.
We announced our Social Justice Beliefs, which includes a set of actions including our response to systemic racism and a commitment to be antiracist in all forms.
Cisco has always been committed to compensating our employees fairly and equitably. We are a founding signer of the White House Equal Pay Pledge and the Parity.org pledge, and we are leading the charge to make fair pay a reality for all employees through the Employers for Pay Equity Consortium. We have also introduced an innovative and inclusive framework that provides us powerful analytics to evaluate our complex compensation system.
Wellbeing

Wellbeing

Imimobile was acquired by Cisco in 2021.

When people are respected for who they are and encouraged to seek balance between work and personal life, we believe they are more productive and successful in their jobs and able to give their best to their families and communities. In fiscal 2017, we set a goal to achieve 80% employee participation in community impact by 2020. We achieved that goal last year and sustained it through fiscal 2021. We were honored to be ranked number 1 on the Great Place to Work® list of the World’s Best Workplaces in 2020, with 93% of employees surveyed saying Cisco is a great place to work.

We are a founding member of the Responsible Business Alliance (RBA) and have long adopted the RBA Code of Conduct as our Supplier Code of Conduct. We maintain high expectations of our global network of suppliers, engaging closely with them to protect human rights, promote health and well-being, and extend economic opportunity. We assess our suppliers’ conformance to our policies through risk assessments, audits, and targeted engagements.
We continued to offer employees “A Day for Me,” which were paid days off that allowed for each individual to recharge and rest.
Approximately 2 million Team Space Check-Ins by our employees in fiscal 2021, reflecting 85% of employees submitting Team Space Check-Ins.
Employees wellbeing is promoted at Cisco by:
• Regular check-in company meetings
• Team Space for weekly updates to leaders
• Functional/regional all-hands meetings
• Leadership Quarterly and Leader Day
• ‘We are Cisco’ online community
• 29 Inclusive Communities comprised of 11 employee resource organisations and 18 employee networks

Pricing

Price
£3,000 a licence a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gauts@cisco.com. Tell them what format you need. It will help if you say what assistive technology you use.