Voice Migration
MIT provide professional services to migrate legacy on-premise or private-cloud communications platforms (Phone Systems and PABX's) to cloud unified communications solutions (e.g. Teams, Cisco, RingCentral etc.)
Features
- Vendor Agnostic Voice Migration
- PABX Auditing of all vendor platforms
- Cloud Voice Migration
- PABX Migration
- Voice License Management
- Voice utilisation reporting
- Cloud to Cloud voice migrations
- PABX Resource Analysis
- Telephone System Analysis
- Telephone Call Logging
Benefits
- Reduces cost of migration
- Significantly reduces user error
- Speeds up time to delivery
- Accurate translations from legacy equipment
- Automated migration
- Removes need for specific vendor knowledge
- Vendor agnostic
- Compatible with all telephone systems and PABXs
- Compatible with all cloud voice service providers
- Data presented in standard 'bulk loaders' accepted by cloud providers
Pricing
£4.05 a device
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 8 4 2 1 6 7 0 6 5 5 7 7 4 9
Contact
MIT Dynamic Technologies Limited
Paul McGuinness
Telephone: 08442478881
Email: paulm@mit-tech.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The service may be subject to maintenance downtime or API access restrictions placed by 3rd parties.
- System requirements
-
- Windows Server
- SQL Server (Express is permitted)
- IIS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 4 hours response within 09:00-17:30 Mon/Fri excluding public holidays
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Onsite support is provided at a cost of £950 per day or part thereof. Remote support is provided as part of the contract price.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- For a professional service (e.g. one-off audit) no training is required. For enterprise or resellers, a full training programme is provided as part of the offering, along with a 6-month 'hand holding' process to ensure that it works efficiently for them.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- A request to our support desk will provide access to any data that is held as required by DPA and ISO270001. We have an automatic data deletion policy of 90 days unless requested not to by the customer.
- End-of-contract process
- At the end of the contract, the license (or access to the portal) expires and no further use of the solution is possible unless the contract is restarted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- APIs are available at an additional cost to partners. These allow the automation of audits and reports.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Where there is need of independence of resources, the user can create a privately hosted instance or an independant Azure instance of the solution to avoid contention issues.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide details of license usage, devices audited, devices provisioned and login access.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- All data held (which is general PABX data) can be exported in Word or Excel format as well as raw JSON data.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- Word
- Data import formats
-
- CSV
- Other
- Other data import formats
- Vendor Specific Backups
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The solution is provided upon Microsoft Azure framework, with inherent availabilty builtin. There is 24/7 monitoring of this availability, and automated ticket raising should any service element not respond, or if performance is degraded.
- Approach to resilience
- The solution is provided upon Microsoft Azure framework, with inherent resiliance builtin, however as the data is transitory, there is no inherent risk of data loss or loss of service.
- Outage reporting
- Email alerts to a dedicated helpdesk with automated SLAs and escalation processes.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are not exposed to the Internet and are only accessible from the local server.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 12/09/2023
- What the ISO/IEC 27001 doesn’t cover
- Nothing.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We operate under an ISO270001 framework that forms part of our overall ISO9001 BMS. Regular reviews of security policies are held with board members on a monthly basis, and regular checks for security breaches are undertaken weekly as part of an automated security sweep.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All software changes are tracked through source dependecy logging (Git/Jira), and all usage of the platforms for each atomic action are logged within a secure database and log files for later review if required.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We use a combination of intrusion monitoring software and active API intrusion weakness testing (SAST approach). All patches are deployed within 12 hours of discovery, and threats are monitored from the SAST software and public threat resources.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Threats are identified through the user of dedicated Pen-testing and operational testing suites. When a threat or compromise is discovered, an excalated ticket with SLAs is raised to the appropriate team for resolution, with the technical director copied in.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We use Jira for incident management with pre-defined workflows, escalations and SLAs dependant on the type of incident.
All issues can be raised by users or internally, with email notifications of all changes to the incident until it is closed.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Allowing ease of migration to cloud solutions to allow workforces to work in a hybrid environment.
Pricing
- Price
- £4.05 a device
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Maximum 100 users from an estate >1000 users