Microsoft Teams Phone - VOIP
Microsoft Teams Phone, formerly Teams Cloud Voice. Teams Phone provides the ability to combine your phone system into Microsoft Teams and create a complete communication and collaboration hub.
Bridgeall are a leading Microsoft Gold partner and we provide a wide range of services to support you with Microsoft Teams Phone.
Features
- Full Microsoft Teams Phone services available
- Migrate to Microsoft Teams Phone
- Understand the licensing requirements for Microsoft Teams Phone
- Phone system access via mobile, app, device or browser
- Integrate existing call provider with Microsoft Teams Phone
- Microsoft Teams Phone provides routing, groups, conferencing and queues
- Microsoft Teams Phone admin centre for easy management
- UK based Microsoft certified Microsoft Teams Phone consultants
- Leading Microsoft gold partner with track record in Teams Phone
Benefits
- Market leading VOIP solution with Microsoft Teams
- Fully integrate all communication with Microsoft Teams Phone
- Improve collaboration and productivity with Microsoft Teams Phone
- Practical, impartial Teams Phone recommendations
- Improved hybrid working environment
- Reduce ongoing hardware costs and maintenance with migration to VOIP
Pricing
£450 to £1,650 a unit a day
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 7 1 5 3 9 0 6 8 3 5 4 0 2 3
Contact
Bridgeall Limited
Andrew Hart
Telephone: 01412126400
Email: tenders@bridgeall.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Our Microsoft Teams Phone services have no known constraints
- System requirements
- https://products.office.com/en-GB/office-system-requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 15 mins
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Microsoft Teams & Skype have been developed to meet accessibility standards.
- Onsite support
- Yes, at extra cost
- Support levels
-
Azure services are available 24 x 7
99.9% availability
Our SLA’s can be tailored and agreed to customer requirements, and flexed on a daily bases, as business requirements dictate - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Microsoft Teams Phone onboarding is tailored to customer’s requirements
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Tailored to customer’s requirements
- End-of-contract process
- Tailored to customer’s requirements
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is no difference between Microsoft Teams Phone for mobile and Microsoft Teams Phone for desktop. Both have native apps and browser experiences.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- Microsoft Teams Phone comes with APIs. The full API details are avilable online at dev.office.com
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- You can find information on how to customise Microsoft Teams Phone here https://technet.microsoft.com/en-us/office/dn788774.aspx
Scaling
- Independence of resources
- Microsoft Teams Phone is backed by Microsoft's Investment and SLA's
Analytics
- Service usage metrics
- Yes
- Metrics types
- Office 365 reporting
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft Cloud Services, Consultancy and our own Software IPR
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Please see https://products.office.com/en-us/business/office-365-online-data-portability
- Data export formats
-
- CSV
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Microsoft guarantees a 99.9% SLA on Microsoft Teams phone https://azure.microsoft.com/en-gb/support/legal/sla/
- Approach to resilience
-
Failover Data Centres - 3 across the UK.
https://docs.microsoft.com/en-gb/Office365/securitycompliance/office-365-data-resiliency-overview - Outage reporting
-
Public dashboard, API, email alerts, SMS
Via the service status portal
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Active Directory Services and Azure AD Connect
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QEC
- ISO/IEC 27001 accreditation date
- 10 May 2021
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- Subject to the Return on Investement model ROI
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 and Cyber Security
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
The CMDB data is maintained by leveraging the request and change management processes, dedicated modules in the Service Desk suite, which are fully integrated into the CMDB. There is a dedicated change management module within the Bridgeall Service Desk, integrated with the configuration, knowledge base, incident and service request modules. The process provides the following core activities through the ITILV3 Service Desk:
• Initiate change request
• Validate change request including security
• Assess and plan change (operational)
• Approve change implementation
• Execute and complete change
• Status reporting
• Review post implementation and close change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Follow the ITIL process for Vulnerability Management processes, as well as applying our Quality ISO9001 and Security ISO27001 processes. Bridgeall will coordinate and perform regular IT health checks and audits, that provide the interface for vulnerability management. The process shall provide the following core activities:
• Preparation
• Vulnerability scan
• Define remediating actions
• Implement remediating actions
• Rescan
We utilise several proprietary tools provided by Nessus, Qualys and Verisign and work with CREST approved NCC Group. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Environments are monitored extensively for both the application and infrastructure covering system availability, performance and automated system jobs.
Automatic monitoring is conducted at regular intervals depending. Alerts are raised by email with customisable multi-user notification escalations available.
Critical Alerts
• Ping/Port Availability Checks
• HTTP on all sites
• SMTP Service Check
• Database Service Check
• URL Availability Check
Trend Alerts
• CPU Usage
• Memory Usage
• Storage Capacity
• Disk I/O
• Disk Read/Write Times
URL Response/Wait Times - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our ITIL V3 Service Desk manages incidents and escalations until resolution. The Service Desk acts as the end user single point of contact for incident restoration, including requests for information and issues. The Service Desk monitors outstanding trouble tickets or records until they are resolved.
We provide the following activities:
Detection and recording
Classification and initial support
Investigation and diagnosis
Resolution and recovery
Tracking and communication.
Major Incident Process:
Follow procedures
Communication
Defines incident severities,
Escalations
Roles and responsibilities - internal and external organisations
Review process and issue a report - actions taken, lessons learned.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
Bridgeall is committed to delivering exceptional value and service, particularly in the context of Covid-19 recovery. All through the pandemic we took necessary steps to ensure both our staff and customers were safe. We adopted a hybrid working environment and promoted working from home and continued to deliver our services without interruption. Our approach is tailored to meet the unique needs of our customers, ensuring that we understand their business, goals, and challenges to implement solutions that drive success. We have a proven track record of adapting quickly to changing circumstances, as evidenced by our rapid development of a new application system for Time for You (TFY) Care to handle increased caseloads during the pandemic.
Our commitment to social value is embedded in our operations. We strive to invest in our client’s business, projects, and communities, aiming to deliver environmental, social, and financial returns. This is exemplified by our work with Link Housing Association, where we provide annual financial sponsorship of their charity foundation, Link Living, which supports children and adults affected by trauma or disadvantage.
In our tender responses, we demonstrate our ability to deliver against social value themes. We propose credible targets and ensure performance is monitored against the National Themes, Outcomes, and Measures (TOMs) developed by the Social Value Portal. Our dedication to social value, particularly in aiding Covid-19 recovery, is evident in our strategic approach to service delivery, our investment in community and environmental projects, and our adherence to rigorous standards that ensure we contribute positively to society.
Pricing
- Price
- £450 to £1,650 a unit a day
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Limited time access to Microsoft Teams Phone for a few users as part of a POC.
- Link to free trial
- TBA