Skip to main content

Help us improve the Digital Marketplace - send your feedback

Pure IP

Managed SIP Trunking Voice Service

Fully managed cloud-based SIP Trunking service connecting into your on-premises or cloud telephony platforms. A vendor neutral service connecting to most telephone platforms and applications. Secure, resilient, reliable SIP based communications. Ideal for PSTN replacement.

Features

  • Secure, reliable and resilient enterprise grade SIP-based voice network
  • 24/7 Technical-led support
  • Provision of numbers for all UK area codes
  • Porting of numbers from all UK carriers
  • Provision of dedicated voice circuits
  • Integration with legacy, on-premises and other telephony applications
  • Delivered as a fully managed service
  • Customisable

Benefits

  • Fully managed reducing demands on internal resources
  • Minimizing the need for on-premises hardware (SBC)
  • Up to 20 faster at provisioning than other providers
  • Integration with other telephony platforms and applications
  • Technical led support
  • Consolidation of services for cost efficiencies
  • Flexible billing
  • Support of flexible and remote working

Pricing

£25 a unit a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@pure-ip.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 9 6 6 8 9 2 4 2 4 7 9 9 9 3

Contact

Pure IP Pure IP G-Cloud Team
Telephone: 02039911100
Email: g-cloud@pure-ip.com

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
No Constraints. Design based on customer requirements supported by a flexible infrastructure.
System requirements
  • SIP enabled Telephony platform or SBC
  • Relevant Microsoft Licenses

User support

Email or online ticketing support
Email or online ticketing
Support response times
All tickets receive a response within 1 hour
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide two levels of support:
A 24/7 support desk staffed by a team of UK based technical experts to facilitate quicker ticket resolution.
A dedicated account manager supported by a Customer Care team to manage all aspects of a customer account.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Pure IP provide an on-boarding document that includes technical requirements to set up the service.
Configuration guides are also provided for Teams Direct Routing & SBCs (e.g. Avaya, Audiocodes, Ribbon, Sonus, etc..)
A user guide for Pure IP's customer portal is provided, that documents how to view services & invoices, change/add/remove services, and also how to raise tickets. Pure IP can provide training per request.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
At the conclusion of the term of the contract customers will have the ability to port their DDIs to the gaining carrier. Any call detail record will be removed from our customer portal and archived for retention in compliance with the Ofcom and GDPR regulations.
End-of-contract process
The prices for the contract includes the DDI rental, channel rental, any additional features purchased and the variable call usage. It also includes design, 24/7 support, set-up administration and onboarding.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Our Network Operations Team continuously and rigorously monitor our network constantly reviewing capacity, performance and security. If any issues are identified or utilisation reaches over 80%, action is taken to resolve before it impacts on customer services.
The built-in redundancy measures also ensure we are able to re-route call traffic to minimise contention.
In addition, every customer receives double their contracted capacity as standard due to the failover measures. This ensures customers do not lose calls or get disconnected during spike in traffic beyond their contracted services.

Analytics

Service usage metrics
Yes
Metrics types
Usage statistics are available to every customer via our secure customer portal. Our portal provides real-time call usage statistics and channel utilisation graphs, shown by an hour, a day, a week and a month. The portal also provides access to services overview and billing information, including invoices and costs.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export /download call detail records from our secure portal in excel
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
All services are architected and managed a minimum of 99.9% SLAs
Approach to resilience
Available on request
Outage reporting
We correspond with customers through email alerts and telephone calls

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
We restrict access by allowing only authorised users access to information
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI Group
ISO/IEC 27001 accreditation date
Initial date: 16 April 2019; Recertified: 16 April 2022
What the ISO/IEC 27001 doesn’t cover
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials Plus and SOC2
Information security policies and processes
Pure IP is ISO 27001 certified and hence follow this framework for policies and processes

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Changes in any systems configuration in use at Pure IP are carefully designed, documented, requested and approved before actually being made. All staff with authority to make changes must follow a formal Change Management Policy and Change Management Process. We categorise changes into four types:
1) Standard Change –routine changes with a pre-defined change plan, with no impact.
2) Normal Change –changes that must follow the change process and be approved by a manager
3) High Risk Change –changes that must follow a two-stage approval process
4) Emergency Change –change that is required to restore service during an impacting incident
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Pure IP have enlisted different scanning & testing services to support vulnerability management. The results from these scans & tests are then fed back into our Risk Management Process with a Vulnerability Risk Register kept in order to define mitigation steps. Pure IP's Information Security Team are subscribed to various security mailing lists and RSS feeds, and regularly review industry specific forums to be appraised of new threats and vulnerabilities We perform monthly internal and external vulnerability scans against our networks. We also have an external specialist perform annual penetration testing to attempt to actively exploit weaknesses in an environment.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All systems and hardware that form part of Pure IP's network are monitored by dedicated monitoring systems. We are actively alerted on certain events occurring. These alerts are monitored & investigated by a 24/7 NOC team to ensure the necessary actions are taken ASAP.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Pure IP have a defined Security Incident Management Process. Any suspicious or actual security events must be reported to the Information Security Team, who can then take collective actions to assess and address the event should it be determined to be an actual security incident. A Security Incident register is maintained, where all events are logged, enabling us to efficiently track them throughout their lifecycle. For certain security incidents, a full investigation is completed, with a Security Incident Report written up, allowing us to preserve any evidence for forensic analysis and investigation.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Covid-19 recovery
  • Equal opportunity

Covid-19 recovery

Facilitates flexible working possibilities allowing authorities to offer new services to aid Covid-19 recovery and provide a technology environment to facilitate equal opportunities.

Equal opportunity

Facilitates flexible working possibilities allowing authorities to offer new services to aid Covid-19 recovery and provide a technology environment to facilitate equal opportunities.

Pricing

Price
£25 a unit a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We provide a 14 day free trial with 5 channels and 10 DDIs and £20 of call usage for testing

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@pure-ip.com. Tell them what format you need. It will help if you say what assistive technology you use.