Managed SIP Trunking Voice Service
Fully managed cloud-based SIP Trunking service connecting into your on-premises or cloud telephony platforms. A vendor neutral service connecting to most telephone platforms and applications. Secure, resilient, reliable SIP based communications. Ideal for PSTN replacement.
Features
- Secure, reliable and resilient enterprise grade SIP-based voice network
- 24/7 Technical-led support
- Provision of numbers for all UK area codes
- Porting of numbers from all UK carriers
- Provision of dedicated voice circuits
- Integration with legacy, on-premises and other telephony applications
- Delivered as a fully managed service
- Customisable
Benefits
- Fully managed reducing demands on internal resources
- Minimizing the need for on-premises hardware (SBC)
- Up to 20 faster at provisioning than other providers
- Integration with other telephony platforms and applications
- Technical led support
- Consolidation of services for cost efficiencies
- Flexible billing
- Support of flexible and remote working
Pricing
£25 a unit a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 9 6 6 8 9 2 4 2 4 7 9 9 9 3
Contact
Pure IP
Pure IP G-Cloud Team
Telephone: 02039911100
Email: g-cloud@pure-ip.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- No Constraints. Design based on customer requirements supported by a flexible infrastructure.
- System requirements
-
- SIP enabled Telephony platform or SBC
- Relevant Microsoft Licenses
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- All tickets receive a response within 1 hour
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide two levels of support:
A 24/7 support desk staffed by a team of UK based technical experts to facilitate quicker ticket resolution.
A dedicated account manager supported by a Customer Care team to manage all aspects of a customer account. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Pure IP provide an on-boarding document that includes technical requirements to set up the service.
Configuration guides are also provided for Teams Direct Routing & SBCs (e.g. Avaya, Audiocodes, Ribbon, Sonus, etc..)
A user guide for Pure IP's customer portal is provided, that documents how to view services & invoices, change/add/remove services, and also how to raise tickets. Pure IP can provide training per request. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- At the conclusion of the term of the contract customers will have the ability to port their DDIs to the gaining carrier. Any call detail record will be removed from our customer portal and archived for retention in compliance with the Ofcom and GDPR regulations.
- End-of-contract process
- The prices for the contract includes the DDI rental, channel rental, any additional features purchased and the variable call usage. It also includes design, 24/7 support, set-up administration and onboarding.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
-
Our Network Operations Team continuously and rigorously monitor our network constantly reviewing capacity, performance and security. If any issues are identified or utilisation reaches over 80%, action is taken to resolve before it impacts on customer services.
The built-in redundancy measures also ensure we are able to re-route call traffic to minimise contention.
In addition, every customer receives double their contracted capacity as standard due to the failover measures. This ensures customers do not lose calls or get disconnected during spike in traffic beyond their contracted services.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage statistics are available to every customer via our secure customer portal. Our portal provides real-time call usage statistics and channel utilisation graphs, shown by an hour, a day, a week and a month. The portal also provides access to services overview and billing information, including invoices and costs.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export /download call detail records from our secure portal in excel
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- All services are architected and managed a minimum of 99.9% SLAs
- Approach to resilience
- Available on request
- Outage reporting
- We correspond with customers through email alerts and telephone calls
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- We restrict access by allowing only authorised users access to information
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI Group
- ISO/IEC 27001 accreditation date
- Initial date: 16 April 2019; Recertified: 16 April 2022
- What the ISO/IEC 27001 doesn’t cover
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials Plus and SOC2
- Information security policies and processes
- Pure IP is ISO 27001 certified and hence follow this framework for policies and processes
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Changes in any systems configuration in use at Pure IP are carefully designed, documented, requested and approved before actually being made. All staff with authority to make changes must follow a formal Change Management Policy and Change Management Process. We categorise changes into four types:
1) Standard Change –routine changes with a pre-defined change plan, with no impact.
2) Normal Change –changes that must follow the change process and be approved by a manager
3) High Risk Change –changes that must follow a two-stage approval process
4) Emergency Change –change that is required to restore service during an impacting incident - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Pure IP have enlisted different scanning & testing services to support vulnerability management. The results from these scans & tests are then fed back into our Risk Management Process with a Vulnerability Risk Register kept in order to define mitigation steps. Pure IP's Information Security Team are subscribed to various security mailing lists and RSS feeds, and regularly review industry specific forums to be appraised of new threats and vulnerabilities We perform monthly internal and external vulnerability scans against our networks. We also have an external specialist perform annual penetration testing to attempt to actively exploit weaknesses in an environment.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All systems and hardware that form part of Pure IP's network are monitored by dedicated monitoring systems. We are actively alerted on certain events occurring. These alerts are monitored & investigated by a 24/7 NOC team to ensure the necessary actions are taken ASAP.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Pure IP have a defined Security Incident Management Process. Any suspicious or actual security events must be reported to the Information Security Team, who can then take collective actions to assess and address the event should it be determined to be an actual security incident. A Security Incident register is maintained, where all events are logged, enabling us to efficiently track them throughout their lifecycle. For certain security incidents, a full investigation is completed, with a Security Incident Report written up, allowing us to preserve any evidence for forensic analysis and investigation.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Equal opportunity
Covid-19 recovery
Facilitates flexible working possibilities allowing authorities to offer new services to aid Covid-19 recovery and provide a technology environment to facilitate equal opportunities.Equal opportunity
Facilitates flexible working possibilities allowing authorities to offer new services to aid Covid-19 recovery and provide a technology environment to facilitate equal opportunities.
Pricing
- Price
- £25 a unit a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We provide a 14 day free trial with 5 channels and 10 DDIs and £20 of call usage for testing