Secure SMS Delivery
Send and receive text messages with guaranteed security and reliable message delivery for sensitive communications.
Features
- HTTP(s) APIs
- SMPP v3.4
- TLS/IPSec connectivity for secure delivery
- Cloud-based SMS Gateway
- Direct UK Mobile Network Connections
- Two-way communication with long numbers
- Highly reliable and resilient architecture
Benefits
- Easy deployment and scalability
- Supports industry-standard protocols
- Streamlines communication processes
- Minimizes downtime, maximizes communication uptime
- Optimized for critical communications
- Guaranteed message delivery and quality
- Seamless integration with existing systems
Pricing
£0.02 to £0.07 a unit a second
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 0 5 3 4 6 0 4 0 0 8 4 1 7 5
Contact
STOUR MARINE LIMITED
Leo Bartle
Telephone: 07537100000
Email: leo.bartle@stourmarine.co.uk
Service scope
- Service constraints
- Stour Marine offers both live support (over phone, Skype or Google Meet) as well as e-mail support for all aspects of the service provided. Stour Marine staff is continuously available during business hours (9am to 5pm) Monday to Friday, with on-call support for emergencies outside business hours. A single dedicated contact telephone number and e-mail address is provided.
- System requirements
-
- Messaging platform capable of HTTP(s)/SMPP v3.4
- Programming knowledge if using API/SMPP integrations.
- Systems to process data from delivery reports
- Long number provisioning if utilizing two-way features.
- Internal security policies for handling sensitive communications.
- Internet connection with sufficient bandwidth for API usage.
- Firewall rules allowing outbound API/SMPP traffic and IPSec
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Severity Level / Reaction / Response / Remedy
Emergency / 1 hour / 5 hours / 8 hours
High / Next Working Day / 2 Working Days / 6 Working Days
Medium / Next Working Day / 5 Working Days / 60 Working Days
Low / Next Working Day / 10 Working Days / 120 Working Days
Query N/A - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Silver-Level Support Package: Availability: 9-5 support during working hours and weekdays. Services: Basic troubleshooting, software updates, and standard maintenance. Gold-Level Support Package: Availability: Extended hours support, such as 7-7 on weekdays and limited weekend support to provide faster response to faults. Resolution times unchanged Services: Includes all low-level services plus faster response times, optional additional hardware redundancy, and preventive maintenance. Platinum-Level Support Package: Availability: 24/7 support including holidays. Services: All services from medium-level support, plus the fastest response times, dedicated support personnel optional, and priority in fault resolution. All Emergency support service requests from Customer to Stour Marine shall always be done by telephone. E-mail based issue handling system should be used for sending supplementary information. All accounts will have a Technical Account Manager assigned by default.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Comprehensive User Documentation: provided at start of on-boarding.
Dedicated Onboarding Specialist: Assign new clients a point of contact to provide personalized guidance during the initial configuration and testing phase.
Live Chat/Phone Support: Provide easily accessible support channels to address questions and resolve issues quickly.
Tailored Training (If Applicable): For enterprise clients with complex infrastructure, consider offering customized training sessions (onsite or online) for a fee.
This combination of self-service resources, proactive support, and flexible training options will cater to different learning styles and technical expertise, ensuring a smooth and successful adoption of our Secure SMS Delivery service. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Define data rights: Include clear terms in the contract about data ownership, extraction formats, and any fees involved.
Proactive Notice: Provide clients with 30-60 days notice before contract termination and reminders about data extraction.
Call Detail Records (CDRs): Caller/callee numbers, timestamps, duration, cost.
Support Assistance (optional): Offer data extraction as a service for complex scenarios (may have associated costs).
Data Retention: Data is stored for at least 3 years after the contract ends.
Secure Transfer: Use encrypted methods for sensitive data. - End-of-contract process
-
Service Termination:
Secure SMS Delivery access will cease at the agreed-upon end date.
Data Extraction: Users have a specified window (e.g., 30 days) to extract their data (call records, voicemails, configuration). Methods will be clearly outlined in the contract.
Final Billing: Any outstanding charges based on usage or additional services will be settled.
Option to Renew: If applicable, the client will be presented with the option to renew the contract under new terms.
Included in Contract Price:
Core Secure SMS Delivery: Base service with included features like SMS Gateway Access: The core service of sending and receiving SMS.
Standard Features: Basic API/SMPP v3.4 access, delivery reports, enhanced security through SMS as well as SS7 firewalls.
Technical Support: Support within agreed-upon hours and channels.
Additional Costs:
Extra Features: Advanced features (e.g. detailed analytics) may be offered as tiered add-ons.
Premium Support: 24/7 support, onsite assistance, or expedited response times might have additional fees.
Setup/Configuration: Complex setup or customization may incur one-time or ongoing charges.
Using the service
- Web browser interface
- No
- API
- Yes
- What users can and can't do using the API
- Send and receive SMS as well as DLRs.
- API automation tools
- Other
- Other API automation tools
- Standard HTTP APIs
- API documentation
- Yes
- API documentation formats
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Scalable Infrastructure: Our cloud-based system expands to handle demand surges, preventing slowdowns. Resource Isolation: Your traffic and data are securely separated, ensuring other users don't impact your experience. Traffic Prioritization: Voice calls always get top priority on our network, guaranteeing clear communication. Redundancy: Multiple data centers and automatic failover mechanisms ensure your service is always available. Monitoring: We proactively track usage to identify and address potential issues before they affect you.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Call Detail Records (CDRs) - metadata about calls.
- User configuration settings and preferences.
- System logs for troubleshooting and auditing.
- Billing and invoicing data.
- Custom routing rules and access lists.
- Security settings and compliance-related records.
- Analytics and reporting data.
- Backup controls
- This is a Managed Service. Should clients need local backups, Stour Marine can support with the setup for additional fees.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The platform solution should be available for use 24/7, 366 days per year. The platform solution should be available >99.99% of the time, in any given week. Service credits if not achieved.
- Approach to resilience
- Geographic redundancy - within UK preferable, or otherwise as Stour Marine deems best
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Here's how we implement strict access controls for management interfaces and support channels: **Role-Based Access Control (RBAC):** We implement strict RBAC aligned with SOC2/ISO27001, ensuring users only access data necessary for their role, in keeping with GDPR's minimization principle. **Two-Factor Authentication (2FA):** Mandatory for privileged access, providing a crucial layer of security (SOC2/ISO27001). **Secure Remote Access:** VPNs are used for remote management, creating encrypted tunnels and enhancing security (SOC2/ISO27001). **Password Policies:** Complex passwords, regular changes, and secure storage are enforced (SOC2/ISO27001). **Auditing and Logging:** Access attempts and actions are logged for traceability and accountability per SOC2/ISO27001 and GDPR requirements.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are currently are 90% readiness for an audit to obtain SOC2 and ISO 27001 certifications
- Information security policies and processes
- We are following the SOC2 and ISO 27001 certification processes.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration Management Database (CMDB): We maintain a CMDB to track Configuration Items (CIs) throughout their lifecycle, including relationships and dependencies. Change Requests: All changes undergo a structured process including Request for Change (RFC), approval by a Change Advisory Board (CAB), and risk/impact assessments. Security Focus: Each change is evaluated for potential security implications. Vulnerability scanning and penetration testing occur within our testing environments. Release and Deployment: Changes are packaged, tested in a staging environment, and deployed with a documented rollback plan.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our vulnerability management process aligns with SOC2/ISO27001 principles: Risk Assessment: We continuously identify potential threats through vulnerability scans, penetration testing, and threat intelligence feeds. Prioritization: We prioritize vulnerabilities based on severity and risk to our services. Patching: We have a defined timeline for deploying critical patches, balancing urgency with rigorous testing in a staging environment. Threat Intelligence: We subscribe to reputable threat feeds, vendor advisories, and security communities to stay updated on emerging vulnerabilities. Monitoring: We actively monitor systems for signs of intrusion or compromise.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our protective monitoring processes focus on early detection and swift response: Log Collection & Analysis: We centralize logs from network devices, firewalls, and endpoints, using tools for analysis and anomaly detection. Alerting: We configure real-time alerts for suspicious activity patterns or security events. Incident Response: We have a defined incident response plan with clear roles, escalation procedures, and communication protocols. Timeliness: Initial response times are outlined in our Service Level Agreements (SLAs), prioritizing critical incidents for immediate containment and investigation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Here's a breakdown of our incident management process, aligned with ITIL best practices: Incident Logging: Users report incidents via a designated service desk with multiple channels (phone, email). Categorization & Prioritization: Incidents are classified based on impact and urgency, triggering appropriate response procedures. Escalation: Complex incidents follow pre-defined escalation paths to ensure timely resolution. Pre-defined Processes: We have standardized responses for common incident types, streamlining resolution and reducing downtime. Incident Reporting: We provide regular updates to impacted users and generate post-incident reports for analysis and improvement.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Red Hat Virtualisation
- How shared infrastructure is kept separate
- Software is used to create smaller, isolated environments for each use case within the larger physical infrastructure.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- AWS managed
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Paperless Communication: SMS replaces the need for printed notifications, saving paper and reducing waste.
Enabling Remote Work: Reliable SMS facilitates remote work setups or hybrid models, leading to reduced commuting and associated emissions.
Optimization Potential: Buyers can utilize our service for route optimization notifications (delivery services), further reducing environmental impact.
Sustainability Commitment: We'll disclose efforts to improve our own energy efficiency and are open to exploring partnerships with clients on green initiatives.Covid-19 recovery
Essential Communication:
Reliable SMS keeps public sectors (healthcare, essential services) connected during disruptions when in-person contact is limited.
Contact Tracing Support: Potential use case for SMS-based contact tracing if a scalable and secure implementation is designed with public health authorities.
Business Communication: Supports business continuity for SMBs through contactless customer updates or appointment reminders.Tackling economic inequality
Accessible Pricing:
Our model avoids large upfront hardware costs, making it accessible to small businesses and non-profits.
Underserved Areas: SMS can bridge communication gaps in areas with limited internet access, promoting economic participation.
Skills Development: We will partner with local educational institutions for internships or workshops related to SMS-based solutions.Equal opportunity
Wide Accessibility: SMS reaches a wide range of individuals, including those with limited internet access or smartphones. This ensures critical information can be disseminated broadly.
Language Support: Investigate supporting multi-language SMS to bridge communication gaps in diverse communities.
Data Privacy: Our security-first design, with potential for client-side encryption, helps prevent data misuse that could lead to discrimination.
Partnership Focus: Seek collaborations with organizations that promote digital inclusion and access to technology for marginalized groups.Wellbeing
Mental Health Resources:
Potential partnerships with crisis hotlines or mental health services to leverage reliable SMS for support and outreach.
Emergency Alerts: Ensure rapid and reliable delivery of emergency or public safety notifications, promoting community wellbeing.
Appointment Reminders: Use in healthcare settings to reduce missed appointments, improving healthcare access and outcomes.
Reduced Stress: Automated SMS for billing or service updates can save time and reduce stress for both businesses and individuals.
Pricing
- Price
- £0.02 to £0.07 a unit a second
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Subject to commercials being accepted, a testing of the service is started. Based on the acceptance criteria being passed, the account is then moved into production.