Skip to main content

Help us improve the Digital Marketplace - send your feedback

STOUR MARINE LIMITED

SIP Trunking

Our SIP Trunking Service is based on a highly flexible and secure, cloud based SBC, which includes the following free options: Caller ID selection, Fraud detection and prevention tools, Call access lists for PRS, national/international calling, Call admission control for Concurrent Channels setup, Flexible configuration based on your existing infrastructure

Features

  • Cloud-based SBC with Geo-Redundacy
  • Fraud Detection and Prevention
  • Call Access Lists
  • Flexible Configuration for Bring Your Own Supplier
  • Encryption (TLS/SRTP/IPSec VPN)
  • Compliance Support (SOC2, GDPR, ISO 27001)
  • Protection for PRS and Origin Based Surcharges by default
  • (Non)Geo and Mobile Virtual Numbers both UK and International

Benefits

  • Enhances security with multi-layered encryption and compliance support
  • Boosts reliability with geo-redundant cloud-based infrastructure.
  • Increases flexibility with seamless integration into existing systems.
  • Improves compliance with SOC2, GDPR, and ISO 27001 standards.
  • Default protection against PRS and Origin Based surcharges
  • Minimizes risk with proactive fraud detection and blocking.
  • Streamlines operations by reducing IT workload and complexity.
  • Maximizes uptime for uninterrupted business communication.
  • Number Portabilty

Pricing

£0.00 to £0.01 a unit a minute

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at leo.bartle@stourmarine.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 7 3 5 7 5 3 1 0 4 3 1 7 8 0

Contact

STOUR MARINE LIMITED Leo Bartle
Telephone: 07537100000
Email: leo.bartle@stourmarine.co.uk

Service scope

Service constraints
Stour Marine offers both live support (over phone, Skype or Google Meet) as well as e-mail support for all aspects of the service provided.

Stour Marine staff is continuously available during business hours (9am to 5pm) Monday to Friday, with on-call support for emergencies outside business hours.

A single dedicated contact telephone number and e-mail address is provided.
System requirements
  • Reliable internet connection with sufficient bandwidth.
  • SIP-compatible IP PBX or softphone clients.
  • Network Address Translation (NAT) traversal support, if applicable.
  • VPN compatibility for optional enhanced security.
  • Domain Name System (DNS) configured for SRV record lookups (optional).
  • Basic firewall configuration to allow SIP/RTP traffic.

User support

Email or online ticketing support
Email or online ticketing
Support response times
All customer contracts are supported by our standard Service
Level Agreement (SLA) as shown below:
 Priority 1 (High) - 30 minutes
 Priority 2 (Medium) - 2 Business Hours
 Priority 3 (Low) - 8 Business Hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Silver-Level Support Package:
Availability: 9-5 support during working hours and weekdays.
Services: Basic troubleshooting, software updates, and standard maintenance.

Gold-Level Support Package:
Availability: Extended hours support, such as 7-7 on weekdays and limited weekend support to provide faster response to faults. Resolution times unchanged
Services: Includes all low-level services plus faster response times, optional additional hardware redundancy, and preventive maintenance.

Platinum-Level Support Package:
Availability: 24/7 support including holidays.
Services: All services from medium-level support, plus the fastest response times, dedicated support personnel optional, and priority in fault resolution.

All Emergency support service requests from Customer to Stour Marine shall always be done by telephone. E-mail based issue handling system should be used for sending supplementary information.

All accounts will have a Technical Account Manager assigned by default.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Comprehensive User Documentation: provided at start of on-boarding.
Dedicated Onboarding Specialist: Assign new clients a point of contact to provide personalized guidance during the initial configuration and testing phase.
Live Chat/Phone Support: Provide easily accessible support channels to address questions and resolve issues quickly.
Tailored Training (If Applicable): For enterprise clients with complex infrastructure, consider offering customized training sessions (onsite or online) for a fee.

This combination of self-service resources, proactive support, and flexible training options will cater to different learning styles and technical expertise, ensuring a smooth and successful adoption of our SIP Trunking service.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Define data rights: Include clear terms in the contract about data ownership, extraction formats, and any fees involved.
Proactive Notice: Provide clients with 30-60 days notice before contract termination and reminders about data extraction.
Call Detail Records (CDRs): Caller/callee numbers, timestamps, duration, cost.
Support Assistance (optional): Offer data extraction as a service for complex scenarios (may have associated costs).
Data Retention: Data is stored for at least 3 years after the contract ends.
Secure Transfer: Use encrypted methods for sensitive data.
End-of-contract process
Service Termination:

SIP Trunking access will cease at the agreed-upon end date.
Data Extraction: Users have a specified window (e.g., 30 days) to extract their data (call records, voicemails, configuration). Methods will be clearly outlined in the contract.
Final Billing: Any outstanding charges based on usage or additional services will be settled.
Option to Renew: If applicable, the client will be presented with the option to renew the contract under new terms.

Included in Contract Price:

Core SIP Trunking: Base service with included features like concurrent calls, cloud-based SBC, security essentials.
Standard Support: Support channels like email, knowledge base access, and regular business hours support.

Additional Costs:

Extra Features: Advanced features (e.g., call recording, detailed analytics) may be offered as tiered add-ons.
Per-Minute Usage: Call charges beyond the included allowance.
Premium Support: 24/7 support, onsite assistance, or expedited response times might have additional fees.
Setup/Configuration: Complex setup or customization may incur one-time or ongoing charges.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Scalable Infrastructure: Our cloud-based system expands to handle demand surges, preventing slowdowns.
Resource Isolation: Your traffic and data are securely separated, ensuring other users don't impact your experience.
Traffic Prioritization: Voice calls always get top priority on our network, guaranteeing clear communication.
Redundancy: Multiple data centers and automatic failover mechanisms ensure your service is always available.
Monitoring: We proactively track usage to identify and address potential issues before they affect you.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
All storage is maintained in AWS UK DCs.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Call Detail Records (CDRs) - metadata about calls.
  • User configuration settings and preferences.
  • System logs for troubleshooting and auditing.
  • Billing and invoicing data.
  • Custom routing rules and access lists.
  • Security settings and compliance-related records.
  • Analytics and reporting data.
Backup controls
This is Managed Service. Should clients need local backups, Stour Marine can support with the setup for additional fees.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The platform solution should be available for use 24/7, 366 days per year.
The platform solution should be available >99.99% of the time, in any given week. Service credits if not achieved.
Approach to resilience
Geographic redundancy - within UK preferable, or otherwise as Stour Marine deems best
Outage reporting
Email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Here's how we implement strict access controls for management interfaces and support channels:

**Role-Based Access Control (RBAC):** We implement strict RBAC aligned with SOC2/ISO27001, ensuring users only access data necessary for their role, in keeping with GDPR's minimization principle.

**Two-Factor Authentication (2FA):** Mandatory for privileged access, providing a crucial layer of security (SOC2/ISO27001).

**Secure Remote Access:** VPNs are used for remote management, creating encrypted tunnels and enhancing security (SOC2/ISO27001).

**Password Policies:** Complex passwords, regular changes, and secure storage are enforced (SOC2/ISO27001).

**Auditing and Logging:** Access attempts and actions are logged for traceability and accountability per SOC2/ISO27001 and GDPR requirements.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We are currently are 90% readiness for an audit to obtain SOC2 and ISO 27001 certifications
Information security policies and processes
We are following the SOC2 and ISO 27001 certification processes.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration Management Database (CMDB): We maintain a CMDB to track Configuration Items (CIs) throughout their lifecycle, including relationships and dependencies.

Change Requests: All changes undergo a structured process including Request for Change (RFC), approval by a Change Advisory Board (CAB), and risk/impact assessments.

Security Focus: Each change is evaluated for potential security implications. Vulnerability scanning and penetration testing occur within our testing environments.

Release and Deployment: Changes are packaged, tested in a staging environment, and deployed with a documented rollback plan.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our vulnerability management process aligns with SOC2/ISO27001 principles:

Risk Assessment: We continuously identify potential threats through vulnerability scans, penetration testing, and threat intelligence feeds.

Prioritization: We prioritize vulnerabilities based on severity and risk to our services.

Patching: We have a defined timeline for deploying critical patches, balancing urgency with rigorous testing in a staging environment.

Threat Intelligence: We subscribe to reputable threat feeds, vendor advisories, and security communities to stay updated on emerging vulnerabilities.

Monitoring: We actively monitor systems for signs of intrusion or compromise.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our protective monitoring processes focus on early detection and swift response:

Log Collection & Analysis: We centralize logs from network devices, firewalls, and endpoints, using tools for analysis and anomaly detection.

Alerting: We configure real-time alerts for suspicious activity patterns or security events.

Incident Response: We have a defined incident response plan with clear roles, escalation procedures, and communication protocols.

Timeliness: Initial response times are outlined in our Service Level Agreements (SLAs), prioritizing critical incidents for immediate containment and investigation.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Here's a breakdown of our incident management process, aligned with ITIL best practices:

Incident Logging: Users report incidents via a designated service desk with multiple channels (phone, email).

Categorization & Prioritization: Incidents are classified based on impact and urgency, triggering appropriate response procedures.

Escalation: Complex incidents follow pre-defined escalation paths to ensure timely resolution.

Pre-defined Processes: We have standardized responses for common incident types, streamlining resolution and reducing downtime.

Incident Reporting: We provide regular updates to impacted users and generate post-incident reports for analysis and improvement.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Software is used to create smaller, isolated environments for each use case within the larger physical infrastructure.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
AWS Managed

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Cloud Efficiency: Our cloud-based SIP Trunking model inherently reduces on-premises hardware requirements for clients. This translates to lower energy consumption and a smaller carbon footprint for their communications.
Remote Work Enablement: Our service facilitates reliable remote work setups, reducing commuting needs and associated carbon emissions.
Paperless Operations: We encourage e-billing, self-service portals, and digital documentation, minimizing paper waste.
Sustainability Commitment: We are actively exploring renewable energy options for our datacenters and will provide transparency on our sustainability initiatives to potential buyers.

Tackling economic inequality

Accessibility for SMBs: Our cloud-based model brings enterprise-grade communication features to small and medium businesses with cost-effective, pay-as-you-go pricing. This levels the playing field against larger enterprises.
Regional Development: Where possible, we partner with suppliers and datacenters in economically disadvantaged areas to foster local growth.

Equal opportunity

Diverse Hiring & Partnerships: We have a demonstrable commitment to diversity and inclusion within our workforce and actively seek partnerships with minority-owned businesses.
Accessibility Features: We work to ensure our management interfaces and any client-facing tools are designed with accessibility standards (WCAG) in mind.
Data Privacy: Robust security and compliance with GDPR safeguards user data, addressing potential discrimination risks that can arise from data misuse.

Wellbeing

Work-Life Balance: Our reliable SIP Trunking facilitates flexible work arrangements and remote setups. This can improve work-life balance for employees of businesses using our service, reducing stress and potential burnout.

Reduced Commuting Stress: By enabling remote work, our service helps individuals save commuting time. This contributes to less travel-related stress and frees time for personal or wellness activities.

Reliable Communication for Essential Services: Our emphasis on uptime and redundancy is crucial for sectors like healthcare and social services. Ensuring their communication channels are always available reduces stress for their workers and promotes the wellbeing of those who rely on these services.

Internal Wellbeing: We prioritize a positive and supportive work environment within our own company, fostering a culture that cascades into the high-quality service we provide.

Pricing

Price
£0.00 to £0.01 a unit a minute
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Subject to commercials being accepted, a testing of the service is started. Based on the acceptance criteria being passed, the account is then moved into production.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at leo.bartle@stourmarine.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.