SIP Trunking
Our SIP Trunking Service is based on a highly flexible and secure, cloud based SBC, which includes the following free options: Caller ID selection, Fraud detection and prevention tools, Call access lists for PRS, national/international calling, Call admission control for Concurrent Channels setup, Flexible configuration based on your existing infrastructure
Features
- Cloud-based SBC with Geo-Redundacy
- Fraud Detection and Prevention
- Call Access Lists
- Flexible Configuration for Bring Your Own Supplier
- Encryption (TLS/SRTP/IPSec VPN)
- Compliance Support (SOC2, GDPR, ISO 27001)
- Protection for PRS and Origin Based Surcharges by default
- (Non)Geo and Mobile Virtual Numbers both UK and International
Benefits
- Enhances security with multi-layered encryption and compliance support
- Boosts reliability with geo-redundant cloud-based infrastructure.
- Increases flexibility with seamless integration into existing systems.
- Improves compliance with SOC2, GDPR, and ISO 27001 standards.
- Default protection against PRS and Origin Based surcharges
- Minimizes risk with proactive fraud detection and blocking.
- Streamlines operations by reducing IT workload and complexity.
- Maximizes uptime for uninterrupted business communication.
- Number Portabilty
Pricing
£0.00 to £0.01 a unit a minute
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 3 5 7 5 3 1 0 4 3 1 7 8 0
Contact
STOUR MARINE LIMITED
Leo Bartle
Telephone: 07537100000
Email: leo.bartle@stourmarine.co.uk
Service scope
- Service constraints
-
Stour Marine offers both live support (over phone, Skype or Google Meet) as well as e-mail support for all aspects of the service provided.
Stour Marine staff is continuously available during business hours (9am to 5pm) Monday to Friday, with on-call support for emergencies outside business hours.
A single dedicated contact telephone number and e-mail address is provided. - System requirements
-
- Reliable internet connection with sufficient bandwidth.
- SIP-compatible IP PBX or softphone clients.
- Network Address Translation (NAT) traversal support, if applicable.
- VPN compatibility for optional enhanced security.
- Domain Name System (DNS) configured for SRV record lookups (optional).
- Basic firewall configuration to allow SIP/RTP traffic.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
All customer contracts are supported by our standard Service
Level Agreement (SLA) as shown below:
Priority 1 (High) - 30 minutes
Priority 2 (Medium) - 2 Business Hours
Priority 3 (Low) - 8 Business Hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Silver-Level Support Package:
Availability: 9-5 support during working hours and weekdays.
Services: Basic troubleshooting, software updates, and standard maintenance.
Gold-Level Support Package:
Availability: Extended hours support, such as 7-7 on weekdays and limited weekend support to provide faster response to faults. Resolution times unchanged
Services: Includes all low-level services plus faster response times, optional additional hardware redundancy, and preventive maintenance.
Platinum-Level Support Package:
Availability: 24/7 support including holidays.
Services: All services from medium-level support, plus the fastest response times, dedicated support personnel optional, and priority in fault resolution.
All Emergency support service requests from Customer to Stour Marine shall always be done by telephone. E-mail based issue handling system should be used for sending supplementary information.
All accounts will have a Technical Account Manager assigned by default. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Comprehensive User Documentation: provided at start of on-boarding.
Dedicated Onboarding Specialist: Assign new clients a point of contact to provide personalized guidance during the initial configuration and testing phase.
Live Chat/Phone Support: Provide easily accessible support channels to address questions and resolve issues quickly.
Tailored Training (If Applicable): For enterprise clients with complex infrastructure, consider offering customized training sessions (onsite or online) for a fee.
This combination of self-service resources, proactive support, and flexible training options will cater to different learning styles and technical expertise, ensuring a smooth and successful adoption of our SIP Trunking service. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Define data rights: Include clear terms in the contract about data ownership, extraction formats, and any fees involved.
Proactive Notice: Provide clients with 30-60 days notice before contract termination and reminders about data extraction.
Call Detail Records (CDRs): Caller/callee numbers, timestamps, duration, cost.
Support Assistance (optional): Offer data extraction as a service for complex scenarios (may have associated costs).
Data Retention: Data is stored for at least 3 years after the contract ends.
Secure Transfer: Use encrypted methods for sensitive data. - End-of-contract process
-
Service Termination:
SIP Trunking access will cease at the agreed-upon end date.
Data Extraction: Users have a specified window (e.g., 30 days) to extract their data (call records, voicemails, configuration). Methods will be clearly outlined in the contract.
Final Billing: Any outstanding charges based on usage or additional services will be settled.
Option to Renew: If applicable, the client will be presented with the option to renew the contract under new terms.
Included in Contract Price:
Core SIP Trunking: Base service with included features like concurrent calls, cloud-based SBC, security essentials.
Standard Support: Support channels like email, knowledge base access, and regular business hours support.
Additional Costs:
Extra Features: Advanced features (e.g., call recording, detailed analytics) may be offered as tiered add-ons.
Per-Minute Usage: Call charges beyond the included allowance.
Premium Support: 24/7 support, onsite assistance, or expedited response times might have additional fees.
Setup/Configuration: Complex setup or customization may incur one-time or ongoing charges.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
-
Scalable Infrastructure: Our cloud-based system expands to handle demand surges, preventing slowdowns.
Resource Isolation: Your traffic and data are securely separated, ensuring other users don't impact your experience.
Traffic Prioritization: Voice calls always get top priority on our network, guaranteeing clear communication.
Redundancy: Multiple data centers and automatic failover mechanisms ensure your service is always available.
Monitoring: We proactively track usage to identify and address potential issues before they affect you. - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
- All storage is maintained in AWS UK DCs.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Call Detail Records (CDRs) - metadata about calls.
- User configuration settings and preferences.
- System logs for troubleshooting and auditing.
- Billing and invoicing data.
- Custom routing rules and access lists.
- Security settings and compliance-related records.
- Analytics and reporting data.
- Backup controls
- This is Managed Service. Should clients need local backups, Stour Marine can support with the setup for additional fees.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
The platform solution should be available for use 24/7, 366 days per year.
The platform solution should be available >99.99% of the time, in any given week. Service credits if not achieved. - Approach to resilience
- Geographic redundancy - within UK preferable, or otherwise as Stour Marine deems best
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Here's how we implement strict access controls for management interfaces and support channels:
**Role-Based Access Control (RBAC):** We implement strict RBAC aligned with SOC2/ISO27001, ensuring users only access data necessary for their role, in keeping with GDPR's minimization principle.
**Two-Factor Authentication (2FA):** Mandatory for privileged access, providing a crucial layer of security (SOC2/ISO27001).
**Secure Remote Access:** VPNs are used for remote management, creating encrypted tunnels and enhancing security (SOC2/ISO27001).
**Password Policies:** Complex passwords, regular changes, and secure storage are enforced (SOC2/ISO27001).
**Auditing and Logging:** Access attempts and actions are logged for traceability and accountability per SOC2/ISO27001 and GDPR requirements. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are currently are 90% readiness for an audit to obtain SOC2 and ISO 27001 certifications
- Information security policies and processes
- We are following the SOC2 and ISO 27001 certification processes.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Configuration Management Database (CMDB): We maintain a CMDB to track Configuration Items (CIs) throughout their lifecycle, including relationships and dependencies.
Change Requests: All changes undergo a structured process including Request for Change (RFC), approval by a Change Advisory Board (CAB), and risk/impact assessments.
Security Focus: Each change is evaluated for potential security implications. Vulnerability scanning and penetration testing occur within our testing environments.
Release and Deployment: Changes are packaged, tested in a staging environment, and deployed with a documented rollback plan. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our vulnerability management process aligns with SOC2/ISO27001 principles:
Risk Assessment: We continuously identify potential threats through vulnerability scans, penetration testing, and threat intelligence feeds.
Prioritization: We prioritize vulnerabilities based on severity and risk to our services.
Patching: We have a defined timeline for deploying critical patches, balancing urgency with rigorous testing in a staging environment.
Threat Intelligence: We subscribe to reputable threat feeds, vendor advisories, and security communities to stay updated on emerging vulnerabilities.
Monitoring: We actively monitor systems for signs of intrusion or compromise. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Our protective monitoring processes focus on early detection and swift response:
Log Collection & Analysis: We centralize logs from network devices, firewalls, and endpoints, using tools for analysis and anomaly detection.
Alerting: We configure real-time alerts for suspicious activity patterns or security events.
Incident Response: We have a defined incident response plan with clear roles, escalation procedures, and communication protocols.
Timeliness: Initial response times are outlined in our Service Level Agreements (SLAs), prioritizing critical incidents for immediate containment and investigation. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Here's a breakdown of our incident management process, aligned with ITIL best practices:
Incident Logging: Users report incidents via a designated service desk with multiple channels (phone, email).
Categorization & Prioritization: Incidents are classified based on impact and urgency, triggering appropriate response procedures.
Escalation: Complex incidents follow pre-defined escalation paths to ensure timely resolution.
Pre-defined Processes: We have standardized responses for common incident types, streamlining resolution and reducing downtime.
Incident Reporting: We provide regular updates to impacted users and generate post-incident reports for analysis and improvement.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Software is used to create smaller, isolated environments for each use case within the larger physical infrastructure.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- AWS Managed
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Cloud Efficiency: Our cloud-based SIP Trunking model inherently reduces on-premises hardware requirements for clients. This translates to lower energy consumption and a smaller carbon footprint for their communications.
Remote Work Enablement: Our service facilitates reliable remote work setups, reducing commuting needs and associated carbon emissions.
Paperless Operations: We encourage e-billing, self-service portals, and digital documentation, minimizing paper waste.
Sustainability Commitment: We are actively exploring renewable energy options for our datacenters and will provide transparency on our sustainability initiatives to potential buyers.Tackling economic inequality
Accessibility for SMBs: Our cloud-based model brings enterprise-grade communication features to small and medium businesses with cost-effective, pay-as-you-go pricing. This levels the playing field against larger enterprises.
Regional Development: Where possible, we partner with suppliers and datacenters in economically disadvantaged areas to foster local growth.Equal opportunity
Diverse Hiring & Partnerships: We have a demonstrable commitment to diversity and inclusion within our workforce and actively seek partnerships with minority-owned businesses.
Accessibility Features: We work to ensure our management interfaces and any client-facing tools are designed with accessibility standards (WCAG) in mind.
Data Privacy: Robust security and compliance with GDPR safeguards user data, addressing potential discrimination risks that can arise from data misuse.Wellbeing
Work-Life Balance: Our reliable SIP Trunking facilitates flexible work arrangements and remote setups. This can improve work-life balance for employees of businesses using our service, reducing stress and potential burnout.
Reduced Commuting Stress: By enabling remote work, our service helps individuals save commuting time. This contributes to less travel-related stress and frees time for personal or wellness activities.
Reliable Communication for Essential Services: Our emphasis on uptime and redundancy is crucial for sectors like healthcare and social services. Ensuring their communication channels are always available reduces stress for their workers and promotes the wellbeing of those who rely on these services.
Internal Wellbeing: We prioritize a positive and supportive work environment within our own company, fostering a culture that cascades into the high-quality service we provide.
Pricing
- Price
- £0.00 to £0.01 a unit a minute
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Subject to commercials being accepted, a testing of the service is started. Based on the acceptance criteria being passed, the account is then moved into production.