Employee Productivity Platform - Infosys Meridian
A virtual colloboration and event hosting platform. It enables enterprises to evolve into a remote-first, hyper-productive, anywhere experience to help reimagine processes, enhance productivity, and deepen stakeholder / customer engagement. It brings in a unique proposition / differentiator with an integrated offering to provide a seamless and unified user experience.
Features
- Audio/Video Conferencing
- Screen Share
- Virtual events - Keynote
- Virtual Learning Assistant
- Virtual events - Landing page and lobby management
- Virtual events - Showcase
- Virtual events - Speaker list
- Virtual events - Event Agenda
- Virtual events - Social Lounge
- Virtual events - Photo Booth, Games and Gamification
Benefits
- Meet collaborate and ideate in a near physical manner
- Near physical immersive virtual experiences
- Enable learning with intuitive dashboards & analytics
Pricing
£50,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 7 8 6 3 6 6 5 5 5 5 4 8 1 6
Contact
Infosys Limited
Peter Gill
Telephone: +44 7391393866
Email: ukps@infosys.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- If the customer participants are going to join the Meridian meeting room from behind their firewall, the Meridian domain has to be whitlisted from the customer side
- System requirements
-
- Platform is available as SaaS model on Public cloud.
- HTML5 compliant Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Email Support available. Follows 18/5 support model
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support levels and coverage can be agreed with our customers based on their individual requirements
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- The platform is simple to use and 1 enablement session can be planned on the event platform that has been created for the customer before the start of the event
- Service documentation
- Yes
- Documentation formats
- Other
- Other documentation formats
- Github
- End-of-contract data extraction
- Individual users cannot extract data, however, at the end of the contract all user data will be downloaded and a dump of the same will be provided to the client
- End-of-contract process
- At the end of contract Meridian instance will be decommissioned. Data dump would be provided to client. The end-of-the contract data dump is included in the contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Yes. But as the platform provides very intuitive and immersive experience the platform works best on desktops and laptops
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- N/A
- Accessibility standards
- None or don’t know
- Description of accessibility
- WCAG 2.1
- Accessibility testing
- We are happy to provide details depending on individual client requirements
- API
- Yes
- What users can and can't do using the API
- The platform is built on the API architecture and any APIs to be exposed for specific functionality will be developed by Technical Team. The users can not make any setup/changes to the service through API
- API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- No, the features cannot be customized but they can bring in their own creative and branded assets for building the events
Scaling
- Independence of resources
- The platform follows a multi-tenancy architecture and is built for internet type scale.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Analytics available through dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- The data is encrypted on rest and isolation is done between tenants by using different buckets and services for each client. Content exists primarily on AWS S3 and protected using the Amazon SSE-KMS where the keys used for encryption can be created, managed and rotated.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can not export their data. The data dump will be provided at either the end of the contract or at contract termination
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- We have access restrictions that can be implemented through roles on the platform. This ensures to have access provided only to authorized personnel within the platform
Availability and resilience
- Guaranteed availability
- 99.5%
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
-
To use the services of the platform, the user needs to be authenticated. The authentication mechanisms supported are :
1. Multi-Factor Authentication
2. Oauth
3. OIDC
4. Federated Oauth
5. Form-based authentication depending on the client requirements
and
6. Passwordless Login - Access restrictions in management interfaces and support channels
-
Platform supports the following authentication mechanism from client specic Identity and Autherization provider
1. Multi-Factor Authentication
2. Oauth
3. OIDC
4. Federated Oauth
5. Form-based authentication depending on the client requirements
and
6. Passwordless Login - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas Holding SAS - UK
- ISO/IEC 27001 accreditation date
- 2017
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The anti-advanced persistent threat (Anti- APT) solution based on FireEye’s web, email, endpoint, and file threat prevention platforms aim to defeat advanced targeted APT attacks, advanced malware, zero day, and known advanced threats. It also aggressively evades signature-based defenses and supplements traditional and next-gen firewalls, intrusion prevention system (IPS), antivirus, and gateways. Additionally, it also takes care of integrated multistage protection against today’s multi-vectored web, email, endpoint, and file-based advanced threats
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Provides systematic approach to control life cycle of all changes, facilitating beneficial changes to be made with minimum disruption to IT services. Change Management offers ITIL-aligned processes for normal, standard, and emergency change types.
Normal change: Follows complete change lifecycle including peer or technical approval, management, Change Advisory Board (CAB) authorization before being implemented, reviewed, closed.
Standard change: Frequently implemented, repeatable implementation steps, low risk, proven history of success.
Emergency change: Covers fix on fail or retroactive situations where impact to service has been experienced or fail situations where the impact to service is imminent if action is not taken. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Infosys has an organization wide Data Loss Prevention (DLP) solution that is implemented on Infosys network.GCloud specific policy can be configured on this solution to monitor data leakage via emails. Our network and applications are scanned for Vulnerabilities on a regular basis. We employ an independent third party to perform vulnerability tests. The frequency of such tests on the platform is every 6 months. Vulnerabilities are remedied by using a patch management process.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Pre-requisite of developing an effective data breach response plan requires: Definition of PIIs and Customer Sensitive Information that organization collects, regulations that are applicable, location of the individuals etc. Other inputs that should be considered are around the access provided to the database, logging mechanism put in place, encryption of data while storage and transmission etc. Infosys will create a customized plan for addressing a data security breach for its client data. During audits, real-time and historic event monitoring, if a breach is observed, initial level of incident categorization/grouping is done and necessary steps are taken for escalation and notification
- Incident management type
- Supplier-defined controls
- Incident management approach
- Definition of Personal Information and the Customer Sensitive Information that organization collects, regulations that are applicable, location of the individuals etc. Other inputs that should be considered are around the access provided to the database, logging mechanism put in place, encryption of data while storage and transmission etc. Infosys will create a customized plan for addressing a data security breach for its client data. During the audits, real time and historic event monitoring, if a breach is observed, initial level of incident categorization / grouping is done and necessary steps are taken for escalation and notification
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Infosys has achieved carbon neutrality of global operations in accordance with PAS 2060. Please refer to this link for more details: https://www.infosys.com/global-resource/18/carbon-neutrality-declaration.pdf - Covid-19 recovery
-
Covid-19 recovery
Infosys invests in multiple training opportunities for people of all ages to provide the digital skills needed for the future growth of the UK and to actively support the economic recovery from Covid 19. Exacerbated during the pandemic, there is now a significant digital divide in the UK. With a massive shortage of digital devices for children and vulnerable people in UK communities, Infosys is working to support the UK government’s Digital Inclusion Strategy by helping to provide access to essential online services. As part of this Infosys has donated 25 laptops to residents in low-income areas where there is a lack of digital essentials. This donation will benefit the children and vulnerable people in Communities by enabling their entry in to the digital world, allowing them to access learning and education resources, careers advices, council services and much more from their homes. - Tackling economic inequality
-
Tackling economic inequality
Infosys invests in the community and is committed to support investment in local people and the local economy, providing active support for disadvantaged groups, in particular young people about to enter the job market for the first time and NEETS, needing direct support and guidance. We have established a quantifiable delivery plan against our commitments to ensure clear and measurable outputs and actions are detailed, along with a timeline. We use our existing Learning Management and Programme Management Systems to monitor and report against commitments made. Infosys’ learning and development, social responsibility and HR/recruitment teams are actively involved in managing the engagement process and ensuring the right outcomes. - Equal opportunity
-
Equal opportunity
Through its CSR program ‘Infosys Springboard, Infosys looks to enable education, learning and employment for the under-represented communities in UK. Working with local authorities in the UK, Infosys is launching a free online platform offering guided training in technology and curated content to address reskilling of unemployed in tech, non tech and support roles. It is a cloud-first and mobile-first solution that is designed to be accessible anytime, anywhere and on any device. - Wellbeing
-
Wellbeing
In Infosys, employees' health and well-being are at the forefront of our culture. As workplaces transform around us, individual and collective well-being has emerged as a focal point. Maintaining employee well-being during the pandemic: through our concerted efforts, our employee well-being rates reached an all-time high of 91% among employees across locations, even with the virtual setup. The sense of connectedness stands at 88% because of the ability of different teams to come together and collaborate with each other emotionally. We successfully touched the lives of 150,000+ employees through 431+ initiatives, where we witnessed a three-fold increase in employee participation virtually. The key focus for us was mental health, where we conducted 150+ interventions, last year. We created three aspects essential to shaping employee experience: 1. Self-Help: The first circle emphasises providing our employees the right tools and resources for them to take charge of their well-being. We created an ecosystem that enables our employees to makeself-help a way of living. 2. Micro-Environment: We observed that two of the foremost reasons for employees to come to work are the teams that they are part of and having a best friend at work. With the hybrid ways of working taking front stage, the future points to the needs for creating virtual environments that nurture and harbour the concept of co-existing, co-creating and collaborating. To enliven this idea our objective is to create an environment that is conducive for individuals to work together, seamlessly. 3. Macro Environment: The focus here is on driving the programmes centrally and integrating the pieces of the puzzle. Conceptualising policies and programmes keeping the user at the centre.
Pricing
- Price
- £50,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No