DMV COMMUNICATIONS LTD
Cloud Telephony - 3CX Phone System
Cloud hosting for telephony services and applications - IP PBX Hosted
Features
- Fully featured PBX incl. Ring Groups, Call Queues, Call Recording
- Voicemail Transcription
- Video Conferencing
- Live Chat & Messaging
- Call Centre Features
- Call Flow Designer
- Hot Desking
- Skills Based Routing
- In built Failover
- CRM integration
Benefits
- Contact Centre
- No per user pricing
- Call, Video and Messaging
- MS Office365 and Google integration
- Teams Direct Routing
- Mobile and Desktop Apps included
- Integrated Call Centre
Pricing
£195 to £9,999 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at digitalmarketplace@dmvcomms.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
5 3 3 9 9 3 2 6 9 4 2 4 3 5 7
Contact
DMV COMMUNICATIONS LTD
Tan Ali
Telephone: 01213690121
Email: digitalmarketplace@dmvcomms.com
Service scope
- Service constraints
- Service is fully supported including end user support
- System requirements
-
- Windows and MAC
- Internet Connectivity Bandwidth requirements for SIP
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Immediate Response 8 x 5 x 4
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Webchat is accessible via our website
- Web chat accessibility testing
- Our web chat can be used alongside people with visual impairment using their audible software
- Onsite support
- Yes, at extra cost
- Support levels
-
DMV Communications takes support very seriously.
Operating ALL DAY, EVERY DAY, we have a team of experts that are always there to help.
You can call, email, chat or ask us to call you or your customer at any time, any day.
Included free of charge with all Hosted and Data services, we provide expert, 24/7 support from our Birmingham offices.
Our customer support desk outshines the competition.
1. Available all day, every day. Contact us by telephone, email, website or our chat system. You can even ask us to call you back at a convenient time
2. UK based
3. Technical competence
4. It's FREE and that includes calls to our freephone number from within the UK
Support
• 24/7 UK based fault handing and customer service 365 days a year handled by our own staff.
• Office Hours - 0800-1800 – Support provided by our office staff
• Out of Hours – 1800 – 0800 – Out of hours support team pick up any issues.
• Highly trained, UK-based customer service managers for managed accounts.
• Timely, accurate bills and a single invoice with management reports clearly showing call summaries and billing details. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide bespoke and custom made packages along with online user guides. Based on customer requirements we can scope the most suitable method for rollout. Our service has the most intuitive design and guides that customers can access.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Call logs and CDR files along with system configuration are available upon user requests.
- End-of-contract process
- Numbers and services can be ported away
Using the service
- Web browser interface
- Yes
- Using the web interface
- Access the service with all features and functionality
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- W3A
- Web interface accessibility testing
- Accessible to users with visual impairment
- API
- Yes
- What users can and can't do using the API
- Third party application integration including CRM and call journalling
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
- Users can manage the OS using the CLI
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- We host services based on the licensed number of users and services are scaled up/ down accordingly
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- 3CX Phone SYSTEM
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Everything - OS and Files
- Call Recording
- Backup controls
- Scheduled and User controlled
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
3CX hosting frees your time and resources as we manage your 3CX system for you.
We deploy your instance to cloud provider and automatically configure firewall rules.
We manage 3CX and the operating system, including security patches and version upgrades (i.e. from Debian 10 to Debian 12)
We take nightly backups.
We keep your 3CX on the latest non-beta update.
We monitor your 3CX system 24/7.
3CX’s hosted service is provided WITH 15 data centres worldwide and hosts over 78 million computing instances. Their SLA time is 99.99%. Please note that during system updates, i.e. upgrading to a newer version, your system may experience limited downtime. We will, however, inform customers before taking any action. - Approach to resilience
-
3CX’s hosted service is primarily provided by DigitalOcean which has 15 data centers worldwide and hosts over 78 million computing instances. Their SLA time is 99.99%.
Included in the service, we take nightly backups of your system so that in the event of any issue with your instance, we can spin up a new one in no time so that you are up and running as soon as possible. These backups are encrypted and stored securely.
We deploy your instance to the closest data center in your region.
We manage the operating system, including security patches and version upgrades (i.e. from Debian 10 to Debian 11).
We keep your 3CX on the latest non-beta update.
We monitor your 3CX system 24/7 including
Monitoring of the data center.
SIP trunk availability.
Connectivity of any SBCs
Usage of system resources and services incl
Uptime reachability
CPU
RAM
Disc space
Steal
Clock skew
Duplicated machines
Wrong size machines
SSH unreachable machines
3CX Services - Outage reporting
- Public Dashboard and Email Alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Restricting access to management interfaces and support channels is crucial for maintaining the security and integrity of communication systems.
We use the following:
Role Based Access Controls (RBAC)
User Authentication
Strong Password Policies
IP Whitelisting
Audit Trails
Secure Remote Access
Vendor Access Controls - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
3CX is a widely used software-based private branch exchange (PBX) system, primarily known for its VoIP (Voice over Internet Protocol) solutions.
Data Encryption: 3CX implements encryption protocols to protect data both in transit and at rest, especially for sensitive information like call records, user credentials, and configuration settings.
Access Control: Access to 3CX systems and administrative interfaces is typically restricted to authorised personnel through strong authentication mechanisms like username/password combinations, two-factor authentication, or biometric authentication.
Regular Security Updates: 3CX releases regular software updates and patches to address vulnerabilities and security issues identified through internal testing, external audits, or reported by customers and security researchers.
Secure Configuration: 3CX systems are configured securely following industry best practices to minimize the risk of unauthorised access, data breaches, and service disruptions.
Incident Response Plan: 3CX has an incident response plan in place to detect, respond to, and recover from security incidents such as data breaches, denial-of-service attacks, or system compromises.
Compliance: 3CX may adhere to relevant regulatory requirements and industry standards such as GDPR (General Data Protection Regulation), PCI DSS (Payment Card Industry Data Security Standard)
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Centralised Configuration Management: 3CX may offer configuration templates or presets for common deployment scenarios, making it easier for administrators to set up new installations quickly and consistently.
Changes to configuration settings are likely tracked and logged within the 3CX management interface, allowing administrators to review and audit configuration changes over time.
Backup and Restore: 3CX offers built-in tools for backing up and restoring configuration settings, ensuring that administrators can recover from accidental changes or system failures.
Change Management:
Change Control Process: 3CX have a formal change control process in place for reviewing, approving, and implementing changes to the PBX system. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
3CX uses a versioning scheme to denote different releases of its software products. With new versions/ updates released at predetermined intervals. Release cycles include major releases, introduce significant new features, We outline the specific changes, improvements, and bug fixes included in the release.
Depending on the deployment model (e.g., on-premises or cloud-hosted), We offer automatic update mechanisms to streamline the process of updating to the latest version. Automatic updates can help ensure that users have access to the latest features, improvements, and security patches without manual intervention. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Protective monitoring is a crucial aspect of maintaining the security and integrity of communication systems like 3CX. While I don't have real-time access to the specific protective monitoring processes implemented by 3CX, I can outline general best practices that many organizations follow in this area:
Real Time Monitoring
Event Logging and Analysis
Alerting and Notification
Incident Response
Forensic Analysis
Compliance Monitoring - Incident management type
- Supplier-defined controls
- Incident management approach
-
3CX follows structured incident management processes to detect, respond to, and resolve security incidents efficiently. Here's an overview of the typical incident management processes that 3CX implement:
Incident Detection
Incident Triage and Classification
Notification and Escalation
Incident Investigation
Containment and Mitigation
Resolution and Recovery
Documentation and Recovery
Documentation and Reporting
Post Incident Analysis and Improvement
By following these incident management processes, 3CX aims to minimise the impact of security incidents, protect its systems and data from unauthorised access or compromise, and maintain the trust and confidence of its users and stakeholders.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
-
Virtual machines (VMs) sharing the same infrastructure are typically kept apart through a combination of isolation techniques and resource management mechanisms.
Hypervisor Level Isolation
Resource Allocation and Management
Network Segmentation
Firewall and Security Policies
VLANs
Encryption and Secure Communication
Access control and authentication
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
3CX contributes to tackling economic inequality in several ways, primarily through its role in facilitating communication and collaboration for organisations of all sizes. Here are some aspects of 3CX's approach to economic inequality:
Enhanced Communication
Accessibility
Flexibility and Mobility
Empowering SMBs
Supporting Digital Transformation
Environmental ImpactEqual opportunity
3CX contributes to equal opportunities in several ways, primarily through its role in facilitating communication and collaboration for organisations of all sizes. Here are some aspects of 3CX's approach to equal opportunity:
Enhanced Communication
Accessibility
Flexibility and Mobility
Empowering SMBs
Supporting Digital Transformation
Environmental ImpactWellbeing
3CX contributes to wellbeing in several ways, primarily through its role in facilitating communication and collaboration for organisations of all sizes. Here are some aspects of 3CX's wellbeingl values:
Enhanced Communication
Accessibility
Flexibility and Mobility
Empowering SMBs
Supporting Digital Transformation
Environmental Impact
Pricing
- Price
- £195 to £9,999 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
0 £ forever
up to 10 users
Next-gen phone system
Bring your own SIP Trunk
WFH: remote-enable teams
Live Chat
Team Messaging
WhatsApp
Video Conferencing
Holiday & Business Hours Routing
3CX Talk Links
Mobile & Desktop Apps
Ring Group & Welcome Message
Max 3 Deskphones
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at digitalmarketplace@dmvcomms.com.
Tell them what format you need. It will help if you say what assistive technology you use.