Pure IP

Cloud-based Number Management application (Number Connect)

A cloud-based telephone number management software-as-a-service to give organisations single pane visibility and control to manage all your telephone numbers in a single place. Includes automated sync with Microsoft Teams and upload facility for other systems

Features

  • Cloud-based software as a service
  • 24/7 Technical-led support
  • Automated synchronization with Microsoft Teams
  • Upload telephone numbers from other systems and suppliers
  • Multiple reports and filtering options
  • Quick view of allocated and unallocated numbers

Benefits

  • Save time, effort and costs by eliminating manual management processes
  • Single, centralised visibility of all telephone numbers
  • Reduces need for spreadsheet management with consolidated data
  • Secure and compliant, with access via secure online portal
  • Optimize licenses and save costs on unused capacity
  • Quick visibility of all allocated and unallocated numbers
  • Flexible reporting and filtering options

Pricing

£75 a unit a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@pure-ip.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

6 5 0 6 1 9 5 1 5 0 1 0 6 2 9

Contact

Pure IP Pure IP G-Cloud Team
Telephone: 02039911100
Email: g-cloud@pure-ip.com

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
No Constraints. Design based on customer requirements supported by a flexible infrastructure.
System requirements
Cloud-based, no specific requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
All tickets receive a response within 1 hour
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide two levels of support:
A 24/7 support desk staffed by a team of UK based technical experts to facilitate quicker ticket resolution.
A dedicated account manager supported by a Customer Care team to manage all aspects of a customer account.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Pure IP provide an on-boarding document that includes technical requirements to set up the service.
A user guide for Pure IP's customer portal is provided, that documents how to view services & invoices, change/add/remove services, and also how to raise tickets. Pure IP can provide training per request.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
At the conclusion of the term of the contract customers will have the ability to port their DDIs to the gaining carrier. Any call detail record will be removed from our customer portal and archived for retention in compliance with the Ofcom and GDPR regulations.
End-of-contract process
The prices for the contract includes the monthly rental and any additional features purchased and the variable call usage. It also includes design, 24/7 support, set-up administration and onboarding.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Our Network Operations Team continuously and rigorously monitor our network constantly reviewing capacity, performance and security. If any issues are identified or utilisation reaches over 80%, action is taken to resolve before it impacts on customer services.
The built-in redundancy measures also ensure we are able to re-route call traffic to minimise contention.
In addition, every customer receives double their contracted capacity as standard due to the failover measures. This ensures customers do not lose calls or get disconnected during spike in traffic beyond their contracted services.

Analytics

Service usage metrics
Yes
Metrics types
In addition to the features of this service (ie. number utilisation, assignment etc.), the customer also gets usage statistics are available to every customer via our secure customer portal. Our portal provides real-time call usage statistics and channel utilisation graphs, shown by an hour, a day, a week and a month. The portal also provides access to services overview and billing information, including invoices and costs.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export /download call detail records from our secure portal in excel
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
All services are architected and managed a minimum of 99.9% SLAs
Approach to resilience
Available on request
Outage reporting
We correspond with customers through email alerts and telephone calls

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
We restrict access by allowing only authorised users access to information
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI Group
ISO/IEC 27001 accreditation date
Initial date: 16 April 2019; Recertified: 16 April 2022
What the ISO/IEC 27001 doesn’t cover
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
Pure IP is ISO 27001 certified and hence follow this framework for policies and processes

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Changes in any systems configuration in use at Pure IP are carefully designed, documented, requested and approved before actually being made. All staff with authority to make changes must follow a formal Change Management Policy and Change Management Process. We categorise changes into four types:
1) Standard Change –routine changes with a pre-defined change plan, with no impact.
2) Normal Change –changes that must follow the change process and be approved by a manager
3) High Risk Change –changes that must follow a two-stage approval process
4) Emergency Change –change that is required to restore service during an impacting incident
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Pure IP have enlisted different scanning & testing services to support vulnerability management. The results from these scans & tests are then fed back into our Risk Management Process with a Vulnerability Risk Register kept in order to define mitigation steps. Pure IP's Information Security Team are subscribed to various security mailing lists and RSS feeds, and regularly review industry specific forums to be appraised of new threats and vulnerabilities We perform monthly internal and external vulnerability scans against our networks. We also have an external specialist perform annual penetration testing to attempt to actively exploit weaknesses in an environment.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All systems and hardware that form part of Pure IP's network are monitored by dedicated monitoring systems. We are actively alerted on certain events occurring. These alerts are monitored & investigated by a 24/7 NOC team to ensure the necessary actions are taken ASAP.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Pure IP have a defined Security Incident Management Process. Any suspicious or actual security events must be reported to the Information Security Team, who can then take collective actions to assess and address the event should it be determined to be an actual security incident. A Security Incident register is maintained, where all events are logged, enabling us to efficiently track them throughout their lifecycle. For certain security incidents, a full investigation is completed, with a Security Incident Report written up, allowing us to preserve any evidence for forensic analysis and investigation.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Pure IP monitors our carbon footprint and sustainability and take whatever possible action to reduce our effect on the environment. This encompasses all areas of our business from minimizing the power consumption of our infrastructure, to actively facilitating remote working to reduce staff travel and remote engagement strategies with partners and clients, as well actively encouraging recycling within all our offices.

• We have invested in and support the funding of alternative energy technologies . One example being our investment in company Naked Energy in the UK
• Upgraded to new equipment with less carbon footprint
• e-waste recycling
• paperless invoicing
• installation of water filters in our offices to reduce plastic waste
• installed automatic light shut off in our offices
• Encourage carpooling or riding a bike to work for our employees
• Designated recycling bins for different wastes and made them accessible to all employees

Pricing

Price
£75 a unit a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We provide a 14 day free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@pure-ip.com. Tell them what format you need. It will help if you say what assistive technology you use.