Teleware Teams Attendant Console
Teams Attendant Console provides intuitive caller panels for attendant consoles in Microsoft Teams, offering an efficient and user-friendly interface for managing calls. With easy access to features such as transfer, hold, and mute, users can handle calls with ease, improving productivity and enhancing the overall communication experience. bssgc
Features
- Simple to buy, set-up and use
- Keeps the Familiar look and feel of Microsoft Teams
- 1-click call transfer and handling
- Works with Microsoft Power Platform and 365
- Built on Microsoft Teams and Azure that ‘just works’
- Easily search contacts
- Easily see caller context
- Customisable to fit user needs
Benefits
- Familiar and easy to use interface
- Less training required
- Faster transition time moving to attendant console from legacy systems
- Simple to implement – takes minutes to deploy
- Efficient – can be run in browser or desktop app.
- Makes users more productive
Pricing
£100 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 1 3 6 8 3 3 4 7 0 2 3 2 7 4
Contact
Bytes Software Services
Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- MicrosoftTeams
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- Requires Microsoft Teams Phone System licence and PSTN connectivity through Teams.
- System requirements
-
- Requires an Internet Connection
- Windows 10 or 11 Operating System
- Dual core 1.1 GHz or faster processor
- 2 GB of available space
- 8 GB RAM
- Teams certified audio device
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
When a ticket is logged in service desk, there is an automated response, with a
reference, and they are sent within 5 minutes of the ticket being automatically
logged. General questions are not managed through a specific SLA however
they are logged and responded to as soon as possible via our Support teams.
For general fault management the following priority levels and associated
response times apply: Priority 1: 2 hours Priority 2: 4 hours Priority 3: 8 hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Teleware’s customer centric service vision is to put the customer at the heart of everything we do, our managed services operate 24x7x365 and the Teleware platform. Our Network Operation Centre constantly monitors and manages the performance of the platform, through capacity management, quality of service monitoring, resilience, availability, change control and incident management. All our processes are managed within our ISO27001 certified Information Security Management System, as well as our ISO9001 Quality Management system, which feature ITIL based procedures and functions. Combined, these factors enable Teleware to achieve customer service excellence. We class priority 1 as a complete loss of all services to all identities, priorty 2 is loss of all services to a group of identities, and priority 3 as minor cloud service faults not included in the above.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Through the implementation of a tailored program and Project Management Methodology, the Teleware Project Manager will ensure the project is governed through a controlled number of stages. It will be structured, documented and accessible with defined deliverables at each stage. Project governance, as agreed with the customer will be applied. Teleware leverage an unparalleled learning solution that combines content expertise with an intelligent platform, designed to transform the way users work with Microsoft technology. A highly personalised approach to change management gets users and their technology on the same team, preventing frustration, alleviating IT workloads & helping organisations reach goals. Teleware builds a customised adoption strategy to drive your company’s software usage. Our platform and strategy help deliver personalised learning programmes to every user or persona and importantly measures the impact of adoption and usage. Our platform uses big data, machine learning and a human touch to help you achieve your goals.
- Service documentation
- Yes
- Documentation formats
- Other
- Other documentation formats
- Online user guide
- End-of-contract data extraction
- Not applicable - all data is stored within the customers own Microsoft Teams tenant
- End-of-contract process
- At the end of a contract the service is decommissioned on a pre-defined date, after which point the application is no longer accessible.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The solution has an OPENAPI to which customers would have access to export data and configure settings.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Users can customise the layout of the attendant console as well as the widgets contained within each frame, for example this may be a quick dial contacts list, voicemail, call history etc. These customised layouts can also be exported and imported for other users.
Scaling
- Independence of resources
- Operates within a customers own Microsoft Teams tenancy
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Landis
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Not applicable - all data is stored within the customers own Microsoft Teams tenant
- Data export formats
- Other
- Other data export formats
- N/A
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The uptime availability is dictated by the uptime of Microsoft Teams and conforms to Microsofts latest advertised SLA of 99.999% uptime availability.
- Approach to resilience
- The service operates as a part of the Microsoft Teams architecture, and therefore mirrors their architected resilience.
- Outage reporting
- These can be viewed on the Landis website
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- Full access to management interfaces is not supported for end users, access to the solution can be enabled or restricted within the customers Azure enterprise application registration
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRQA
- ISO/IEC 27001 accreditation date
- 09/02/2024
- What the ISO/IEC 27001 doesn’t cover
- Microsoft Teams as this is external to our organisation
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- This is governed by our ISMS Technical Services policy which details the processes and controls in place covering information security including: Access controls for physical access to computer rooms, data centres, or offices. Logical access controls based on active directory, with suitable policies in place covering password rules and constraints, as well as controls around requesting access and defined processes for user-IDs and privileged IDs. This also covers Network access which governs internet, wide area networks and firewalls. Hardware process are defined around laptops, PC's and mobile devices for staff as well as physical servers hosted in our data centres, all covered by system hardening standards through anti-virus and anti-malware, vulnerability scanning (external and internal), network performance monitoring, configuration scanning, audit logging and Microsoft Operations Management Suite (OMS). These are underpinned by senior management approved processes around change control, asset management, remote access, disposal and backup.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- A change control process document is utilised which defines the technical change within technology environments (infrastructure, software, etc) this process is followed by all personnel unless prior authorisation has been provided by emergency stakeholders where the process cannot be followed for unexpected reasons. We define 2 key groups of staff “Change Advisory Board” (CAB) and Key stakeholders. The CAB is comprised of technical staff and key decision makers who evaluate changes to the production environments. The CAB is focused exclusively on reviewing Change Requests for risk and unintended consequences and agreeing for changes to be performed to production environments
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We employ external vulnerability scanner services to scan our platforms. The NOC conducts monthly tests using Qualsys SSL labs server test. All scans are maintained and initiated by the NOC according to the maintenance calendar. Scan results are compared to established baseline and where differences and issues are identified, raised as risks. Risks are prioritized as High, Medium, and Low status as indicated by the
tool that has identified it (Intruder, SSL Labs, or PEN testing). The following resolution targets relate to each severity: High - Immediate Medium – 1 month Low – 6 months Informational – Discretionary - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Teleware services are managed by our NOC. The NOC utilise multiple monitoring systems to maintain the confidentiality, availability and integrity of the service, these include Pager Duty, to alert our operatives
of critical and alert situations. PRTG network monitor to measure capacity and alerts for all servers, virtual servers, routers, switches, LANs and WANs. OCOM SIP monitor to measure call performance. Automated
diallers to ensure the integrity of end-to-end call routes, Azure security centre to ensure that security baselines are adhered to, and Intruder, a vulnerability scanner which monitors the external surface of the platform
for security vulnerabilities. - Incident management type
- Supplier-defined controls
- Incident management approach
-
All incidents are managed within Teleware's ISO 27001 compliant ISMS. All service incidents are managed and communicated through the Teleware service desk through agreed SLAs and priorities. Major
incidents affecting confidentiality, integrity or availability are managed within Teleware incident register. At the commencement of an incident, an incident owner is assigned who is responsible for assessing,
containing and communicating the incident as well as the resolution of the incident. All corrective actions and lessons learned are recorded and managed within our ISMS which which is reviewed by senior management and audited annually by LR
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Teleware is committed to tackling all forms of discrimination and inequality in both the workplace and the services the organisation provides. Our policy sets out how to promote equal opportunity and prevent all forms of unlawful or unfair discrimination, harassment, and victimisation. The aim of the policy is to:
• work towards the elimination of all forms of discrimination
• create a positive culture, where diversity, inclusion and respect are core values and at the centre of our activities
• ensure employees and senior management are engaged with development and implementation of this policy
• encourage positive action to overcome disadvantage and discrimination
• ensure highest possible standards are achieved in the delivery of our services to customers and in our employment practices
• ensure equality, diversity and inclusion is promoted through work, both internally and externally Teleware is committed to:
• creating an inclusive environment where individual differences and the contributions of our employees and senior management are recognised and valued
• creating a working environment that promotes dignity and respect for all
• implementing inclusive recruitment practices
• ensuring development and progression opportunities are available to all
• regularly reviewing service provision to ensure it is accessible, fair and appropriate to all groups within society
• providing information and training to all employees and senior management to ensure that they are fully aware of electronic data interchange (EDI) issues and their responsibilities relating to these areas
• ensuring that no person or group of people will suffer detrimentally in promotion or dismissal
• ensuring workplace benefits are accessible to all
• monitoring our workforce so that we can work towards ensuring they reflect the customers we are serving
• assessing the impact of our policies, practices, and services
• embedding EDI into our policies, procedures, and everyday practice
Pricing
- Price
- £100 a user a month
- Discount for educational organisations
- No
- Free trial available
- No