JUNGLE I.T. LIMITED
Teams Telephony
NFON PBX system with integration with Microsoft Teams
Features
- Teams telephony
- Calling plan
- External voice communications
- Resilient voice calling
Benefits
- VoIP calling
- Teams redundancy
- Unified communications
Pricing
£10.95 a user
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@jungleit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
7 9 0 1 4 8 0 8 5 0 1 0 9 2 2
Contact
JUNGLE I.T. LIMITED
Alex Carey
Telephone: 01132584433
Email: sales@jungleit.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Microsoft Teams
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Microsoft Teams
- Android or Apple mobile handset
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- See terms and conditions of service. Weekend support at extra charge.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- See rate card
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Project managed onboarding
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Managed by off boarding project. Configuration documents shared with customer to pass to new supplier.
- End-of-contract process
- Project managed off boarding
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- NFON’s Cloudya has Native Apps for Android, iOS, macOS and Windows. Enabling end users to use devices to send/receive calls and mobiles from any device, including your office phone, home phone, business mobile or personal mobile The Mobile App mirrors both the Desktop and Web RTC App so that that the user experience is seamless across all devices.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The NFON API fully follows the REST paradigm “Hypermedia as the Engine of Applicate State” (HATEOAS), which basically means that all representations of resources shall be linked to each other in a similiar way how hypertext documents work in a browser. The NFON API is accessed through a REST web service interface over an https-connection. REST is an abbreviation for Representational State Transfer. The HTTP verbs GET, POST, PUT and DELETE are used to query, create, update and delete resources. HTTP OPTIONS may be used to query which operations a resource or a collection list of resources will support. The HTTP verb HEAD may be used to check whether a specific resource exists. The HTTP body of the response will be empty. In Javascript Object Notation (JSON). JSON is considered the “fat-free” alternative to XML. It presents data in a compact format, easily readable by humans, and makes it possible to adopt the API in any Web browser. This still allows to present the resources XML encoded at a later time.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customers can customise the branding of the application
Scaling
- Independence of resources
- Elastic cloud service
Analytics
- Service usage metrics
- Yes
- Metrics types
- Standard call reporting features. Customisations available for an additional charge
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Microsoft, NFON
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Request to support team for data extraction
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- VPN can be configured if necessary
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- https://www.nfon.com/media/Default/Legal/GTC-SLA/NFON_UK_Ltd_Service_Level_Agreement_Cloudya_20190124.pdf
- Approach to resilience
- Information available on request
- Outage reporting
- Public dashboard, email alerts and account manager communications
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- Role based access control
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 13 April 2023
- What the ISO/IEC 27001 doesn’t cover
- 8.4, 8.25, 8.28 and 8.29
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- MiFID 2 Compliant for call recording
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO 27001 - 2022
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- ITIL based change management process
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Dealt with by external provider
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Supplier defined processes
- Incident management type
- Supplier-defined controls
- Incident management approach
- ITIL based incident management process
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Joint Academic Network (JANET)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
We have a few initiatives centered around supporting those who are at a disadvantage. Including supporting local charities such as our recent Bake Sale. WE also recently committed to supporting three local charities for the next five years.
https://www.jungleit.co.uk/insights-and-events/news/our-commitment-to-supporting-local-charities/Equal opportunity
We share social posts around supporting talent in the tech sector, including talent that is often underrepresented or misunderstood.
Recent news piece was created around our approach to support talent too.
https://www.jungleit.co.uk/insights-and-events/news/supporting-future-talent-in-the-tech-sector/
News piece of Supporting the Armed Forces Covenant
https://www.jungleit.co.uk/insights-and-events/news/supporting-the-armed-forces-covenant/
Pricing
- Price
- £10.95 a user
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day trial for up to 5 users. Professional services charged if trial is converted into live environment
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@jungleit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.