Redcentric Unity IP Voice (UCaaS)
Unity IP Voice is Redcentric’s hosted enterprise voice solution for organisations seeking to modernise their telephony system while controlling costs. It offers carrier-grade IP-telephony voice solution with optional UCaaS features, accessible from various devices. Managed 24/7 voice service, it includes call centre options, free staff calls, and flexible pricing.
Features
- Carrier grade IP telephony system
- Extensive range of enterprise grade user features
- Access from desktop IP phones, PC's, laptops, tablets and smartphones
- Fully managed with 24/7 technical support
- Call centre option with advanced call control and reporting
- Integration with 3rd Party Business Applications - CTI / CRM
- Web Administration / Management Portal
- Online Reporting Suite
Benefits
- No up-front capital investment
- Pay per user per month service
- Fully Managed Service - No upgrade or maintenance charges
- Significant Cost-Savings Compared To on-premises solutions
- PSTN connectivity included, no additional ISDN line rental charges
- 24/7 Support via Telephone, Email and Web Portal
- Free calls between staff
- Improved business continuity / disaster recovery with rapid recovery
- Improved productivity for mobile staff
- Future proof and highly scalable
Pricing
£2.60 to £66.45 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 6 3 3 2 8 3 0 0 8 0 1 2 5
Contact
Redcentric Solutions Limited
Steph Heseltine
Telephone: +441423850000
Email: tenders@redcentricplc.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
-
Availability of the Unity IP Voice service is dependent on the availability and correct operation of the customer’s network and related equipment.
In cases where the customer's system experiences a power or connectivity outage, the Unity system may be unable to make emergency calls during the service disruption.
No call quality assurances can be made by Redcentric when the Unity IP Voice Service is delivered across a non-Redcentric network.
The maximum number of simultaneous calls that can be made is dependent on the symmetric bandwidth available on the customer’s Internet connection.
Fax is only supported on a best effort basis. - System requirements
-
- A Unity voice compatible network
- Appropriately sized data access
- Domain Name Services (DNS)
- DHCP Enabled LAN
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to acknowledge all Advice and Guidance requested within 15 minutes. Response times will depend on the request type and level of detail required. We typically aim to provide an initial response within 1 hour of the request being made however this can vary dependent on the nature of the request.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Redcentric’s customer service operation is available 24/7/365 and can be contacted by telephone, email or via the customer portal.
Support is included at no additional cost with Redcentric's services. Redcentric has one direct point of contact for customer support, which deals with all aspects of the service. The Redcentric customer services team takes full responsibility for supporting and logging problems and technical support queries. Their specific role is to ensure that all telephone, email and portal queries are answered and resolved as promptly as possible.
Redcentric has a team of Technical Account Managers and Cloud Support Engineers available. These teams are not included as a standard service and are charged based on the published SFIA rate card. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- As a component of the service delivery project, Redcentric offers new customers remote training as an integral part of the service onboarding process. Alongside this remote training, customers receive comprehensive end-user and administrator guides, along with access to FAQs and instructional videos on various tasks. In deployments where the customer is implementing physical devices, a redcentric resource would typically provide floor walking as part of the go live phase of the delivery.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Where customers wish to retain their telephone numbers, the standard porting process will be followed to ensure customers retain telephone numbers. Number porting is a regulated process that is driven by the gaining provider. Company Service Data – Any associated customer service data that is required by the customer post contract can be extracted by way of standard reporting processes. Service data not required will be removed from the service platform(s) at the end of the contract as part of the standard decommissioning process.
- End-of-contract process
-
Pon expiration or termination of the Unity IP voice contract, the following steps are followed as part of the decommissioning process:
Phase 1 - Contractual
Expiration of the service contract or the Customer decides not to renew. This may also include early termination by the Customer, subject to payment of early termination fees.
Phase 2 - Service Decommission
Cessation of the Unity IP voice Service and any associated optional features, plus the removal of user accounts from the core platform(s).
Phase 3 – Data Removal
Access to historical data and configuration will be made available to Customers for a period of 30 days post contract cessation. Customer data can be extracted via the self-service administration portal.
Redcentric’s standard service decommissioning process, ensures that all customer-related service data, such as call recordings, call reporting data, and user information, is securely removed and deleted from the service platform.
Customers that wish to retain their telephone numbers, we offer assistance with the number porting process. It's important to note that administrative charges will apply.
Customers requesting copies of their historical call recordings will incur Redcentric professional service charges for the extraction and provision of recording information.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile app and desktop applications offer similar features for online meetings but differ in interface and functionality. The mobile app is optimised for smaller screens and offers on-the-go accessibility, while the desktop version provides a more comprehensive interface and advanced features such as integrated scheduling and file sharing. Additionally, the desktop application may offer better performance on computers. The choice between them depends on user preference for device, mobility, and required features.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The Unity IP Voice service management interface is a secure portal that enables customers to make real-time changes to their service configuration, including moves, additions, and changes. Access to the portal is regulated by role-based access controls (RBAC).
- Accessibility standards
- None or don’t know
- Description of accessibility
- The soft client application is designed with accessibility in mind, offering a suite of features and functionalities tailored to users with diverse needs, including those with disabilities. These include provisions for screen readers, keyboard navigation, closed captioning, and other accessibility enhancements. Moreover, the application is committed to adhering to accessibility standards and guidelines, ensuring usability for a wide range of users, regardless of their abilities or limitations.
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
Provisioning APIs: Enable automated user, device, service, and feature management.
Call Control APIs: Provide call handling and routing control, allowing for custom call management applications.
Presence and Messaging APIs: Facilitate integration with presence and messaging services, enabling access to user status and messaging capabilities.
Webhooks: Deliver real-time event notifications from BroadWorks, enabling external system actions based on events like incoming calls or presence changes.
These APIs empower developers to create custom solutions that merge Cisco Webex collaboration features, enhancing communication and collaboration for users. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The base service can be extended with additional or enhanced service overlays to support extra functionality. This allows customers to tailor elements such as In Queue, Voicemail, and welcome messages to suit their organisational needs. Moreover, alongside basic messaging and call routing customisation, customers can integrate the core service with third-party applications using partner overlay services.
Users, based on their role, have access to a self-service portal to manage organisational changes and relocations. This feature streamlines administrative tasks, enhancing efficiency and empowering users within the system.
Scaling
- Independence of resources
- The service platform is architecture and engineered to maintain 99.99% availability. Every component of the service is constructed to be highly available and resilient across multiple geographic locations. This proactive approach to managing service availability ensures that even during peak times or high utilisation by individual customers, the experience of other customers remains unaffected. This robust infrastructure prioritises stability and reliability, guarding against disruptions and ensuring a seamless user experience for all Redcentric customers, regardless of the fluctuations in demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The Unity IP Voice service offers comprehensive call statistics, which can be leveraged to make informed business decisions. These reports include but are not limited to:
Inbound/Outbound calling reports, calculated cost reports, destination report, abandoned call report, ring time to answer report. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
- ISO27001 certified
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Users can export call usage data through the standard reporting tools. Data can be extracted on demand or via a scheduled reporting process.
Users can export call recording data via standard call recording service interface*
Note: Only users with the appropriate administration privileges can download call recordings. - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Service Level
Not less than 99.99% - Approach to resilience
- Available on request
- Outage reporting
-
A public dashboard
Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access to management interfaces and support channels is based on business need. Implementation is by least privilege RBAC; unique credentials assigned, and all access (successful or failed) is logged using anti-tamper mechanisms, made available for audit and retained for 12 months. Alerts are generated for multiple attempts for investigation by global sysadmins.
Additional authentication mechanisms are used for support channels to assure customers only authorised personnel respond.
Regular access reviews by service and platform owners are conducted with support from the Joiners, Leavers, Movers process, which ensures access is revoked or amended in a timely manner. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 30/08/2023
- What the ISO/IEC 27001 doesn’t cover
- Nothing i.e. all services and locations offered under GCloud 14 ARE covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Gemserv Ltd
- PCI DSS accreditation date
- 05/09/2023
- What the PCI DSS doesn’t cover
-
Physical hosting and managed firewall services are covered. All other services are excluded.
Requirements 3, 4, 10, A1 and A2 are excluded. - Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Certificates for physical security of all premises including Data Centres:-
- Issued by an external assessor against the following standards:-
- Centre for Protection of National Infrastructure (CPNI):-
- Using the Classified Material Assessment Tool (CMAT):-
- Supports the storage and processing of HM Government data to:-
- Classification ‘OFFICIAL’ including ‘OFFICIAL-SENSITIVE’ special handling.
- NHS England Data Security and Protection Toolkit; assessment ‘exceeding standards’.
- Main Data Centres are certified as Police Assured Secure Facilities.
- HSCN CN-SP Network provider.
- PSN Connectivity Service; certified to connect organisations to the PSN.
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Redcentric’s InfoSec scope includes ISO27001 certification, and other critical aspects including physical security, employees and third parties. Our approach is to understand the risk from threat actors and implement the controls and mitigations to assure the Confidentiality, Integrity and Availability of data.
Security is driven from the top with the CTO as SIRO (Senior Information Risk Owner), being accountable for several key policy documents, and the signatory for Security and Compliance attestation statements. Ops Board members regularly review key and corporate risks.
Security roles are assigned, with the Head of Compliance owning InfoSec and Operational Security Manager responsible for day to day matters. Regular security forum meetings are held, in addition to senior management review meetings.
Policy compliance is monitored by regular internal security audits, and six monthly surveillance audits by BSI. Annual security training is mandatory for all employees with attendance records maintained for audit purposes.
The following policies and procedures are operable:
IS Policy
Data Protection Policy
Security Incident Management Process.
Acceptable Use Policy
Access Control Policy
Data Classification and Handling Policy
Joiners, Movers, Leavers Process
Third Party System Access Procedure
Visitor Access Procedure
Change Management Procedure
Clear Desk & Screen Policy
Secure Disposal Policy
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Redcentric operates an ISO20000-1 compliant Change Management Process. Objective is to minimise risk to services whose CIs are impacted.
Achieved by:-
Using standardised methods ensuring efficient handling of all changes using the Change Management Toolset.
Changes are recorded, classified, assessed, approved, prioritised, planned, tested, implemented and documented.
Changes are recorded against the relevant CMDB Configuration Item.
Inputs:-
Completed change records with Impact Assessment
Risk (Security) Assessment
Outputs:-
Accurately recorded change records including all stages of the change lifecycle
Changes by outcome
Forward Schedule of Change
The Change Advisory Board is the final approval stage in the Change Management process. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We operate a Vulnerability Management and Patch Management policy and process based on NCSC guidance. Good industry practice is adopted to ensure deployed services are protected at the edge by stateful next-generation firewalls with UTP/IDS/IPS enabled. Assets threats assessed by technical owners against the Design. Resultant risks are impacted, with critical ones contained immediately and patches applied within 48 hours where available. Automated patch management is supported by Kaseya, with end points managed by Microsoft Intune.
We subscribe to the NCSC CISP scheme for vulnerability notification and receive advance notifications from vendors, often before hitting the public domain. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Redcentric has implemented NCSC GPG-13 guidelines for Protective Monitoring (PM). We utilise a range of PM services including vulnerability management and auditing services such as SIEM. The 24*7*365 SIEM service ingests various logs combined with proactive threat analysis to assess potential impact to services. Response is provided by auto-generation of Service Management tickets on resolver groups for immediate triage and remediation. Incident response is often before threats are realised, due to externally provisioned threat analysis notifications. The combination of threat analysis, machine learning, trend analysis, IP blacklist services and Security Operations Centre SMEs provide robust and effective protection of services.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Redcentric operates a Security Incident Management policy, which outlines pre-defined processes for how suspected and actual security breaches (including data) must be managed. The policy covers all incidents which affect availability, confidentiality and integrity of data and technology. Common events such as phishing or viruses are included.
Users must report incidents to the ISO mailbox or Assurance team, who will create a Security Incident Record and initiate an investigation. Assurance will manage the incident to closure and decide whether external authorities are notified.
Incident reports are created and reported to the InfoSec Management Group and are available for audit.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Redcentric stands committed in the fight against climate change and dedicated to supporting the UK Government goal of achieving Net Zero emissions by 2050. This commitment is reflected in a meticulously crafted Environmental, Social, and Governance (ESG) strategy, aligned with the United Nations sustainable development goals, and upheld by ISO 14001:2015 certification for three consecutive years, showcasing the company's dedication to environmental stewardship.
As a prominent entity listed on the AIM, Redcentric prioritise transparency and accountability, diligently adhering to regulations. Mandatory publication of carbon emissions in annual reports underscores the unwavering commitment to environmental responsibility and corporate transparency.
Redcentric's dedication to sustainability extends beyond compliance, it’s ingrained in every aspect of operations. Notably, investments totalling £5million in the data centre estate focus on enhancing efficiency, evidenced by Power Usage Effectiveness (PU) reduction from 2 to an impressive 1.6.
The company ensures 100% of power requirements are from sustainable sources, alongside proactive measures like converting backup diesel generators to environmentally friendly alternatives and replacing diesel vans with electric counterparts.
Participation in Manage your UK Emissions Trading Scheme Reporting Service (METS) through GOV.UK and holding a greenhouse gas emissions permit underscore Redcentric's commitment to reducing its carbon footprint. Additionally, the provision of customer monthly reports detailing energy consumption metrics and procurement of all electricity from 100% carbon-neutral sources exemplify the company's dedication to transparency and sustainable practices.
The Redcentric board acknowledges the evolving landscape of ESG considerations, driving greater accountability and transparency across operations. Regular updates to the website keep stakeholders informed about key corporate policies and sustainability initiatives.
Redcentric's commitment to sustainability isn’t just a declaration but a deeply ingrained aspect of corporate ethos. From stringent adherence to regulatory requirements, to proactive investments in renewable energy, comprehensive reporting mechanisms, every action underscores our unwavering dedication to environmental responsibility and corporate transparency.Tackling economic inequality
Redcentric actively addresses economic inequality through diverse initiatives aimed at empowering communities and fostering long-term sustainability:
Community Engagement Programs & Digitally Driven Fundraising Campaigns:
Utilises technology and resources to support local charities, raising over £50,000 for the Children’s Heart Surgery Fund through outreach campaigns.
The Breck Foundation: Provides online safety training for pupils, parents, and teachers, promoting safety in the online world.
Employment and Training Opportunities: Prioritise job creation and training programs for local residents, offering apprenticeships to rugby league players, wheelchair rugby players, and young athletes, fostering economic development and empowerment.
Charitable Partnerships & Business Fundraising Programme:
Raises funds for charities through sponsored events, like a Yorkshire 3 Peaks walk, involving over 30 employees and raising more than £12,000.
Business Fundraising Enablement Programme: Supports charities in engaging target businesses for funding through calling data and tailored emails.
Digital Transformation Programme: Facilitates digital transformation within charities, enhancing patient and family support.
Transparency and Accountability: Committed to transparency by providing regular reports on the social impact of projects, ensuring stakeholders understand the positive outcomes generated through collaboration.
Upskilling Workforce and Supporting Lower Paid Workers: Offers apprenticeship programs with planned career pathways into senior positions, promoting skill development and progression.
Promotes training and development for all colleagues through a learning management system, investing in role-specific certifications and development programs.
Implements a hybrid working model to support lower-paid workers with reduced travel costs and offers above the apprentice minimum wage, recognising the value apprenticeships bring to the company.
Through these initiatives, we are dedicated to addressing economic inequality and creating a more equitable society. Redcentric believe that by providing individuals with access to opportunities for growth and advancement, we can contribute to reducing economic disparities and promoting social mobility.Equal opportunity
Redcentric actively fosters an environment where individuals are valued and treated fairly, irrespective of their background, and opposes any form of discrimination prohibited by law.
A key indicator of this commitment is evident in Redcentric's gender pay report, where efforts to address disparities in earnings between men and women are transparently acknowledged. By identifying imbalances in the workforce and actively working to rectify them, Redcentric demonstrates a proactive approach to promoting gender equality within the organisation.
Redcentric's Diversity and Inclusion Forum serves as a platform for ongoing dialogue and action. By establishing working groups focused on specific aspects of diversity, such as gender equality and remote working, employees are empowered to drive positive change and contribute to a more inclusive workplace culture. The planned LGBTQ+ working group further exemplifies Redcentric's commitment to embracing diversity in all its forms.
In terms of recruitment and talent development, Redcentric implements diverse hiring practices and apprenticeship schemes aimed at supporting individuals from various backgrounds. By partnering with outreach organisations and providing apprentices with clear career pathways, Redcentric ensures that opportunities for growth and advancement are accessible to all employees, regardless of their starting point.
Redcentric's inclusive leadership and flexible work policies underscores its dedication to accommodating diverse needs and promoting work-life balance. By offering leadership training that prioritises inclusion and implementing policies such as flexible working hours and enhanced maternity packages, Redcentric creates an environment where employees can thrive professionally while maintaining personal well-being.
In conclusion, Redcentric's comprehensive approach to equal opportunity extends beyond mere policies to encompass tangible actions aimed at fostering diversity, inclusion, and professional development for all employees. By prioritising these values, Redcentric not only enriches its workforce but also sets a standard for ethical and equitable business practices in the industry.Wellbeing
At Redcentric, prioritising the well-being of our colleagues is paramount, and we've implemented various initiatives to support their mental and physical health. Our commitment to enhancing health and well-being extends to our contract workforce as well. Here's how we're making a difference:
Hybrid Working Model: Providing flexibility to achieve a better work-life balance for our colleagues, fostering a supportive environment and preventing isolation through social networking within the company, including organized social and corporate events. Over 40% of Redcentric’s employees either work from home or on a hybrid model.
MetLife Well-being Hub: Accessible to all employees, offering a comprehensive range of well-being support services, such as confidential 24/7 telephone support, structured counselling sessions, cognitive-behavioural therapy, legal advice, financial management guidance, and health risk assessments.
Well-being Channel: A valuable resource offering mental and physical health support, including webinars and mental health resources for adults and children.
Corporate Social Responsibility Events: Organizing events throughout the year to promote well-being across the organization, utilizing a structured well-being calendar highlighting key awareness weeks like men’s health week and stress awareness week. Additionally, training over 20 mental health first aiders across the business to provide continuous support and engagement.
Leadership Commitment: Our Board sets an example by promoting a healthy corporate culture and embedding ethical values in our business operations. Through these initiatives, we aim to foster a culture where the well-being of our colleagues is prioritised, ensuring a resilient and empowered workforce poised for success.
Pricing
- Price
- £2.60 to £66.45 a user a month
- Discount for educational organisations
- No
- Free trial available
- No