27.12.2012 Views

1 PSN Services Service Descriptions - Government Procurement ...

1 PSN Services Service Descriptions - Government Procurement ...

1 PSN Services Service Descriptions - Government Procurement ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PSN</strong> <strong><strong>Service</strong>s</strong> <strong>Service</strong> <strong>Descriptions</strong><br />

1<br />

Lot 1 – Communication <strong><strong>Service</strong>s</strong><br />

Provision of Communications <strong><strong>Service</strong>s</strong>: supply, installation, maintenance, technical architecture and<br />

system design, project management, and support for equipment, commodity and managed service. The<br />

Lot scope includes: all traditional and IP based voice services; voice call packages; voice minutes; DDI,<br />

premium rate numbers; non-geographic numbers; 118 enquiries; call preference services, audio<br />

conferencing, desktop video conferencing and collaboration tools; web conferencing; Internet services;<br />

email and website services; co-location and hosting; on-line storage; security services; antivirus; email<br />

scanning and filtering; firewalls; intrusion and spyware detection; authentication and access<br />

management; web and application sign on services; web conferencing; messaging services; real time<br />

information services; desktop messaging; messaging via email, SMS, pager and mobile or fixed line<br />

telephone; provision of all elements of a complete solution.<br />

• Note that connectivity does not fall within the scope of this Lot.


<strong>PSN</strong> <strong><strong>Service</strong>s</strong> <strong>Service</strong> <strong>Descriptions</strong> .......................................................................................................... 1<br />

Lot 1 – Communication <strong><strong>Service</strong>s</strong> ........................................................................................................ 1<br />

Supplier Responses ............................................................................................................................. 3<br />

2<br />

Azzurri Communications Ltd .......................................................................................................... 3<br />

British Telecommunications PLC .................................................................................................. 11<br />

Cable&Wireless Worldwide ........................................................................................................ 209<br />

Cassidian UK ............................................................................................................................... 390<br />

Daisy Communications Ltd ......................................................................................................... 533<br />

Freedom Communications (UK) Ltd ........................................................................................... 608<br />

Fujitsu ......................................................................................................................................... 616<br />

Global Crossing ........................................................................................................................... 639<br />

KCOM Group Plc ......................................................................................................................... 721<br />

Logicalis UK Ltd ........................................................................................................................... 739<br />

NextiraOne UK Limited ............................................................................................................... 940<br />

Siemens Communications .......................................................................................................... 949<br />

Thales UK Ltd ............................................................................................................................ 1009<br />

Vodafone Limited ..................................................................................................................... 1021


Azzurri Communications Ltd<br />

3<br />

Supplier Responses<br />

Azzurri supply, install, maintain and support communications services that assist organisations to<br />

meet government objectives and drive increased efficiency, reliability, information security, agility,<br />

sustainability and deliver better service to citizens.<br />

Azzurri will provide advice on technical architecture and system design and will manage technology<br />

consolidation and integration of multiple services and suppliers into a single, holistic solution. We are<br />

accredited with key carriers, vendors and service providers.<br />

We are a communications service integrator and will blend technologies from different vendors, to<br />

create a communications environment that integrates different products and services which enable<br />

reuse of existing assets where possible, on either a commodity or managed service basis.<br />

Utilising our own project management methodologies, Azzurri has delivered communications<br />

services to Local and Central <strong>Government</strong>, NHS, Social Housing, Education and Charity sectors. Our<br />

experience and expertise includes communications audit and consultancy, comparison, planning, design,<br />

implementation, support, cost management and evolution and innovation.<br />

Our experienced network architects will assist with planning and specification, and we have PRINCE2<br />

and ITIL accredited project and support teams who will engage in the migration, implementation and<br />

support of our communications services.<br />

Azzurri has a virtual Network Operations Centre (NOC) that provides second and third line support<br />

for incidents reported through our contact centres. The NOC operates 24x7x365. The NOC utilises a<br />

monitoring package to capture events from the Customers’ deployed <strong><strong>Service</strong>s</strong> and to respond to alerts.<br />

Following the appearance of an alarm on the monitoring platform, the alerts are logged in our <strong>Service</strong><br />

Management System and contact is made with the Customer where additional information is gathered<br />

and an action plan is agreed and put in place.<br />

Azzurri’s <strong>Service</strong> description for Lot 1 Communications <strong><strong>Service</strong>s</strong> is as follows:<br />

1. Traditional and IP based voice services;<br />

▪ The <strong>Service</strong> offers three IP telephony options based on different deployment models:<br />

i. On-site IP telephony – traditional on-site systems that will be owned by the<br />

Customer, where the management is provided by the Customer or Azzurri.<br />

ii. Hosted IP telephony – dedicated systems that are hosted and managed by Azzurri<br />

on behalf of the Customer.<br />

iii. IP Centrex – multi-tenant systems hosted by Azzurri and rented to the Customer<br />

on a per handset/feature basis.<br />

▪ The <strong>Service</strong> incorporates;


4<br />

i. Provision of traditional PSTN call delivery services and provides the capability to<br />

connect to a <strong>PSN</strong> compliant SIP based service from providers such as BT Openreach,<br />

BT Wholesale, Cable and Wireless and Gamma.<br />

ii. Provision of professional services to enable IP Telephony design, migration<br />

strategy and advice, and overall management of solution deployment.<br />

iii. Design and delivery of Unified Communications services such as instant<br />

messaging, user presence and desktop integration services.<br />

iv. Provision of traditional voicemail services and voicemail integration into user<br />

desktop environments in the form of Unified Messaging.<br />

v. Desktop Messaging Solutions.<br />

vi. Provision, advice, design and integration of CTI services and components such as<br />

third party software products that require telephony functionality.<br />

vii. Design and provision of remote working solutions to enable location independent<br />

working incorporating fixed voice services, mobile voice and data communications.<br />

viii. Design and provision of Fixed Mobile Substitution and Fixed Mobile Convergence<br />

solutions including standard carrier services such as Mobex which provides closed<br />

user group connectivity and Mobile Extension Zone (MEZ from O2) which provides<br />

reduced rate on-net call charge profiles.<br />

▪ The <strong>Service</strong> incorporates a support package for voice, data and mobile communications<br />

that provides;<br />

i. Standard support services: network availability and incident management<br />

services for hardware, software, mobility and connectivity with pre-agreed SLA<br />

response.<br />

ii. Software maintenance: full patching of software applications, for bugs; minor<br />

release and major upgrade licensing rights.<br />

iii. Managed <strong><strong>Service</strong>s</strong>: whereby Azzurri take on the day to day management of the<br />

Customer infrastructure to predefined boundaries. This service is tailored to<br />

individual Customer needs and can include transfer of staff undertakings (TUPE).<br />

iv. Remote management: whereby Azzurri provides proactive fault monitoring and<br />

detection, usage and activity based monitoring and reporting and security services<br />

such as intrusion detection.<br />

v. Access to Azzurri Innovations who are a specialist division of Azzurri that provide<br />

product technology consultancy, and bespoke software development within<br />

communication environments to integrate multiple communication architectures<br />

and platforms.<br />

2. Voice call packages;<br />

▪ Azzurri will provide the Customer with an audit and consultancy service that is available<br />

across data, voice and mobile estates which will provide;


5<br />

i. Azzurri Insight consultancy and discovery suite - commercial consultancy and<br />

audit <strong><strong>Service</strong>s</strong> to identify opportunities to reduce and recover costs, optimise<br />

delivery and improve management processes. This includes contract reviews,<br />

technology assessments, bespoke profiling, benchmarking and comparison against<br />

industry standards.<br />

ii. On completion of the commercial consultancy and audit exercise, Azzurri will<br />

offer Customers ongoing expense management services including a Telecoms<br />

Expense Management (TEM) service to ensure that ongoing provision,<br />

management, and reporting of the Customers’ communication estate is efficient<br />

and controlled. This service is chargeable and includes an online cost management<br />

tool to enable the Customer to create bespoke cost centre or business structured<br />

cost and asset management reports.<br />

▪ Upon completion of the audit and consultancy service, Azzurri can offer the Customer a<br />

range of voice call packages to complement their particular calling profile and call volumes<br />

from providers such as BT Openreach, BT Wholesale, Cable and Wireless and Gamma which<br />

are billed to the Customer directly by Azzurri.<br />

3. Call preference services;<br />

▪ Azzurri can provide a range of call preference solutions to enable Customers to operate a<br />

service that delivers calls according to their preference.<br />

▪ Azzurri can recommend to the Customer an appropriate call preference service for their<br />

particular calling profile identified during a commercial audit. It may then be possible to<br />

programme this preference as the default for the Customer as part of a communications<br />

solution deployment.<br />

4. Voice minutes;<br />

▪ Azzurri’s Calls and Lines Outbound <strong>Service</strong> allows the Customer to make outbound voice<br />

and data calls from a fixed PSTN/ISDN line to any destination over the public telephony<br />

network.<br />

▪ Azzurri can provide both a calls only service and a calls and lines service either as new<br />

orders or by migrating a Customer’s existing services from their current provider to Azzurri.<br />

▪ Azzurri deliver the Customer’s outbound calls over a public network selected by Azzurri<br />

through Carrier Pre-Select (CPS) or Indirect Access (IDA) via carriers such as Cable and<br />

Wireless and Gamma.<br />

▪ Outbound calls can be provided in conjunction with PSTN/ISDN Lines or via a <strong>PSN</strong><br />

accredited SIP service provider.<br />

▪ In addition to the calls and lines inbound and outbound services that Azzurri provide, we<br />

also offer a number of enhanced services:<br />

i. Online call reporting.<br />

ii. Online Inventory.


6<br />

iii. Cost centre management.<br />

iv. Management reporting.<br />

v. Audit and cost reduction.<br />

5. DDI, premium rate numbers;<br />

▪ Azzurri will provide a range of DDi numbers and premium rate numbers. These numbers<br />

can be delivered via traditional ISDN based PSTN services or via a <strong>PSN</strong> accredited SIP service<br />

provider via providers such as BT Openreach, BT Wholesale, Cable and Wireless and<br />

Gamma.<br />

6. Non-geographic numbers;<br />

▪ Azzurri will provide an Inbound telephony service to the Customer upon request. This is a<br />

telephony service that provides the Customer with online access to a range of call routing<br />

features and management information for their inbound numbers. These services are<br />

provided by Azzurri utilising BT Openreach, BT Wholesale, Cable and Wireless and Gamma.<br />

▪ Azzurri will provide an Inbound telephone number for the Customer upon request. This<br />

may be a geographic inbound number, a non geographic 08XX or an 03XX number. When<br />

the Inbound number is dialled, the incoming call is routed according to the routing set up via<br />

the Azzurri provided web portal. The call routing is applied at network level and delivered<br />

according to the Customer’s preferences. All calls can be delivered to either a UK fixed<br />

line/mobile or a system announcement destination.<br />

▪ Azzurri’s Inbound portfolio comprises three options:<br />

i. Contact Point<br />

§ The Customer will have the ability to control setting up and changing their call<br />

routing according to opening hours/staff availability.<br />

ii. Contact Path<br />

§ The Customer will have the ability to route calls according to who the caller is, or<br />

by the caller’s location to the nearest office for example, and the ability to<br />

create such features as hunt groups.<br />

iii. Contact Pro<br />

▪ Number portability:<br />

§ Offers a suite of Inbound call handling tools, suited to a Customer which places<br />

high value on the Customer service provided to callers and those organisations<br />

looking to deal with incoming enquiries effectively without missing a call.<br />

Advanced call handling features can be tailored to the Customer’s needs and<br />

changed instantly via the web portal by them.<br />

i. Azzurri can port an existing inbound number from a Customer’s existing provider<br />

into the Azzurri network.


7. 118 enquiries;<br />

7<br />

ii. Azzurri Inbound numbers can be registered with the BT Directory Enquiries<br />

service.<br />

▪ Azzurri will recommend a range of 118 enquiry service providers to the Customer.<br />

▪ Azzurri will recommend to the Customer an appropriate 118 enquiry service for their<br />

particular calling profile identified during a commercial audit. It may then be possible to<br />

programme this recommended service provider as the default provider for the Customer as<br />

part of a communications solution deployment.<br />

8. Audio conferencing, desktop video conferencing and collaboration tools, web conferencing;<br />

Audio and Web Conferencing<br />

▪ Azzurri will provide an audio and web conferencing service from Arkadin who are a<br />

Conferencing <strong>Service</strong> provider (CSP) with global capability.<br />

▪ The service is formed of Carrier-grade conferencing bridges in multiple locations with a<br />

resilient, secure system platform and network to ensure continuous operation of services.<br />

▪ The service is available for worldwide access to enable telecoms costs to be centralised<br />

through toll-free access, shared through toll access, or dispersed through direct<br />

International access.<br />

▪ The service includes the availability of live operators for security, to place participants into<br />

their desired conferences, or for in-conference support by simply pressing *0 at any time of<br />

day 24/7/365. Accounts for new users can be created within 48 hours, or within 4 hours if<br />

urgent.<br />

▪ The service will support Managed Event calls.<br />

▪ Centralised management reporting will present usage data, costs and trends for one or<br />

many locations.<br />

Desktop Video and Collaboration<br />

▪ Azzurri will provide IP based desktop video and collaboration applications.<br />

▪ Azzurri will provide an integration service to facilitate the integration of desktop video and<br />

collaboration applications with board room/conference room video conferencing<br />

equipment and presence applications such as MS Lync and Lotus Sametime.<br />

9. Co-location and hosting<br />

▪ Azzurri will provide rack space, power and security management utilising the services of<br />

SSE Data Centres who are a UK based data centre hosting provider.


8<br />

▪ This service is formed of high capacity, high availability facilities offering modular suites,<br />

with communication and core fibre links across multiple carrier networks.<br />

▪ The suites supply a minimum of N+1 concurrently maintainable power infrastructure with<br />

uninterruptable power supply with high density cooling (2N CRAC units) backed up by both<br />

UPS battery systems and HV generator sets.<br />

▪ Security at the Data Centres includes anti-ram Vee gates, internal and external CCTV and<br />

bespoke security access systems. Early warning fire detection and active automatic fire<br />

extinguishing systems are provided. The sites are manned 24x7 by security staff, alongside<br />

in-house 24x7 on site mechanical and electrical engineering support and building<br />

management.<br />

▪ The sites utilise an Energy Efficient Infrastructure, including:<br />

i. 100 kW PV installation‚ green energy generation<br />

ii. Cold Aisle containment as standard<br />

iii. Modular fit out<br />

iv. Low drag pipe working<br />

v. Harmonic balancing of plant<br />

vi. Packing material disposal and recycling facilities<br />

10. Design, implementation, management and support of advanced data services:<br />

▪ Azzurri will provide a range of managed services, encompassing data, voice, video and<br />

converged networks. Our Managed <strong><strong>Service</strong>s</strong> contracts will be tailored to individual Customer<br />

requirements, with defined service inclusions and service boundaries. Depending on<br />

Customer specification, our Managed <strong><strong>Service</strong>s</strong> in relation to this lot cover;<br />

§ Provision and rentals associated with all PSTN connectivity/circuits.<br />

§ Customer Premises Equipment, routers, security appliances (e.g firewalls).<br />

§ Network management & Support 24 x 7 x 365.<br />

§ Provision of a Customer network management portal.<br />

§ The ability to host equipment or premise based hardware.<br />

§ Data hardware maintenance and support.<br />

§ <strong>Service</strong> Management, including;<br />

o <strong>Service</strong> reporting.<br />

o Change, order and billing management.<br />

o <strong>Service</strong> & Account Reviews.<br />

§ Implementation, including;<br />

o Project Management.<br />

o Implementation engineering.


9<br />

▪ Application management<br />

§ Azzurri can provide application level SLAs based on application performance. Azzurri’s<br />

pro-active monitoring solution provides:<br />

▪ On-line storage<br />

o Application analysis – whereby critical and core applications are mapped<br />

across the end to end path.<br />

o Application profiling – where appropriate metrics and thresholds are<br />

attributed to each core application.<br />

o Application test deployment – where we simulate core application<br />

monitoring deployed across participating paths in the network.<br />

o Application Visibility – where all monitors are compiled at a top level to<br />

provide clear information about performance per location.<br />

§ Azzurri will provide On-Line storage solutions that can be both on-net within the<br />

datacentre and off-net to an external dedicated supplier (SSE telecom). In addition<br />

Azzurri can provide cloud based archiving and offline backup solutions for servers<br />

and workstations..<br />

▪ Security solutions<br />

§ E-mail, scanning and filtering<br />

o Azzurri will provide e-mail, scanning and filtering appliances, software,<br />

virtual appliances and <strong><strong>Service</strong>s</strong> to deliver a range of anti-spam and email<br />

security solutions that address the email protection needs from single<br />

individual to enterprise wide deployments.<br />

§ Data leakage protection.<br />

o Azzurri will provide data leakage protection that Identifies and routes emails<br />

containing sensitive information, offering both inbound compliance and<br />

outbound data leakage protection. For example, Azzurri can block receipt of<br />

EXE or MP3 files, or re-route outbound email and attachments containing<br />

Personal Health Information (PHI) terms to an approval box or trusted<br />

partner. These tools comply with regulations such as HIPAA, GLBA, PCI and<br />

SOX.<br />

§ Firewall Deployment<br />

o Azzurri will provide context based firewalls manufactured by either Cisco or<br />

a range of Next Generation firewall technologies from SonicWall, Palo Alto<br />

or Checkpoint<br />

§ Authentication and Access Management<br />

o Azzurri will provide both SSL and IPSec based VPN based Authentication and<br />

access. This is based on user profiles policy can be enforced dependent on


10<br />

§ Antivirus;<br />

▪ Internet services;<br />

individual users, the multiple devices that they use and the different<br />

locations where they may be deployed. Secure Remote Access products can<br />

be deployed on PCs, laptops, tablets, PDAs and smartphones to restrict<br />

access to sensitive information and prevent data leakage from those<br />

devices.<br />

o Azzurri will provide in conjunction with our firewall technology, Enforced<br />

Client Anti-Virus and Anti-Spyware, with a choice of McAfee® or Kaspersky®<br />

technology. This is designed to ensure that all endpoints have the latest<br />

versions of anti-virus and anti-spyware software installed and active,<br />

automatically delivering updated security definitions to the endpoint as<br />

soon as they become available. Additional protection for Windows®-based<br />

file, print, and Exchange servers is also available<br />

§ Azzurri will provide direct Internet Access services with fully diverse options for Active<br />

– Active, Active – Passive deployments. Internet access can be provisioned in 10Mb<br />

blocks up to and beyond 1Gb. Optionally Azzurri can provide a DDOS monitoring and<br />

scrubbing service ensuring that DDOS attacks on specific sites are mitigated.<br />

Internet services can be routed through individually provisioned firewalls or shared<br />

context based firewalls dependent on end user demands.<br />

11. Messaging via email, SMS, pager and mobile or fixed line telephone; desktop messaging;<br />

▪ Azzurri will provide IP enabled communications solutions that are capable of providing<br />

Unified Messaging. These Unified Messaging systems can integrate with platforms such as<br />

MS Outlook and Lotus Notes enabling users to receive messages via Email, SMS, pager,<br />

mobile, or fixed line telephone calls. Messages are deposited into a single message store<br />

that is accessible from a user’s desktop, tablet, Smartphone, or Web browser. Messages can<br />

be distributed to other recipients and can include written or verbal annotation. Messages<br />

can also be played back using text to speech enabling remote workers to be able to hear<br />

text based messages. Auto attendant, whereby a caller inputs either DTMF telephone digits<br />

or natural speech to gain access to services, fax, and speech driven applications are<br />

available.<br />

12. In addition to the above individual services, Azzurri will combine, as defined by the Customer,<br />

elements of the above individual services as a complete solution.


British Telecommunications PLC<br />

Required <strong><strong>Service</strong>s</strong> under Lot 1:-<br />

11<br />

REQUIRED SERVICES CONTRACTOR<br />

CAPABILITY<br />

Supply YES<br />

Installation YES<br />

Maintenance YES<br />

Provision of Communications <strong><strong>Service</strong>s</strong>: YES<br />

Technical architecture and system design, YES<br />

Project management YES<br />

Support for equipment, YES<br />

Commodity and managed service. YES<br />

Traditional and IP based voice services; YES<br />

Voice call packages; YES<br />

Voice minutes; YES<br />

DDI, premium rate numbers; YES


12<br />

tools;<br />

Non-geographic numbers; YES<br />

118 enquiries; YES<br />

Call preference services, YES<br />

Audio conferencing, YES<br />

Desktop video conferencing and collaboration<br />

YES<br />

Web conferencing; YES<br />

Internet services; YES<br />

email and website services; YES<br />

Co-location and hosting; YES<br />

On-line storage; YES<br />

Security services; YES<br />

Antivirus; YES<br />

email scanning and filtering; YES<br />

Firewalls; YES<br />

Intrusion and spyware detection; YES


13<br />

Authentication and access management; YES<br />

Web and application sign on services; YES<br />

Web conferencing; YES<br />

Messaging services; YES<br />

Real time information services; YES<br />

Desktop messaging; YES<br />

Messaging via email, YES<br />

SMS, pager and mobile or fixed line telephone; YES<br />

Web conferencing; YES<br />

The Contractor has presented the <strong>Service</strong> <strong>Descriptions</strong> under the following headings:<br />

o Functional Description - Describes the Contractor’s functional capabilities. This section<br />

addresses each of the following service lines individually:<br />

a) Calls And Lines – Voice Access<br />

b) Calls And Lines - Voice Call Packages<br />

c) Calls And Lines – Voice Minutes<br />

d) Calls And Lines - Premium Rate Numbers & Non-Geographic DDI Numbers


14<br />

e) Calls And Lines - Call Preference <strong><strong>Service</strong>s</strong><br />

f) Calls And Lines – Smart Numbers<br />

g) Call Handling – Traditional Voice <strong><strong>Service</strong>s</strong><br />

h) Call Handling – Hosted IPT <strong><strong>Service</strong>s</strong><br />

i) Value Added <strong><strong>Service</strong>s</strong> - 118 Directory Enquiries<br />

j) Value Added <strong><strong>Service</strong>s</strong> - Audio Conferencing<br />

k) Value Added <strong><strong>Service</strong>s</strong> - Desktop Video Conferencing And Collaboration Tools<br />

l) Value Added <strong><strong>Service</strong>s</strong> - Web Conferencing<br />

m) Value Added <strong><strong>Service</strong>s</strong> – Managed Streaming<br />

n) Other Communication <strong><strong>Service</strong>s</strong> - Internet <strong>Service</strong><br />

o) Other Communication <strong><strong>Service</strong>s</strong> - Co-Location And Hosting <strong><strong>Service</strong>s</strong><br />

p) Other Communication <strong><strong>Service</strong>s</strong> - On-Line Storage <strong><strong>Service</strong>s</strong><br />

q) Other Communication <strong><strong>Service</strong>s</strong> - Antivirus <strong><strong>Service</strong>s</strong><br />

r) Other Communication <strong><strong>Service</strong>s</strong> - Email Scanning And Filtering <strong><strong>Service</strong>s</strong><br />

s) Other Communication <strong><strong>Service</strong>s</strong> - Firewalls, Intrusion And Spyware Detection <strong><strong>Service</strong>s</strong><br />

t) Other Communication <strong><strong>Service</strong>s</strong> - Authentication And Access Management <strong><strong>Service</strong>s</strong>


15<br />

u) Other Communication <strong><strong>Service</strong>s</strong> - Web And Application Sign On <strong><strong>Service</strong>s</strong><br />

v) Other Communication <strong><strong>Service</strong>s</strong> - Mail And Messaging <strong><strong>Service</strong>s</strong><br />

w) Other Communication <strong><strong>Service</strong>s</strong> - Real Time Information <strong><strong>Service</strong>s</strong><br />

x) Other Communication <strong><strong>Service</strong>s</strong> - Desktop Messaging<br />

y) Other Communication <strong><strong>Service</strong>s</strong> - Messaging Via Email, SMS, Pager And Mobile Or Fixed<br />

Line Telephone<br />

z) Other Communication <strong><strong>Service</strong>s</strong> - Secure File Transfer<br />

aa) Other Communication <strong><strong>Service</strong>s</strong> - Unified Communications<br />

bb) Sustainability <strong><strong>Service</strong>s</strong><br />

Relating to the provision of all elements:<br />

o Commercial Description - Describes the range of Contracting options under which the<br />

Contractor’s capabilities are offered.<br />

o <strong>Service</strong> Management Description - Describes the Contractor’s service management<br />

capabilities.<br />

o Business Continuity – Describes the Contractors approach to Hosted <strong><strong>Service</strong>s</strong> and <strong>Service</strong><br />

Management


16<br />

o Partners and Suppliers - Describes the range of partners and suppliers that the Contractor<br />

works with.<br />

Functional Description - Voice<br />

A) Calls & Lines - <strong>Service</strong> Description for Voice Access<br />

The Contractor provides two types of direct connectivity to and from its voice services<br />

o Traditional PSTN (Public Switched Telephone Network) access<br />

o Including analogue PSTN,<br />

o Copper based access for basic rate ISDN2 and primary rate ISDN 30 (Integrated<br />

<strong><strong>Service</strong>s</strong> Digital Network)<br />

o Fibre based access, primary rate ISDN30<br />

o SIP (Session Initiated Protocol) Trunking<br />

o SIP trunk service is an *access agnostic **public telephony trunking service.<br />

*Access agnostic, customers can use a suitable QoS (Quality of <strong>Service</strong>) enabled Wide area<br />

Network (WAN) to connect to the service.


17<br />

**Public Telephony Trunking can be used instead of PSTN telephone trunk line service (such<br />

as ISDN30) but does not connect any end-users directly. End-user functionality is provided either<br />

by the IP-PBX that consumes the trunking service or by a hosted/network platform.<br />

The following functionality is supported:<br />

Number Porting – carry existing (geographic) phone numbers across from or port to<br />

other services providers.<br />

PSTN break-in –receive calls from the national, mobile and international networks.<br />

PSTN break-out – calls can be made to destinations normally reachable over the PSTN<br />

Transport and presentation of Calling Line Identity (CLI) of the originating number onto<br />

the terminating Customer Premises Equipment (CPE) e.g. PABX, CLI Phone or IP PBX.<br />

Support for Presentation Number screening. Uses CLI to control delivery<br />

Trunk level Call Admission Control – specifies the maximum number of simultaneous<br />

calls a particular trunk or site can handle.<br />

Trunk Group level Call Admission Control – controls maximum number of simultaneous<br />

calls presented to terminating CPE.<br />

Round Robin Trunk call distribution – Allows even load sharing for telephony traffic<br />

across multiple sites.<br />

Priority Based Trunk call distribution – Allows contractor/customer to define call<br />

routing over designated trunk.


18<br />

Access to Dynamic capacity – Allows contractor/customer to increase or decrease trunk<br />

capacity according to demand or timed event.<br />

Trunk level Call Barring features – Controls inbound and outbound call access.<br />

Call Diversion features – Call destination controlled by pre-determined access control<br />

list or customer configurable, using CPE, time of day or network access<br />

programming/dial plans<br />

Smartnumber service – enables alternate dial plan for all numbers in case of<br />

inaccessibility of primary answering location either on busy or no answer or<br />

predetermined time of day.<br />

Native SIP protocol support – allows removal / eliminates the need for on-site<br />

VOIP2TDM gateways as well as the need for premise based Session Border Controllers.<br />

Emergency Call Handling – All of the contractors services conform with:<br />

Condition 2 and 4 of the General Conditions of Entitlement, (which replaced the<br />

licence),<br />

The Universal <strong>Service</strong> Directive (USD) 2001<br />

B) Calls & Lines - <strong>Service</strong> Description for Voice Call Packages<br />

The Contractor provides as standard the following call pricing packages for voice:<br />

all calls inclusive package


19<br />

local & national calls inclusive package<br />

per port inclusive package<br />

combined fixed & mobile call package<br />

capped calls<br />

annual spend percentage reward<br />

no term commitment<br />

12, 24, 36 & 60 month annual spend commitment packages<br />

free connection charge inclusive<br />

reduced line rental call packages<br />

All of the Call Packages provided by the contractor are priced as follows:<br />

Standard commodity pricing (Published prices in the public domain and in<br />

accordance with OFCOM licence and regulation)<br />

Premier Value Contract government discount scheme (*PV contract)<br />

POA (Priced on Application)<br />

o Rate dependant on term, commitment and or volume<br />

Call packages included within a Contractors managed service.


20<br />

*The Contractor has signed a Premier Value (PV) contract with the Office of <strong>Government</strong><br />

Commerce Buying Solutions later known as OGCbs and now known as <strong>Government</strong> <strong>Procurement</strong><br />

<strong>Service</strong> (GPS) with agreed discount levels based on committed and actual usage and spend. This<br />

contract has been specially negotiated between the Contractor and GPS.<br />

All public sector customers can use these tiered rates without any individual spend<br />

commitment, as long as they meet the definition of a crown body or subsidiary (LA's, Health,<br />

Education, Emergency <strong><strong>Service</strong>s</strong>, Central <strong>Government</strong> or agency/legal entity acting on behalf of<br />

Public sector customer etc).<br />

This tariff provides a simple pence per minute call price for the following call types:<br />

o Local<br />

o National<br />

o Non Geographic (e.g. 0845)<br />

o Mobile<br />

o International<br />

These rates are subject to negotiation and provided by GPS. Rates are published via a<br />

GPS portal<br />

C) Calls & Lines - <strong>Service</strong> Description for Voice Minutes


21<br />

The Contractor provides the following types of Direct Dialled (DD) calls made from fixed line<br />

voice calls originating on the Contractor UK Network and terminating on the Contractor UK<br />

Network, and or on other fixed and mobile networks in the UK & International destinations.<br />

o local call - calls made to the same exchange area as the calling number<br />

o national call –calls made outside of the same exchange as the calling number but<br />

within the UK<br />

o UK & International Mobile Operators<br />

o Other UK Fixed Line Operators<br />

o non-geographic call 03x prefix<br />

o non-geographic call 05x prefix<br />

o non-geographic call 08x prefix<br />

o non geographic 09x prefix (‘Premium Rate’, ‘ValueCall’ services & ‘Televote’ services)<br />

o Emergency calls to 999 for local police, ambulance or fire services<br />

o Inland Operator Assistance, 100<br />

o International Operator Assistance, 155<br />

o Non-emergency call to 101 for local police services


22<br />

o Non-emergency call to 111 for local NHS services<br />

o UK & International Directory <strong><strong>Service</strong>s</strong>, 118 prefix<br />

o Specialised <strong><strong>Service</strong>s</strong> prefix 116, pan European Helpline numbers<br />

o Timeline 123 prefix, time announcement<br />

o <strong>PSN</strong>, 07x prefix<br />

o Paging<br />

o VoIP<br />

o Post-paid calls i.e. Charge card<br />

o Messaging <strong><strong>Service</strong>s</strong> 1471 & 1571<br />

o Special <strong><strong>Service</strong>s</strong> such as Call Waiting, Call Diversion, Three-way Calling<br />

o Payphones<br />

o Alarm call – set an alarm call - your phone will ring at the time set<br />

o Reverse Charges – 0800 REVERSE<br />

o Global & European Mobile Satellite systems, ship to shore & ship to ship.<br />

These options are currently all available 24/365 with a call success rate of 99.999%.


23<br />

The Contractors UK Network also provides a range of International calling options:<br />

o International Direct Dialling (IDD) – Direct International connectivity dialled from UK<br />

landline via the Contractor’s UK Public Switched Telephone Network<br />

o International Direct Connect (IDC) – Direct International connectivity dialled from<br />

customer sites into the Contractor’s international voice and data network. Designed<br />

for high volume international outbound traffic from a single site<br />

o One Voice – Direct connectivity into the Contractors global IP network, designed for<br />

high volume multi-site international outbound traffic<br />

o One Voice Mobile Anywhere – Intercepting outbound International calls from UK<br />

based mobiles and routing them onto the Contractors One Voice network to lower<br />

cost international dialling.<br />

The Contractors international connectivity variants also offers outbound voice and<br />

ISDN64kbit/s data calling to over 240 international destinations covering fixed international land<br />

lines, mobile telephones registered overseas or International satellite services such as Inmarsat,<br />

Iridium and MSAT. The Contractor also offers International Operator delivered services to<br />

destinations that are not capable of being dialled directly.


24<br />

D) Calls & Lines - <strong>Service</strong> Description For Premium Rate Numbers & Non-Geographic DDI<br />

Numbers<br />

The Contractor provides non-geographic DDI and Premium Rate numbers which are<br />

translated into either one geographic location (basic service) or a number of locations using<br />

advanced routing features combined into call routing plans (advanced service). This allows<br />

customers to divert incoming calls to a chosen set of locations and appear as either a specific<br />

location or national presence.<br />

The Contractor provides the following options:<br />

o Number ranges: allocated number ranges priced to allow customer choice and<br />

visibility of comparative offerings.(pence per minute (PPM), pence per call (PPC), call<br />

set up fees apply in addition, all caller prices are quoted excluding VAT),<br />

o 03xx; charged at the same rate that the customer would pay to call a geographic<br />

number using the same network at the same time. 030x numbers are solely for use<br />

by <strong>Government</strong> and ‘not for profit’ organisations.<br />

o 0800/0808; free to callers from land lines. Call charges and fees paid by 0800/0808<br />

bill payer<br />

o 0844; callers are charged at up to 4.255ppm from Contractor land lines. Other<br />

operators charges may vary. The Contractor has options of 0.851ppm, 1.702ppm,<br />

2.553ppm, 3.404ppm and 4.255ppm and 4.255ppc.


25<br />

o 0845; callers are charged at up to 3.36ppm from the Contractor land lines,<br />

residential call packages include 0845 as free for up to an hour whenever<br />

geographic calls are free, otherwise they are charged at up to 1.702ppm. Other<br />

operators charges may vary.<br />

o 0870; charged to the caller at the same rate that they would pay to call a geographic<br />

number using the same network at the same time. Other operators charges may<br />

vary.<br />

o 0871; callers are charged at up to 8.51pm from the Contractor land lines. Other<br />

operators charges may vary. The Contractor has options of 5.106ppm, 5.957ppm,<br />

6.808ppm, 7.659ppm and 8.51ppm and 8.51ppc.<br />

o 09xx; callers are charged at up to £1.50 per minute from the Contractor land lines.<br />

Other operators charges may vary.<br />

A range of options are available including pence per call, pence per minute or a<br />

combination thereof. Special services available via 09xx numbers are:<br />

o Televote: A high calling rate service using 2 to 30 09xx numbers to provide voting<br />

options while capturing data and providing statistics in near real time.<br />

o FIVA: is a flexible, interactive, high calling rate competition type service available<br />

through most Inbound number ranges although mainly used with 09xx.


26<br />

o Collect and Distribute: Specifically designed as a high volume call answering<br />

service, which allows the customer to collect information from a small<br />

percentage of callers (competitions, opinion polls, market research).<br />

o Call Director; allows the use of the contractors advanced features but accessed via a<br />

geographic number.<br />

The Contractor also has a range of international options:-<br />

o International Freefone, Free of charge for callers from overseas countries. The<br />

contractor provides a different toll-free number for each country.<br />

o Universal Freefone, Free of charge for callers from overseas countries. The<br />

Contractor provides the same toll-free number for each country.<br />

o International Shared Cost, Caller pays for an element of the call when calling from<br />

overseas countries<br />

o Terminating Abroad, Enables customers to have UK originated Freefone service<br />

terminated at an overseas destination.<br />

o Transit, Enables an incoming Freefone call to be switched in the UK and terminated<br />

at an overseas PSTN destination.<br />

Advanced Features:<br />

Call Routing features:


27<br />

o Time of Day: Routes calls according to the time of day<br />

o Day of Week: Routes calls according to the day of the week<br />

o Special Date: Day specific routing of calls (e.g. Holidays)<br />

o Proportional Call Distribution: Routes calls to different locations based on their<br />

percentage of total call volumes<br />

o Divert on Busy: Diverts calls to an alternative answering position if the primary<br />

answering location is busy<br />

o Geographic Based Routing: Routes calls according where they are made from<br />

o Switch: Stores a number of alternative routing plans which can be activated on<br />

demand either online or by phone 24/7<br />

Call Handling features:<br />

o Condition Based Routing: Routes calls to an alternative answering centre when the<br />

primary location is busy<br />

o Simple in Line Messaging (SILM): Allow clients to record a message and play it back<br />

to their callers. Max length is 30 seconds or 75 words.<br />

o Caller Provided Information: Callers direct themselves to the service they want<br />

without going through a switchboard.


28<br />

o Many Numbers to a Single Plan: Delivers multiple numbers into the same plan; helps<br />

to utilise plan routing<br />

o Caller ID (CLI): Routes calls according to their specific CLI<br />

o Dialled Number Feature: Uses the dialled number as the entry criteria to split<br />

permitting alternative call treatment<br />

o ISDN Feature: Routes calls based on the ISDN data of the call.<br />

o Payphone Feature: Routes calls on the bases of call originating from a Contractor<br />

registered payphone.<br />

o Statistics Feature: Allows users with Inbound Architect to gather stats on the<br />

behaviour of their call plans.<br />

Call Terminating features:<br />

o Announcement: Standard courtesy announcement to the caller in the eventuality of<br />

it not being possible to answer the call<br />

o Follow Me: For out of hours availability to direct calls to another number<br />

o Follow Me to Mobile: For out of hours availability where calls can be terminated on<br />

mobile ranges<br />

o Messagelink 1: Answers calls with a recorded message


29<br />

o Messagelink 2: Answers calls with a recorded message and allows callers to leave a<br />

recorded message<br />

o Engaged Feature: Plays permanent engaged tone.<br />

Reports & Controls Capability - Available through an Inbound Architect web portal:<br />

Reports:<br />

o Call Details Reports: aggregated effective/ineffective calls, formatted reports<br />

o Enhanced RawCall Data (ERD): series of records containing information about the<br />

calls, generates record for every call<br />

o Rapid Report: near real time call routing data; kept for 3 days<br />

o Inbound Analyst: free software available for ERD customers; superior analysing tool<br />

Controls:<br />

of call data<br />

o Lite Control: change the deliver to number; one change at a time, multiple changes<br />

can be scheduled (also available without Inbound Architect through Statistics<br />

Advanced Feature)


30<br />

o Simple Control: changes call routing on live Advanced plans; certain Advanced<br />

Feature settings only<br />

o Full Control: design, build, modify and implement Advanced call routing plans<br />

Common Intelligent <strong>Service</strong> Layer (CISL) details<br />

o The supporting technology of Inbound Contact is based on CISL with some services<br />

provided via Recorded Information Distribution Equipment (RIDE). Reliability is<br />

designed into the platforms by means of replication and redundancy. This currently<br />

results in the achievement of 99.999% reliability. The Contractors network is<br />

proactively managed 24 hours a day, 365 days a year.<br />

o CISL is the backbone of the Inbound <strong><strong>Service</strong>s</strong> supporting technology. It is a resilient<br />

IP based platform on which most of the Inbound products are provided. It provides<br />

service from 4 sites. The two main CISL A&B sites are Reading and Crawley while<br />

the C&D sites are Milton Keynes and Nottingham and all 4 CISL sites will have the<br />

same Network functionality. If any failure happens at one site, the other sites take<br />

the call traffic over immediately.<br />

o RIDE is a mass call termination platform that plays pre-recorded announcements and<br />

captures voice messages and data. This service is provided by 40 identical nodes<br />

spread across the UK, so that calls are answered as close to call origination as<br />

possible in order to minimise network congestion. Each node contains duplicated


31<br />

processors for security of service. But in the event of a problem with one node, calls<br />

can be handled at any of the remaining 39 nodes.<br />

E) Calls & Lines - <strong>Service</strong> Description for Call Preference <strong><strong>Service</strong>s</strong><br />

The Contractor has designed a number of Call Preference <strong><strong>Service</strong>s</strong> for Public Sector<br />

customers. These are available to customers as either a Commodity or Managed <strong>Service</strong>.<br />

The Contractor provides the following Call Preference <strong><strong>Service</strong>s</strong>:<br />

Time driven rules: The Contractor manages the call routing according to rules based upon<br />

time of day and or day of the week. This allows the Contractor to route the call from originating<br />

(geographic) location to an alternate customer location or contractors network to either play a<br />

standard message or customer recorded message.<br />

Caller Line Identification (CLI) rules: The Contractor provides a service to routes calls based<br />

upon their CLI information (unique network information according to line origin and identity).<br />

This allows the Contractor to route a geographic and non-geographic numbers to any location<br />

based on customer requirement.<br />

Regulatory provision: The Contractor provides as part of its conformance with regulated<br />

services and the Civil Contingencies act the provision of services under the GTPS (<strong>Government</strong><br />

Telephony Preference Scheme) and its replacement service EGTPS. This service supports the<br />

provision to <strong>Government</strong>-approved organisations, through a combination of dedicated lines<br />

and/or switching hardware and software, a means for essential users to have assured access via


32<br />

land-based lines to the Public Switched Telephone Network (PSTN) with a high probability of<br />

successful call completion, in the event of extreme congestion caused by emergencies,<br />

etc. Increasing focus on contingency arrangements, improved functionality of EGTPS. These Call<br />

Preference Scheme lines are subject to Central <strong>Government</strong> approval and registration. In order<br />

to protect the functionality and effectiveness of the new scheme, control will be exercised over<br />

the number of approvals granted.<br />

F) Calls & Lines - <strong>Service</strong> Description for Smart Number <strong><strong>Service</strong>s</strong><br />

The Contractor provides a number of “SmartNumber” services, defined as on-demand<br />

telephony services that provide solutions for voice and business continuity requirements.<br />

SmartNumbers are provided as a total managed service, and can connect and interoperate with<br />

across legacy networks including hosted voice platforms and other service providers.<br />

The Contractor provides the following Smart number services:<br />

o Smartnumbers Proactive Recovery – A service that will automatically detect<br />

most line or PBX (ISDN or SIP) failures and re-route the call according to<br />

preconfigured customer requirements. The services will also re-route Direct Dial<br />

In (DDI) calls through to a secondary delivery route or to off-net numbers<br />

anywhere. The service allows nominated and authorised administrators to<br />

manually divert calls made to specific groups or to all incoming DDI numbers<br />

through a customer web based portal. This service is also used by the<br />

Contractor to deliver 999 call resilience and mitigate against the risk of losing<br />

local exchange infrastructure.


33<br />

o Smartnumbers Directed Recovery – A site specific service which when invoked<br />

diverts calls DDI by DDI away from the local serving exchange to alternative<br />

numbers based on predefined customer configurable plans. This service<br />

protects against line (SIP or ISDN) failure problems where a premise may<br />

become inoperable or inaccessible.<br />

o Smartnumbers Direct Connect – A service for ISDN30e, ISDN30 and Hosted Voice<br />

customers. The service provides equivalent capabilities to that provided by the<br />

Proactive Recovery service, but eliminates call delivery charges. The service<br />

allows connectivity to customer’s corporate-wide voice network directly to the<br />

contractor’s core network. The customers telephone numbers are elevated<br />

away from the local exchanges into the contractors network, removing<br />

geographic number and capacity limitations associated with delivering calls to<br />

customer’s corporate voice network via local exchanges.<br />

Smartnumbers services detailed above can be combined in any order to deliver<br />

customer continuity solution requirements’<br />

G) Call Handling - <strong>Service</strong> Description for Traditional Voice <strong><strong>Service</strong>s</strong><br />

Functional Description - Call Handling<br />

The Contractor provides both traditional TDM (Time Divisional Multiplexing) and IP (Internet<br />

Protocol) based voice services. This service connects UK Public Sector organisations through a<br />

single voice network including voice over internet protocol (VoIP) technology.


34<br />

The contractor can provide the following services as commodity or a managed service.<br />

o Traditional TDM Voice services<br />

o Hosted IPT<br />

o Centrex based Featurenet and Featureline<br />

o Hosted IP telephony service offers the same Centrex and VPN services over a<br />

quality of service enabled IP based Wide Area Network.<br />

Featurenet is one of the Contractors voice products providing a featured network service.<br />

The key components are:<br />

Featurenet 1000<br />

A VPN (Virtual Private Network) service that allows existing PABXs (Private<br />

Automatic Branch Exchange) to continue to handle on-site calls, while traffic between<br />

sites is routed through the Contractors managed network via digital or analogue access<br />

channels. Inbound direct dialling in (DDI) calls and outbound calls can, if required, be<br />

routed via the Featurenet1000 access channels.<br />

Featurenet 5000<br />

A network hosted service that allows access to advanced PBX (Private Branch<br />

Exchange) style features from a desktop instrument without the need for the provision<br />

of a PBX. The access lines are rented on a per line basis and can be enhanced by a range


35<br />

of network and line features. Traffic between sites is routed via the contractors<br />

managed network<br />

Featureline is a single site Centrex service that does not support the multi-site networking<br />

capabilities of Featurenet. It delivers a sub set of the Featurenet Centrex capabilities directly<br />

from the local serving telephone exchange. Featureline offers similar functionality to a small<br />

telephone system (PBX) but directly from the Contractors local serving telephone exchanges. At<br />

the customer's premises, Featureline is delivered as a standard PSTN exchange line with PSTN<br />

standard socket, a touch tone telephone or a telephone which is specifically designed for use<br />

with the Featureline service is required to use the service.<br />

The Contractor’s service is supported on a fully meshed TDM delivery, supported on 25<br />

Carrier Grade switches geographically dispersed around the UK. It currently offers a level of<br />

service with an availability of 99.999%.<br />

The Featurenet service is available in the following variants:<br />

Featurenet 1000<br />

Featurenet 5000 and 5000i<br />

Featurenet Call Centres<br />

Featurenet Call-In & Hosted Voice Connect<br />

Featurenet Embark<br />

Featureline


36<br />

<strong>Service</strong> Description for Featurenet<br />

Featurenet 1000 Virtual Private Network (VPN)<br />

The VPN service allows the provision of voice channels to connect to an existing customer<br />

PABX to handle on-site calls, while traffic between sites is routed through the contractors<br />

managed network via digital or analogue access channels. Inbound direct dialling in (DDI) calls<br />

and outbound calls can, if required, be routed via the Featurenet 1000 access channels.<br />

Customers select the Charging Option most suited to their particular needs, based on the<br />

number of Featurenet 1000 Access Lines on a Featurenet Site, and this Option will be applied to<br />

all Featurenet 1000 Access Lines at that Featurenet Site<br />

Changes from one Charging Option to another will be carried out at the Customer's request,<br />

but 3 months notice is required and will be charged on a per line basis<br />

Charging Options:<br />

Option A up to and including 31 channels.<br />

Option B greater than 31 channels.<br />

DDI (Direct Dial In)<br />

A DDI facility is available via Featurenet 1000 Access Lines. This <strong>Service</strong> allows for incoming<br />

calls from the public network to reach a specific extension within the organisation without<br />

operator assistance where the caller dials the public Directory Number to reach the extension


37<br />

There is a maximum ratio equivalent to 20 DDI's per Featurenet 1000 Access line. Customers<br />

existing DDI number ranges can be imported. A maximum of 5 DDI ranges and/or single<br />

numbers are permitted per Featurenet Site to handle incoming public network calls to a<br />

Featurenet 1000 Site<br />

Featurenet 5000<br />

The Featurenet 5000 service offers equivalent features of a digital PBX and includes private<br />

networking and requires no on-site PBX.<br />

Featurenet 5000 provides networked digital centrex lines, ISDN2 (Basic Rate Access) and or<br />

access channels to the contractors VPN. A Customer can control the allocation of lines to user<br />

extensions, their Class of <strong>Service</strong> and their access to different features through the Contractors<br />

<strong>Service</strong> Centre or by use of the Hosted Voice Manager application<br />

Customers can select from one of three options for each of their Featurenet 5000 Sites.<br />

Once an option is selected the Site must remain on that option until the expiry of the agreed<br />

minimum period.<br />

Option A is for Featurenet Sites of fewer than 121 lines. For new sites, this option is<br />

only available on a 12 month minimum period.<br />

Option B is for a Featurenet Site of between 121 and 960 lines and offers a 25%<br />

discount on the rental for Standard Access Lines at that Featurenet Site. For new sites,<br />

this option is only available for three or five year minimum contract periods. On-site<br />

SRU’s (Survivable Remote Unit) will normally serve such Featurenet Sites


38<br />

Option C is for Featurenet Sites of over 960 lines and offers a 40% discount on the line<br />

rental for Standard Access Lines at that Featurenet Site. For new sites, this option is only<br />

available for three or five year minimum contract periods. The On-site RSCS (Remote<br />

Switching Centre Suite for access) will normally serve such Featurenet Sites<br />

Featurenet enhanced capabilities<br />

Featurenet offers the following enhanced capabilities :<br />

Featurenet 5000i<br />

Voice/Data/Video<br />

<strong><strong>Service</strong>s</strong><br />

Centres<br />

Featurenet Call<br />

Featurenet Call-In &<br />

Hosted Voice Connect<br />

Featurenet 5000i provides switched basic rate access<br />

(ISDN2) to Centrex sites. Basic Rate lines consist of two<br />

64kbit/s data channels for independent or bonded<br />

applications, such as file transfer, video conferencing, LAN<br />

interconnect etc.<br />

Featurenet 5000 provides the following services<br />

supporting call centre requirements:<br />

Uniform Call Distribution<br />

ACD Automatic Call Distribution)<br />

MIS (management Information Statistics)<br />

CTI (computer Telephony Integration) capabilities<br />

Featurenet Call-In and Hosted Voice Connect provide the<br />

ability for users on a site which is not directly connected to<br />

the Featurenet network to become part of that network. This<br />

is via a standard PSTN phone line connection from the<br />

registered number to Featurenet. Connectivity is achieved by<br />

dialling a short code (12821) followed by an access code and a


39<br />

Mail<br />

Featurenet Voice<br />

Featurenet<br />

Smartnumbers<br />

Featurenet Management<br />

private or public number. The registered number is validated<br />

for access to the customers private network and the call is<br />

delivered to the private or public number dialled.<br />

The Voice Mail (VM) service provides the following<br />

features:<br />

Integration between email, voicemail and fax<br />

Management of voicemail via a web portal<br />

Click to call the message sender or send a SMS or an<br />

email<br />

Callers have the option to ‘Press 0’ and have their call<br />

transferred to a predefined individual or team<br />

Alerts can be sent by email or SMS or via a Message<br />

Waiting Light on certain handsets<br />

Unlimited capacity of saved messages supports<br />

regulatory compliance requirements<br />

Usage reporting via Management Information reports<br />

Interworking across any telephone network<br />

The Featurenet service supports all variants of<br />

SmartNumbers The contractor provides a number of on-<br />

demand “SmartNumber” services, that provide solutions for<br />

voice and business continuity.<br />

Featurenet provides a web based self-service management capability:<br />

Featurenet Manager provides authorised customers with the ability to control and analyse<br />

the performance and functionality of the Featurenet 5000 network via on-line tools.


40<br />

Performance and network management data can be accessed securely online, by authorised<br />

users with an Internet-enabled PC.<br />

reports:<br />

Management Reports - Customers can download the following network management<br />

Graphical Costed<br />

Usage reports<br />

Textual Costed<br />

Usage reports<br />

Reports<br />

Time to Answer<br />

Incoming Call<br />

Statistic Reports<br />

Includes:<br />

o call costs by site<br />

o Off-net Call Charges<br />

o On-net/Off-net Ratio reports<br />

Provides:<br />

o Highest call charge/s<br />

o longest duration call<br />

o most frequently dialled number<br />

o outgoing call summaries<br />

Available in both textual and graphical format.<br />

Reports detailing uniform call distribution and contractors<br />

performance.<br />

Billing Analyst – This is an optional set of tools to analyse and control telephony expenses.,<br />

It can be accessed securely online, by authorised users with an Internet-enabled PC. The service<br />

provides a breakdown of billing information, site by site, to enable and interpret records by<br />

spend or patterns. The Contractors Billing Analyst tool is free for One Bill Plus customers, with<br />

consolidated bills delivered via CD-Rom.


41<br />

Featurenet Standard Functions.<br />

The Contractor’s Featurenet 5000 service provides more than 350 user features, the most<br />

common key features are:<br />

Call Diversion: Directs calls to another extension or external number. This can be all<br />

calls, calls on busy only, or calls on no reply only<br />

Call Offer: Lets another extension user within the customers network who is engaged<br />

on a call know that they are needed urgently.<br />

Call Pick-Up: Allows users to answer a call to another line in the same location from an<br />

alternative phone.<br />

Call Transfer: Transfers a call to another line extension or to an external number,<br />

including mobiles.<br />

Caller Return: A 1471 service, which identifies the CLI number of the last caller.<br />

Call Waiting: Audio and or visual signal indicating to caller and recipient that the caller<br />

is waiting. This enables recipient the option to place the call on hold and answer the<br />

waiting call.<br />

Code Calling: Allows users to store numbers within the contractors system to retrieve<br />

and dial the number with a truncated code. i General Interrogation: identifies with<br />

audio or visual information the current settings of key features.


42<br />

Reminder Call: Allows users to set audible reminder based on 24 hour time and date.<br />

The system will ring the extension at the programmed time and give voice<br />

announcement.<br />

Repeat Last Call: Allows users to dial a code or use pre-programmed button on<br />

handset or console to re-dial the last number the user dialled.<br />

Ring Back When Free: Identifies a dialled number that was busy or engaged either a<br />

call to an engaged line, extension or external number and will ring the requestors<br />

extension when ring tones are detected. This service does not work with all external<br />

phone numbers or if network facility has been barred<br />

Ring Back When Next Used: Sets up a call between requestor and destination that was<br />

previously not answering by detecting when that destination is next used<br />

Three-Way Calling: Allows three calls to share the same voice path. The calls can be<br />

on line extensions and/or to external numbers.<br />

Withhold Your Number: Prevents the CLI originating from users phone being<br />

presented to dialled number either per call basis or permanent. Excludes presentation<br />

to emergency services where CLI is still presented.<br />

Featurenet Optional Functions<br />

Bypass Number*: Provides users with a second phone number. Callers using it will<br />

bypass any activated Call Diversion.


43<br />

Call Barring: Controls destination of dialled number can be barred by type or<br />

geography e.g. Premium rate calls, International calls, or National calls.<br />

Call Minder: Takes messages when users are busy on the phone or away from their<br />

desk.<br />

Caller Display: Displays CLI of caller or extension number on the users telephone<br />

handset, requires a telephone handset with a suitable display<br />

Direct Call: Automatically connect to a pre-programmed number after a short pause<br />

when the telephone handset is lifted.<br />

Hunt Group: Allows one dial in number to automatically be distributed to a defined<br />

number of Featurenet extensions.<br />

Local Link: Extends the Featurenet service across a maximum of five locations in the<br />

same local telephone exchange area.<br />

Remote Diversion: Allows users to activate Call Diversion (see ‘Standard features’)<br />

from remote location by use of an access code and programming features.<br />

Featurenet Voice Mail Features<br />

Voicemail Solution A range of features supported, including:<br />

generic, daily and absence


44<br />

greetings,<br />

mailbox blocking<br />

message forwarding,<br />

secretarial access,<br />

Internal voice messaging<br />

services.<br />

Voice2email Options for user notification of new<br />

received messages by email, to the telephone<br />

the user is currently registered to using out call,<br />

or via message waiting indication (MWI), Short<br />

Message <strong>Service</strong> (SMS) or Short Data <strong>Service</strong>.<br />

(SDS).<br />

Graphical User Interface Access to all messaging services from an<br />

intuitive on-screen browser interface.<br />

Active Call Screening Allows a user to listen to a voicemail that is<br />

being left and decide whether to interrupt the<br />

recording and speak to the caller directly or<br />

simply to allow the voicemail to be recorded<br />

normally.<br />

Unified Messaging Provides integration with customer’s


45<br />

existing email environment by delivery of the<br />

voicemail as an attached audio file. Provides<br />

access to all message types through users email<br />

inbox<br />

Class of <strong>Service</strong> Profiles Extensive range of features and access can<br />

Featurenet Smartnumbers<br />

be enabled or disabled for each individual or<br />

group of users. The service supports different<br />

time zones.<br />

A number of “SmartNumber” services, defined as on-demand telephony services that<br />

provide solutions for voice and business continuity requirements. SmartNumbers are provided<br />

as a total managed service, and can connect and interoperate across legacy networks including<br />

hosted voice platforms and other service providers.<br />

The Contractor provides the following Featurenet Smartnumber services:<br />

Featurenet Smartnumbers Standard– Provides a single number which identifies<br />

users across multiple locations, including delegation to individuals and teams. Supports<br />

mobile workers not in one fixed location<br />

Featurenet Smartnumbers Virtual Team – Allocates a single number to a team. It<br />

manages calls and messages to one team number The service allows access across<br />

multiple offices, to mobiles or fixed home numbers


46<br />

Featurenet Smartnumbers Virtual Queue – The Featurenet ACD service enables<br />

incoming calls from any location to be resolved by call centre agents according to<br />

business rules that customer defines. It supports industry standard call management,<br />

virtual contact centres, dispersed offices and aligned agencies.<br />

Featurenet Smartnumbers Messaging – Manages customer fax and voicemail<br />

services. The hosted service, allows access to messages from any telephone handset<br />

from any national or international telephone network. Fax and voice messages can be<br />

delivered to individuals or group email accounts.<br />

Featurenet Smartnumbers Announcement – Allows a recorded public<br />

announcement or broadcast message to be delivered via a telephone number<br />

(geographic or non-geographic). Callers dial the contractor’s announcement number to<br />

hear the message. Administrators can record announcements using any telephone<br />

handset.<br />

<strong>Service</strong> description for Featureline<br />

Featureline offers similar functionality to a small telephone system (PBX) but directly from<br />

the contractors Digital Local Telephone Exchanges. This is known as a Centrex service. At the<br />

customer's premises, Featureline is delivered as a standard PSTN exchange line with PSTN<br />

standard socket, a touch tone telephone handset is required to use the service. A telephone<br />

handset which is specifically designed for use with the Featureline service is available.<br />

The following features are provided within tariff:


47<br />

Call Diversion: Directs calls to another extension or external number. This can be all<br />

calls, calls on busy only, or calls on no reply only<br />

Call Offer: Lets another extension user within contractors network who is engaged on<br />

a call know that they are needed urgently.<br />

Call Pick-Up: Allows users to answer a call to another line in the same location from an<br />

alternative phone.<br />

Call Transfer: Transfers a call to another line extension or to an external number,<br />

including mobiles.<br />

Caller Return: The Contractor provides a 1471 service, which identifies the CLI number<br />

of the last caller.<br />

Call Waiting: Audio and or visual signal indicating to caller and recipient that the caller<br />

is waiting. This enables recipient the option to place the call on hold and answer the<br />

waiting call.<br />

Code Calling: Allows users to store numbers within the contractors system to retrieve<br />

and dial the number with a truncated code. General Interrogation*: identifies<br />

with audio or visual information the current settings of key features.<br />

Reminder Call: Allows users to set audible reminder based on 24 hour time and date.<br />

The users extension will ring at the programmed time and give a voice announcement.<br />

Repeat Last Call: Allows users to dial a code or use pre-programmed button on<br />

handset to re-dial the last number the user dialled.


48<br />

Ring Back When Next Used: Sets up a call between requestor and destination that was<br />

previously not answering by detecting when that destination is next used<br />

Three-Way Calling: Allows three calls to share the same voice path. The calls can be<br />

on Featureline extensions and/or to external numbers.<br />

Withhold Your Number: Prevents the CLI originating from the users phone being<br />

presented to dialled numbers on either a per call basis or permanent. Excludes the<br />

presentation to emergency services where CLI is still presented.<br />

The following feature is also available as a chargeable extra:<br />

Caller Display: Displays CLI of caller or extension number on the users telephone<br />

handset, requires a telephone handset with a suitable display.<br />

H) Call Handling - <strong>Service</strong> Description for Hosted IPT<br />

The Contractor’s Hosted IPT services are based on technology from 2 suppliers:-<br />

o Genband: appropriate for large enterprise deployments.<br />

o And<br />

o Cisco: appropriate for medium sized and commercial deployments.


49<br />

This section concentrates on the commonalities between the two services, not an<br />

exhaustive list of the features of each.<br />

The Contractor’s hosted service is a scalable, business grade, Unified Communications<br />

application. The service is interconnected to the PSTN via centralised carrier trunks or per site<br />

to local PSTN and provides the following capabilities;<br />

See Figure 1 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

The Hosted IPT <strong>Service</strong> provides customers with the capability to transmit voice traffic over<br />

a QoS-enabled LAN & WAN connection. This allows organisations with a suitably equipped IP<br />

infrastructure to make and receive IP calls from the desktop to compatible destinations over<br />

their LAN/WAN using IP telephones. Such calls between a customer’s sites do not attract<br />

additional usage charges.<br />

There are two IP Based Voice family member products:-<br />

Line Appearances, an IP Centrex product<br />

IPT Trunks a VoIP trunking service.


50<br />

Line Appearances provide access to a host of advanced PBX style features from a desktop IP<br />

instrument without the need for the provision of a PBX. The service is rented on a per line<br />

appearance basis and can be enhanced by a range of network and user features. Call traffic<br />

between the customer's sites is routed over the customer's IP data network. The service also<br />

provides inbound direct dialling in (DDI) facilities and PSTN breakout.<br />

IPT Trunks provide a VPN service which allows existing suitably configured PBXs to continue<br />

to handle on-site calls, while traffic between the customer's sites is routed over the customer's<br />

IP data network. Signalling and network protocol converters (Voice Gateways) may be required<br />

depending on the PBX configuration and signalling type. The service can also offer inbound<br />

direct dialling in (DDI) facilities and PSTN breakout.<br />

Whilst there are differences in how each system supports a given feature, they both<br />

provide the following capabilities:<br />

o On-net (IP Phone to IP Phone) calling<br />

o On-net (IP) calls can be made to other Hosted IPT <strong>Service</strong> users within the customers<br />

network. These calls are zero-tariff, and can be made by dialling the on net number (as<br />

described in “dial-plans”).<br />

o Off-net (IP Phone to PSTN) calling<br />

Full PSTN break-in and breakout is available as part of the service.


51<br />

o Calls to the PSTN, voice only, are priced independent of distance. A nominal minimum<br />

charge applies to each call<br />

o Customers outbound call traffic will be routed to the PSTN from the core network. This<br />

will allow customers to rationalise the number of access links to sites and take more<br />

control over the scale of the network. PSTN access is provided within the network, with<br />

no need for additional gateways or PSTN lines.<br />

o Outbound calls will be supported from the core IP network and will provide least cost<br />

routing into the PSTN.<br />

o Local number dialling is supported.<br />

Off-net (PSTN to IP Phone) calling<br />

Calls inbound to the customer site will be routed through the IP network. This will enable<br />

the customer to take advantage of a more consolidated model in their access.<br />

Managed Dial Plan<br />

o The dial plan will include support for DDI.<br />

o The managed dial plan will provide interfaces to other managed voice networks,<br />

including other Mobile network operators.<br />

o The dial plan will deliver forced on-net calls so that even if users dial the full toll PSTN<br />

number calls will be routed over the VPN to manage costs as effectively as possible.


52<br />

o As part of a Customer migration, the dial plan will provide a transparent service across<br />

the managed voice service.<br />

o The Hosted IPT service will support both public and private numbering formats plus<br />

translations between these numbers. Initially only geographic public numbers (from the<br />

01xx.. and 02xx.. ranges) will be supported.<br />

o The private number format consists of a Site Location Code (SLC) followed by an<br />

extension number. The SLC is used to identify a single site whilst the extension number<br />

identifies the single point within that site. Extension numbers can be from 2-7 digits long<br />

and SLCs from 1-7 digits long. A uniform private number format must be used within a<br />

customer’s network otherwise post dial delay will occur.<br />

o All lines with PSTN access will have available the entire national and international public<br />

dialling plan for calls dialled with the full public number.<br />

User secure log on to IP Handset for Hot-desking (Extension Mobility)<br />

o IP Telephony has the capability for users to log on to any suitable IP “device” retaining<br />

access to their feature set in line with their profile and being able to use the same<br />

phone number(s) regardless of their location.


53<br />

Support for screen based operator consoles<br />

o Enhanced Operator functions and multi position centralised answering functions will be<br />

supported from a 3rd party system interfacing as a standard IP terminal to the network.<br />

Centralised Voicemail<br />

The service supports a centralised voicemail service for the users. Users are able to access<br />

the mailbox remotely from both on and off net locations as well as from their “station”. Two<br />

levels of service are offered, VIP and Standard, which provide different levels of service.<br />

The core functionality provided is as follows:<br />

o Direct Replay: If enabled, messages are played in FIFO (Urgent, New then Saved) order<br />

immediately after the message count.<br />

o Urgent Delivery Option: If enabled, a caller option to mark a new message as Urgent.<br />

o Different greeting options for extended absences, extension busy, out of hours, and<br />

recording of user name.<br />

o Message Forwarding and Group Lists: Facility that allows the user to forward a message<br />

to another mailbox, mailboxes or group lists of mailboxes within the customers dial<br />

plan.


54<br />

o Call Answer Menu Options: Dependent upon mailbox settings, a ‘Call Answer Menu’ is<br />

played that offers the option leave a message, connect to alternate extension and<br />

transfer to the operator.<br />

o Extended Message Save: If enabled, a saved message can be re-saved by the mailbox<br />

owner, resetting the message retention period.<br />

o Message Auto save: If the user hangs up after a message is listened to, the message will<br />

be automatically saved if the Auto Save option is set.<br />

o Single ‘Retrieval’ code e.g. 1571 for all users.<br />

Customer ACD/ Basic Call Centre Capability<br />

Hosted IPT <strong>Service</strong> supports customer requirements for basic call centre<br />

functionality.Specific ACD features cover six main areas:<br />

Agent Set Features.<br />

Supervisor Set Features.<br />

Queuing and Call Handling Features.<br />

Enhanced Call Centre Features.<br />

Management Information System.<br />

System configuration.


55<br />

The Contractor’s service offers two key types of service;<br />

IP Centrex lines to phone<br />

Trunking capability for PBX connectivity.<br />

These services are brought together in a Customer dialling plan with telephony call package<br />

options. The trunks service provides public access and termination as well as creating a private<br />

network bridge to Centrex Users. The trunk types provide interfaces to both traditional and IP<br />

PBXs. In delivering integration between legacy switches and IP Centrex lines the service<br />

facilitates a hybrid solution enabling a gradual migration strategy. The IP PBX interface provides<br />

an option for early IP PBX adopters desiring a Centrex rental model or additional resilience<br />

where there is a high density of Users.<br />

The service offers:<br />

o A Recurring Monthly Charge Payment Model.<br />

o Upgrades within product.<br />

o Carrier grade Central Break-In and Break-Out (CBIBO) (where available) with Public<br />

Number Provision and Number Porting.<br />

o An Emergency <strong>Service</strong> Location compliance (CBIBO).<br />

o Compliance with other applicable Public <strong>Service</strong> regulatory obligations, data privacy etc.


56<br />

PBX connectivity to traditional and IP PBXs.<br />

The Contractors IP Voice Platform has PoP sites through-out the UK. This central<br />

infrastructure is maintained by the Contractor and provides Line and Trunk Appearance services<br />

to connect phones, PCs and Customer PBXs to the service.<br />

Lines - The appearance of a line in the form of a telephone number on a line button on a<br />

phone. Single line phones may have no buttons so the line appearance would simply be the<br />

phone’s telephone number. The ‘line’ as such is a number associated with an allocation of IP<br />

network bandwidth on the Customer’s data network.<br />

Trunks - Trunks provide the capability of making simultaneous calls e.g. ten simultaneous<br />

calls could be carried on ten concurrent trunks worth of bandwidth.<br />

Beyond line and trunk appearances, there are optional line configurations, such as Hunt<br />

Groups, Pick-up Groups, Shared Lines as well as optional features such as Voice Mail, Auto-<br />

Attendant Console and Operator Console. For trunks, the signalling type is an important<br />

attribute providing configuration options such as Presentation CLI (or Automatic Number<br />

Identification - ANI) and associated features like Direct Dialling In (DDI) and number pools.


57<br />

Customer Self Administration<br />

Customers will have access to an optional web based self-care interface. This interface<br />

allows local and remote administration of features from any suitable web enabled<br />

device. Access is via the Contractor’s <strong>PSN</strong> Portal.<br />

The service supports an individual users control of their own feature set, for example the<br />

setting up of diverts or voicemail.<br />

One Cloud Portfolio<br />

The Contractor currently provides two hosted Voice technical capabilities as part of its One<br />

Cloud portfolio.<br />

Genband<br />

o The One Cloud <strong>Service</strong> transmits voice traffic over a QoS-enabled LAN & WAN<br />

connection. This customers with a suitably equipped IP infrastructure to make and<br />

receive IP calls from the desktop to compatible destinations over their LAN/WAN using<br />

IP telephones. Such calls between a customer’s sites do not attract additional usage<br />

charges.<br />

o Calls may be made between the IPT platform and the PSTN for local, national, mobile,<br />

and international destinations. The hosted service supports the operation of call centre


58<br />

functionality using the Automatic Call Distribution features of the Genband’s carrier<br />

class CS2000 switch.<br />

o Integrated and advanced IP contact centre functionality, including facilities such as work<br />

force management, sophisticated call treatment and skills based routing are available<br />

from other services provided by the Contractor. These are currently deployed at the<br />

scale required by some of the major UK <strong>Government</strong> agencies and are CESG approved.<br />

Cisco - The service is interconnected to the PSTN via centralised in-country carrier trunks or<br />

per site to local PSTN carriers in others.<br />

o Cisco Systems is the vendor for the solution, integrating Cisco and 3rd party equipment<br />

and services, providing a single solution for the Contractor to manage. Customer<br />

administrators are able to self-provision and handle moves and changes for non-billable<br />

aspects of the service.<br />

One Cloud global<br />

The Contractors structured solution based on Cisco’s Hosted Unified Communications<br />

<strong>Service</strong> – (HUCS) is One Cloud global. HUCs can provide <strong>Government</strong> departments with a<br />

controlled step towards the enhanced services available in the world of IP telephony solutions.<br />

The diagram referred to below provides an overview of the Hosted IP Telephony-Cisco<br />

network. It shows established PoPs in the UK integrated into the UK PSTN and the reach to the<br />

EMEA region with local break-out to PoPs in the USA that serve the Americas. The Global<br />

Managed Voice (GMV) network is a shared resource with Onevoice that both share US domestic


59<br />

egress to a US Toll carrier. This network architecture opens a path to further integration with<br />

Onevoice services that have an extensive Global reach. Local Break-Out provides a method for<br />

local access within the Americas beyond the US.<br />

The Customer WAN can be exclusively the Contractors or part 3rd party. However, it must be the<br />

Contractors to at least 2 Customer hand-off points from where the 3rd party MPLS distributes<br />

media and signalling to other Customer sites i.e. the Customer’s MPLS must peer with the One<br />

Cloud global PoP. Consideration must be given to CPE access for configuration and maintenance.<br />

See Figure 2 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

IL3 Portfolio<br />

For organisations that require voice services approved to IL3 the Contractor uses technology<br />

provided by Siemens. This hosted IPT service has comparable functionality to the One Cloud<br />

portfolio, offering both line appearance and IP trunks. Its features and capabilities are optimised<br />

for IL3 applications.<br />

Functional Description Value Added <strong><strong>Service</strong>s</strong><br />

The Contractor has a number of capabilities in voice services beyond the provision of standard voice<br />

services. These include:<br />

o 118 Directory enquiries.


o Audio conferencing.<br />

o Desktop video conferencing and collaboration tools.<br />

o Web conferencing.<br />

o Managed streaming.<br />

60<br />

I) Value Added <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for 118 enquiries<br />

service.<br />

The Contractor provides two distinct 118 Enquiry <strong><strong>Service</strong>s</strong> which cover:<br />

o UK and Eire Directory Enquiries.<br />

o International Directory Enquiries.<br />

Both of these services are available 24 hours a day 365 days a year as an operator managed<br />

UK and Eire Directory Enquiries <strong>Service</strong> Functionality - For UK Directory Enquiries there are<br />

two levels of service available, standard and enhanced.<br />

The Contractor’s standard <strong>Service</strong> provides:<br />

o Access to UK and Eire residential listings and dialling codes.<br />

o Access to UK and Eire business listings and dialling codes.


61<br />

o Search by name.<br />

o Up to two enquiries per call.<br />

The following additional services can be provided as a part of the enhanced service:<br />

o Search by business type for UK businesses.<br />

o Results sent to mobile phones via SMS.<br />

o Connection to the requested number.<br />

o Unlimited enquiries per call.<br />

o Welsh language service.<br />

International Directory Enquiries <strong>Service</strong> Functionality - The International Directory<br />

Enquiries service is provided only as a standard service, and provides:<br />

o Access to residential and business listings and international dialling codes.<br />

o Unlimited enquiries per call.<br />

o Results sent to mobile phones via SMS.<br />

o Connection to the requested number, if required.


62<br />

J) Value Added <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for Audio Conferencing<br />

Audio conferencing built into an internal telephone system is usually limited in terms of size,<br />

functionality and support. That capability will be described in submissions concerning telephone<br />

networks and servers. This section refers to the Contractor’s capability to provide larger and<br />

scalable audio conferencing services.<br />

Audio conferencing services are split into two different types of services. “Reservationless”<br />

and the “Managed” or “Booked” calls service where calls are pre-booked and reserved for a<br />

specific time and date. The Contractor offers both commodity and managed services.<br />

Audio Conferencing Reservationless audio service<br />

<strong>Service</strong> outline<br />

The ‘reservationless’ service is an “always on” facility where users have their own meeting<br />

room and can launch conferences themselves with no prior booking or notification. The parties<br />

to the call will include the Chairperson, and the participants the chairperson has invited to<br />

attend that call. Each will be given the same telephone access numbers for the meeting, but<br />

they have different PINS. The meeting will only commence upon the entering of the<br />

chairperson’s PIN, with participants joining before the chairperson being placed in a holding<br />

area where they will hear music on hold.<br />

In most cases the service is designed on a “pence per minute” charging basis, with no<br />

commitment to call volumes or spend levels required.


63<br />

Size of call - The service is usually configured to a maximum of forty Participants in any one<br />

conference call. However, where required, and requested, this participant capacity can be<br />

increased to 90 or more.<br />

<strong>Service</strong> Hours - Following registration of users with an Account, the service can be used by<br />

an organisation’s own employees as well as with participants from external organisations. No<br />

advanced booking is required and the services are available 24 x 365.<br />

PINS - Each account owner will receive personalised account details including their<br />

Chairperson PIN, without which no meeting can commence, and the participants PIN which is<br />

provided to any parties invited to join the call. Although these PIN’s remain constant it is<br />

possible for the service to be enhanced to enable the chairperson to add a further PIN, unique<br />

to each meeting, if required.<br />

Requirements - The service is network agnostic and participants do not have to be on the<br />

Contractors network to be able to participate in audio conferences. All that is required is for<br />

each user to have access to a touch-tone dialling dual tome multi frequency (DTMF) telephone.<br />

Where web enhanced access to the service is required, participants require a PC, connection to<br />

the internet and an appropriate web browser.<br />

The Contractor reserves the right acting reasonably to change the system requirements but<br />

will give as much notice as possible before doing so.


64<br />

Access methods<br />

The service can be accessed by dialling into the <strong>Service</strong> using either a Toll or Toll-Free access<br />

numbers provided by the Contractor, or by the Chairperson dialling out to participants from<br />

within the conference call.<br />

Toll Dial-In Access<br />

Participants dial-in using an in-country toll access number, enter the Chairperson or<br />

Participant passcode provided by the Chairperson followed by ‘#’. The Participant pays the<br />

transport cost from their calling location to the Contractor toll access number. The<br />

Chairperson’s Account is charged for any additional Global Access charges where relevant to<br />

cover the international connection to the Contractors audio conferencing bridge.<br />

Toll Free Dial-In Access<br />

Participants dial-in using an in-country toll-free access number, enter the Chairperson or<br />

Participant passcode provided by the Chairperson, followed by ‘#’. The Participant does not pay<br />

any transport cost for accessing a local in-country toll-free number, though there are exceptions<br />

depending on the network being used - some mobile operators for example charge for calls to<br />

Toll Free numbers. The Chairperson’s Account is charged for any additional Global Access<br />

charges where relevant to cover in-country toll-free number and the international connection,<br />

where applicable, to the Contractor’s audio conferencing bridge.<br />

Dial-Out Access<br />

Dial-Out access to the service is available as an optional feature. Available to the<br />

Chairperson only, this is initiated by a DTMF command on the telephone keypad once in the<br />

conference call, via web conferencing audio integration, or by the Mobile Controller or Desktop


65<br />

Controller capabilities. The Chairperson validates their dial-out request by providing the<br />

Participant passcode before being prompted to enter the number to be dialled. The Chairperson<br />

is then returned to the audio conference and the new Participant will be joined to the audio<br />

conference if they accept the invitation. Additional charges will apply to this feature.<br />

Click to Conference<br />

The Click to Conference feature requires integration with Customer software and an<br />

Internet Protocol link between the Customer’s and Contractor’s networks.<br />

Features of the service<br />

The following sections describe the in-conference features available to Participants and the<br />

Chairperson during a call. All features are performed using the telephone keypad. Certain<br />

features can be configured or disabled by default or for each individual user upon agreement<br />

with the Contractor.<br />

All Participants<br />

DTMF<br />

Control<br />

*0 Operator<br />

Function Operation<br />

Assistance<br />

*4 Adjust Line<br />

Volume<br />

Call for help at any time and a Conference<br />

Coordinator will offer assistance<br />

Allows Participant to equalise the volume of<br />

their phone line


66<br />

DTMF<br />

Control<br />

*6<br />

Function Operation<br />

Self Mute<br />

#0 Conference<br />

Help Menu<br />

Chairperson Only<br />

DTMF<br />

Control<br />

#1 Participant Roll<br />

#2<br />

Call<br />

Count<br />

This option will silence the Participant’s line,<br />

but they will still be able to hear everyone else.<br />

On line menu listing features available to the<br />

Participant.<br />

Function Operation<br />

Participant<br />

#3 Chairperson<br />

Dial Out<br />

Plays back all name recordings<br />

to the audio conference for security<br />

or awareness.<br />

Indicates the total number of<br />

Participants on the audio<br />

conference.<br />

The Chairperson can dial out to<br />

add additional Participants to the<br />

audio conference. The Chairperson<br />

validates their dial-out request by


67<br />

DTMF<br />

Control<br />

#9 Chairperson<br />

Function Operation<br />

Hang-up On/Off<br />

(Conference<br />

Continuation)<br />

keying in the Participant passcode<br />

before being prompted to enter the<br />

number to be dialled. The<br />

Chairperson is then returned to the<br />

audio conference and the new<br />

Participant will be joined to the<br />

audio conference if they accept the<br />

invitation. Additional charges will<br />

apply to this feature.<br />

This feature allows participants<br />

to continue on a conference call<br />

after the chairperson has left.<br />

Although this feature can be set as<br />

part of the default bridge settings,<br />

#9 also allows the feature to be<br />

turned on or off for an individual<br />

conference call.<br />

## End Conference Ends the audio conference and<br />

ejects all Participants from the audio


68<br />

DTMF<br />

Control<br />

*2 Stop Audio<br />

Function Operation<br />

Message<br />

*5 Mute/Un-Mute<br />

*7<br />

all Participants<br />

Conference<br />

Lock and Unlock<br />

conference.<br />

Stops any system message, e.g.<br />

Roll Call, part way through playback<br />

if too long or requested in error.<br />

Places the audio conference in<br />

presentation mode (mutes all<br />

Participants.)<br />

Conference locking prevents<br />

anyone, including the Conference<br />

Co-ordinator, from gaining access to<br />

the audio conference.<br />

*8 Recording Initiates or stops recording of<br />

Recording Facility<br />

the audio conference call.<br />

During the conference call, the Chairperson presses * then 8 on their telephone keypad to<br />

start or stop recording of the meeting. There is a separate charge per conference for this


69<br />

feature. This facility may be disabled completely for all Accounts set up for a Customer’s Users if<br />

the Customer requests this at the time of order placement.<br />

Accessing a Recording<br />

When the meeting ends, the Chairperson will receive an e-mail with a web link to a website<br />

where they can download the recording. They will be required to enter both the Chairperson and<br />

Participant passcodes and a security verification code to access the recording.<br />

The Chairperson can then download the recording onto their computer in .WAV format. The<br />

recording will be stored on the system for 30 days and will then be automatically deleted.<br />

Conference customisation and web control<br />

Mobile Controller<br />

An application that, once downloaded via a link from the Contractor’s website onto a<br />

compatible mobile device, allows the Chairperson to control and manage the ‘reservationless’<br />

audio service in real time. Provision of this application is subject to agreement and adherence to<br />

an end user licence agreement. Mobile Controller is a chargeable feature if used to monitor or<br />

initiate a dial out connection to an audio conference based on when the first person joined the<br />

audio conference to when the last one disconnects. This charge is in addition to charges for any<br />

audio connections to a conference initiated using Mobile Controller.<br />

Microsoft Outlook Add-in<br />

An add-in application that, once downloaded via a link from the Contractor’s website onto a<br />

compatible PC, allows the user to add their Audio Conference details and access numbers into e-<br />

mails and calendar invitations.


70<br />

Desktop Controller<br />

An application that, once downloaded via a link from the Contractor’s website onto a<br />

compatible PC and added to the Outlook Add-In, allows the Chairperson to control and manage<br />

the ‘reservationless’ service – Global Access <strong>Service</strong> in real time. Provision of this application is<br />

subject to agreement and adherence to an end user licence agreement. There are no additional<br />

charges for using the Desktop Controller feature, although any audio connections to a conference<br />

initiated using Desktop Controller will incur charges.<br />

SUPPORT SERVICES<br />

In Call Support - *0<br />

A Conference Co-ordinator will provide a single point of contact for support and assistance<br />

during the audio conference by pressing * followed by 0. The Participant requesting assistance<br />

will be taken out of the main conference and the assistance function will not impact on the<br />

conference call. This facility is available 24 x 365.<br />

Disaster Recovery<br />

The Contractor will provide additional facilities to the customer for use in the event of the<br />

loss of service of the Contractors ‘reservationless’ audio conferencing bridge. This will typically by<br />

managed in Disaster Recovery Mode or Transfer of <strong>Service</strong>, but the Contractor reserves the right<br />

to use alternative methods to restore service to the Customer:<br />

Disaster Recovery Mode<br />

Disaster Recovery will comprise transfer and delivery of the ‘reservationless’ services from<br />

the normal audio conference bridge to suitable alternative audio conferencing bridge "Disaster


71<br />

Recovery Bridge" in a separate location. This process will be invoked in the event of a serious<br />

infrastructure or network access problem affecting the normal audio conference bridge and will<br />

be managed in accordance with the Contractor’s standard operating procedures.<br />

Transfer of <strong>Service</strong><br />

The conference access numbers for the affected services will be re-routed to the Disaster<br />

Recovery Bridge at the start of Disaster Recovery.<br />

The *0 element of the Helpdesk will be re-routed to the Disaster Recovery Bridge in order to<br />

be able to provide in-call support during the disaster recovery period.<br />

This will be reversed when transferring back to the normal bridge at the end of the disaster<br />

recovery period.<br />

Adoption and Awareness<br />

A key element of the Contractor’s service is access to the adoption and awareness<br />

programme. This is a non- chargeable addition to the service where the Contractor works with<br />

the customer to agree a communication and training strategy to existing and potential users of<br />

the service. An example is outlined below.<br />

Awareness - Announcement emails<br />

- Posters incl. door sign<br />

- Open days/Webinars<br />

Welcome - Welcome email with users account details (Engage<br />

users only)


72<br />

Training - Dedicated mini-site with end user support<br />

material i.e. user guides<br />

- A web based tool online training<br />

In-life Education - One educational message per month or quarter<br />

- Short messages that cover key issues<br />

“Managed” or “Booked” Audio Conferencing <strong>Service</strong><br />

<strong>Service</strong> Outline<br />

Booked Audio Conferencing <strong><strong>Service</strong>s</strong> are provided where there is a requirement for calls<br />

with more participants than can be accommodated using the ‘reservationless’ service, or where a<br />

confirmed date and time are required with bridge capacity being specifically allocated for that<br />

call. Calls can be booked for as few as three participants, to in excess of 2,500. There are three<br />

variations of the service available to suit the specific customer requirements, with calls being<br />

either automated entry or attended by an operator as requested.<br />

Access<br />

o Automated entry conferences up to 20 participants and with limited available features.<br />

o Attended entry conferences up to 20 participants and with more available features.<br />

o Automated and attended entry conferences over 20 participants with full feature set<br />

available.<br />

Participants must access the service via a DTMF telephone.


73<br />

Web enhanced access to the <strong>Service</strong> is available. Participants require a PC, connection to the<br />

Internet and an installed web browser of Netscape 4 or Internet Explorer 4 or above.<br />

The Contractor reserves the right to change the system requirements but will give as much<br />

notice as possible before doing so.<br />

Conference Scheduling<br />

To schedule a booked audio conference call, users are required to book the time slot and<br />

conference features which they require for their audio conference, together with confirmation<br />

of the number of participants required. A booking for an audio conference can be made by<br />

calling the Help Desk or via an on-line booking facility.<br />

If a User wishes to use Global Access for the audio conference this will need to be requested<br />

at the time of booking.<br />

Call Entry and Features by <strong>Service</strong><br />

The following Call Entry and Features are available on each service component.<br />

Call Entry<br />

Automat<br />

ed –max 20<br />

Attend<br />

ed – max<br />

Automated X X<br />

Attended X X<br />

20<br />

20+


74<br />

Count<br />

Access Methods<br />

Automat<br />

ed –max 20<br />

Attend<br />

ed – max<br />

Dial In X X X<br />

Dial Out X X<br />

Non-Chargeable Features<br />

Help X X X<br />

Listen-Only X X X<br />

Conference Roll Call and Participant<br />

20<br />

X X<br />

Security X X X<br />

Pre-registration X<br />

Contractor VantagePoint X<br />

Communication Line X<br />

Chargeable Features<br />

20+


75<br />

Automat<br />

ed –max 20<br />

Attend<br />

ed – max<br />

Operator Dial-out X X<br />

Conference Monitoring and<br />

Moderation Features<br />

Question and Answer Sessions X X<br />

Voting / Polling X X<br />

Conference Monitoring X X<br />

Recording X X<br />

Replay X X<br />

Replay Plus X X<br />

Transcription X X<br />

Translation. X X<br />

Playback X X<br />

Interpretation X X<br />

20<br />

20+


76<br />

Automat<br />

ed –max 20<br />

Attend<br />

ed – max<br />

Live Meeting or WebEx Support X X<br />

Call Entry<br />

There are two modes of entry into Audio Event Conferences as follows. In each case<br />

separate PIN codes will be provided by the Supplier for Presenters and Attendees.<br />

Automated Entry<br />

The Participants are provided with the access details for the conference along with a<br />

PIN code (or two PIN codes if Pre-registration is chosen for the call). When entering the<br />

conference the Participants will be prompted by the system to enter these codes using<br />

their DTMF phone and will be admitted to the appropriate sub-conference.<br />

Attended Entry<br />

The Participants are provided with the access details for the conference along with a<br />

PIN code. When entering the conference the Participants will be greeted by a<br />

Conference Coordinator and prompted by supply the PIN code and any personal details<br />

– e.g. Name, Company – specified at the time of booking.<br />

Access Methods<br />

The Contractor is responsible for providing all access numbers, and routing Participants to<br />

the conference call. The following access methods are available:<br />

20<br />

20+


77<br />

Dial In<br />

The following access methods are available on Automated and Attended entry calls:<br />

o Geographic PSTN number.<br />

o 0800 UK Freephone number – additional charge applies.<br />

o Global Access on a range of in-country toll and toll-free access numbers – additional<br />

Dial Out<br />

charges apply.<br />

The following access methods are available on Attended entry calls at additional charge.<br />

o Dial Out by a Conference Coordinator to any telephone number, anywhere in the<br />

world.<br />

All numbers to be dialled to and Attendee or Presenter details for the person being<br />

contacted must be provided at the time of booking the call. The Conference Coordinator will<br />

enter the person into the conference once they have provided the appropriate security codes<br />

for the call. The Contractor is not responsible for ensuring the attendance of any Participants in<br />

the conference and if the Participant is not available at the telephone number and time shown<br />

on the booking the Conference Coordinator is not responsible for tracing their whereabouts.<br />

Presenter and Attendee<br />

All Participants will be either Presenters or Attendees in the conference depending on the<br />

pass codes which they use to enter. The Contractor will provide the Presenter and Attendee<br />

sub-conference entry and security details. Users are responsible for ensuring that the


78<br />

appropriate PIN codes are circulated to the correct Participants following booking of the<br />

conference to ensure correct operation of the conference.<br />

Presenter Sub-Conference<br />

The Presenter details allow access into the Presenter sub-conference. In this sub-<br />

conference the Presenters can talk to each other and the Conference Coordinator prior to the<br />

main conference call. Once the main conference call is ready to commence, the Conference<br />

Coordinator will introduce the Presenter sub-conference into the main conference call following<br />

which the Presenters will be heard by all Participants. The Conference Coordinator will<br />

announce the start of the conference with a statement agreed with the Presenters relevant to<br />

the purpose and content of the conference.<br />

Attendee Sub-Conference<br />

The Attendee details allow access to the listen only sub-conference and are able to listen to<br />

the main sub-conference. On entry to the call they will hear music on hold, until the Conference<br />

Coordinator starts the main conference call. These Participants are in listen only mode can only<br />

be heard during questions and answers if they are invited to participate by the Conference<br />

Coordinator.<br />

Features - Features described below are available to enhance the audio conference:<br />

o Help Participants can get help from a conference Co-ordinator during the conference<br />

by pressing “*0.” This feature is available to all Participants at any time.


79<br />

o Listen Only (Self Mute). This function is available to those Participants who are in the<br />

Presenter sub-conference whose lines can be heard by all Participants in the call.<br />

o Conference Roll Call and Participant Count. A Conference Coordinator can list the<br />

name of each Participant into the conference allowing all Participants to be aware<br />

of who else is on the call. Alternatively, a Conference Coordinator can advise how<br />

many Participants are on the call.<br />

o Security. The Chairperson can request that the conference be secured (locked) when<br />

all Participants have joined.<br />

o Pre-registration. When booking a conference, Pre-registration can be requested as<br />

part of the call set up. The Conference Coordinator will gather the additional<br />

participant information required with call registration. The Chairperson will be sent<br />

a template e-mail to send to potential Participants. This will instruct Participants to<br />

click on the Pre-registration web link included in the invite to pre-register for the<br />

Audio Event Call.. Organisers will be able to view who has registered for the<br />

conference by accessing a dedicated website and review any additional information<br />

that was requested. Participants who pre-register will receive an iCal appointment<br />

to place in Outlook with call details. After the conference has taken place the<br />

Chairperson can immediately identify who has and hasn’t attended the<br />

conference. The report can be printed or exported as a CSV file.<br />

o Web View - It is possible to provide a web view of the Participants on the call and in<br />

the question queue. This allows the speaker to adjust their message to their


80<br />

audience as well as to prioritise the order in which they take questions as well as<br />

choose to not take a question from a certain participant.<br />

o Communication Line. A dedicated phone line for Presenters to the Conference<br />

Coordinator can be requested for support purposes in the event of any technical<br />

difficulties so that the Conference Coordinator can talk to the Presenters.<br />

o Operator Dial-out. The Chairperson can at any time request that a Conference<br />

Coordinator dial out to another party and bring them into the conference.<br />

Conference Monitoring and Moderation Features<br />

o Question and Answer Sessions Typically used after a lecture or a presentation,<br />

Participants can use their telephone keypad to signal that they wish to ask a<br />

question. The questioner’s identity is displayed to the co-ordinator who allows<br />

questions to be asked one at a time. Tone dialling telephones are required by<br />

Participants.<br />

o Voting/Polling. The Chairperson provides multiple-choice questions and then<br />

Participants key in the appropriate digits to signal their answer to each question.<br />

The results will be collated and delivered to the customer. Participants need DTMF<br />

telephones for voting.<br />

o Conference Monitoring. Monitoring of the audio conference for sound quality is<br />

provided by the Co-ordinator during the call.


81<br />

o Recording. The phone conference will be recorded onto either a 90-minute audio<br />

cassette or onto a Compact Disc, and posted by first class post. Additional copies<br />

can also be supplied. All Participants will be advised at the start of the audio<br />

conference that it is being recorded. This feature must be requested at time of<br />

booking. (Note: the CD can be recorded in .wav, MP3 or Windows Media file<br />

formats and these formats are also supplied via email)<br />

o Replay. The conference can be digitally recorded and then made available at a later<br />

date. When the recording is available, the customer distributes the telephone<br />

number and recording number to allow access.<br />

o Replay Plus. In addition to the standard Replay feature, participants can also be<br />

asked to record their names, company names or other information before listening<br />

to the recording, and/or comments, feedback etc. after listening to it.<br />

o Transcription. The phone conference can be recorded and a typed transcript<br />

delivered by post, fax or e-mail.<br />

o Translation. The typed record can be translated into another language for the<br />

customer.<br />

o Playback. Pre-recorded tapes or CDs supplied in advance by the Customer can be<br />

played into the Conference at any point upon request.<br />

o Interpretation. An interpreter can be brought online for all or part of the audio<br />

conference. A list of available languages can be provided on request to the<br />

Contractor.


82<br />

o Conference Support Work. If additional work (such as faxing agendas), is<br />

required the Contractors Help Desk will provide further information and associated<br />

costs on take up of the service.<br />

o Webconferencing Facilities. The Contractor provides a set of web-based services<br />

Support<br />

which can be used for presentations and collaborative calls. If assistance is required<br />

from the Conference Coordinator before, during and after the meeting to upload<br />

presentation material to the selected web-conference, drive slideware and interact<br />

with the webconferencing console, this must be selected at the time of booking.<br />

Routes for support can be either *0 (star zero keyed when in an Audio Conference will bring<br />

a Conferencing co-ordinator into your call to assist with a problem as it happens), or toll-free<br />

helpdesk and technical support. Both these routes have escalation paths to Disaster Recovery<br />

processes.<br />

Web conferencing management information<br />

The Contractor makes management information available monthly and the format and build<br />

is agreed and reviewed with the customer. The Account Performance Report features a number<br />

of comparative metrics over the previous year (by month) and includes, minutes, participants,<br />

expenditure etc.<br />

Management information can also be extracted from the monthly VMBOL (View My Bill<br />

Online) Billing information, VMBOL is an Internet based Billing tool which breaks down the bill to<br />

each individual call and can determine how many participants and how long they participated in<br />

a call, what the individual costs were, and all information can be exported to Excel for


83<br />

manipulation and internal billing purposes (this via cost-centres associated with each contact if<br />

required)<br />

K) Value Added <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for Desktop Video Conferencing and<br />

Collaboration Tools<br />

Desktop Video - Range of Capabilities<br />

Desktop Video is a very broad product line, which can encompass both Software as a <strong>Service</strong><br />

(SaaS), through to a full hardware on premise deployment. The Contractor can offer both<br />

Commodity and Managed Solutions in the following key areas:<br />

SaaS led desktop Video<br />

o These services are usually based on web conferencing led tools– specific services<br />

can integrate fully to the Contractor’s Phone Conferencing services. The video<br />

however is generally not ‘standards based’, so video conferences can only occur<br />

between other users utilizing the same tools.<br />

IM and Presence led desktop Video.<br />

o These services usually lead with client software on the desktop/tablet for IM and<br />

Presence. This client software is generally standards based or proprietary, If<br />

standards based then please see bullet point below “Standards based led Desktop<br />

Video”.


84<br />

o If proprietary then the Contractor can offer on premise hardware to allow<br />

proprietary video calls to call standards based video endpoints, therefore allowing<br />

access to the services described below.<br />

Standards based led desktop video<br />

The Contractor can provide hardware which can be sold as a pure on premise deployment,<br />

with installation and support, or wrapped in a Managed <strong>Service</strong> via strategic staffing.<br />

Features<br />

o SaaS led desktop Video.<br />

o IM and Presence led desktop Video.<br />

The Contractor can provide the necessary on premise hardware to convert the proprietary<br />

protocols to standards based protocols. Example features shown below:<br />

o Conversion of RTV (Real Time video) to H.263 CIF or H.264 720P.<br />

o Maintenance support of on premise hardware for conversion.<br />

o Installation of on premise hardware for conversion.<br />

o Bridging services for desktop video endpoints to join as a guest the Contractor’s video<br />

bridging and gateway services.


85<br />

Standards Based Led Desktop Video<br />

The Contractor can provide the necessary on premise hardware to offer desktop video<br />

conferencing from the major manufactures. Example features shown below:<br />

o Installation of on premise hardware.<br />

o Maintenance support of on premise hardware.<br />

o Bridging services for a desktop user to join as a guest the Contractor’s video bridging and<br />

gateway services.<br />

o High fidelity audio over Internet.<br />

o Up to HD resolution through standards-based H-264 video.<br />

o Users can share their PC desktops.<br />

<strong>Service</strong> Management - Dedicated Account management support with regular reviews.<br />

The Contractor provides customers with Dedicated Account and <strong>Service</strong> Managers.<br />

Desktop Video Conferencing Implementation <strong><strong>Service</strong>s</strong><br />

The installation programme focuses on:<br />

o On site readiness.<br />

o Technology components.<br />

o Equipment shipping.<br />

o Receiving and delivery.


86<br />

o Physical setup.<br />

o Configuration<br />

o Testing<br />

o Operational training.<br />

For most installations a project manager is appointed by the Contractor to ensure all<br />

coordination and communication is smoothly handled.<br />

For transition of existing equipment onto the new service, the Contractor’s migration/on-<br />

boarding process methodology ensures that this is handled smoothly. An on-boarding team<br />

leader who will manage the process will be appointed. A site registration for all sites is input into<br />

the Contractor’s system to create an asset register.<br />

Installation Example Scope of <strong><strong>Service</strong>s</strong> - Site Preparation:<br />

o Installation scheduling coordination with customer designated contact.<br />

o Technical/configuration review – (including network).<br />

o Confirmation with customer to ensure site readiness prior to installation date.<br />

Shipment Tracking<br />

o Confirm equipment order receipt by manufacturer.<br />

o Monitor equipment shipment status by tracking number.<br />

o Contact customer to confirm delivery.<br />

On Site Installation<br />

o Unpack equipment from original shipping containers.<br />

o Conduct visual inspection for damage.<br />

o Verify completeness of equipment delivery.<br />

o Install components (includes installation in cart if purchased/provided).


87<br />

Testing<br />

o Connect equipment to in place network.<br />

o Dress cables.<br />

o Install auxiliary cameras, system control peripherals, microphones and other<br />

provided accessories (using provided standard cables and extenders).<br />

o Perform power up, initial system configuration and system diagnostics.<br />

o Confirm system is functioning properly in local loop-back configuration.<br />

o Place and receive a remote video call (functional network required).<br />

o Loop back testing will be performed in the event network is unavailable at the time<br />

of installation.<br />

o Return visits to perform testing after network installation is subject to Time &<br />

Material rates.<br />

Training<br />

The Contractor provides the following system orientation training with all equipment<br />

installations at no additional charge:<br />

o Overview of system components.<br />

o System power on/off instructions.<br />

o Place & Receiving Calls.<br />

o Types of calls system can place and receive.<br />

o Placing calls.<br />

o Calling from the Speed Dial List.<br />

o Manual dialing.<br />

o Answering calls.<br />

o Using the address book.<br />

o Adding a site.<br />

o Dialing


88<br />

o Deleting a site.<br />

o Using local cameras.<br />

o Using and setting presets.<br />

o Using remote cameras.<br />

o Instructions on performing a loop back test.<br />

o How to contact The Contractor for support.<br />

Support Initiation<br />

o Initiate Warranty/Maintenance agreement.<br />

o Provide Help Desk contact information.<br />

o Conduct Quality Assurance functionality review within one week of installation.<br />

Installation Acceptance<br />

The Contractor requests customer site contacts review and sign a completed Project<br />

Installation Certificate (PIC) to ensure installation has been completed to the customer’s<br />

satisfaction.<br />

Support Options<br />

Maintenance<br />

The chart referred to below outlines the various services and the level of support provided.<br />

See Figure 3 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’


89<br />

Video Global Help Desk<br />

The Contractor offers a 24 x 365 Help Desk support as a single point of contact. Our field<br />

service and Help Desk technical staff are certified and trained on all products supported by the<br />

Contractor.<br />

There are 5 options for Maintenance <strong>Service</strong>. These are:<br />

o One Care Remote.<br />

o One Care On-site.<br />

o One Care Remote Plus.<br />

o One Care On-Site Plus.<br />

o Time and Materials.<br />

One Care Remote<br />

The Contractor will provide telephone support and remotely coordinate repair and materials<br />

necessary to enable the covered products to perform correctly in accordance with their<br />

warranties, specifications, End User manuals, descriptions and/or other related documentation,<br />

and to timely resolve each problem or error.<br />

o Free Phone Help Desk Telephone Support - Provides customer access to the Help Desk<br />

which is available 24 x 365 for telephone assistance regarding user questions, trouble<br />

call reporting, usage or maintenance assistance. The Help Desk technicians utilise


90<br />

trouble call tracking and database software for problem resolution and escalation<br />

procedures. The Help Desk will continue to track and manage resolution on the call<br />

ticket until the trouble has been fixed and tested.<br />

o Failed Part Replacement - The Contractor will remotely assist the customer in<br />

determining the defective part to be replaced for any Covered Product. Following the<br />

Contractor’s diagnosis of the failure, replacement parts are shipped on a priority basis in<br />

accordance with the manufacturer’s published lead time.<br />

o Software - One Care Remote provides software protection for Covered Products with the<br />

provisioning of updates, bug fixes and patches unless excluded by the manufacturer for<br />

a particular Covered Product.<br />

One Care On-Site - One Care On-Site Maintenance includes all features described under One<br />

Care Remote, and adds the following features:<br />

The Contractor <strong>Service</strong> Representative <strong><strong>Service</strong>s</strong> (for part replacement)<br />

o If telephone Help Desk troubleshooting and isolation procedures as per the Contractor<br />

<strong>Service</strong> escalation procedure do not resolve the problem, the Help Desk will dispatch a<br />

Contractor Authorised <strong>Service</strong> Representative for replacement of suspected failed parts<br />

on the Covered Products. Following the Contractor’s diagnosis of the problem, this<br />

service is delivered on-site in coordination with the arrival of the replacement of the<br />

faulty part at the Customer’s Site.<br />

o On-Site Support - If on-site replacement does not resolve the suspected trouble issue,<br />

the Contractor Authorised <strong>Service</strong> Representative will remain on-site at no additional


91<br />

charge to further isolate and resolve the problem (if a Covered Product is still suspected<br />

to be the source of the problem). If the Contractor determines that no Covered Product<br />

is the source of the problem, the Contractor Authorised <strong>Service</strong> Representative may stay<br />

on-site to assist other vendors, network carriers or in-house wiring personnel at time<br />

and materials rates.<br />

One Care Remote Plus & One Care Onsite Plus One Care Plus includes (in addition to the<br />

features described for One Care Remote & One Care Onsite) the following features:<br />

o Network Trouble Resolution - In the event of a network trouble issue, the Help Desk will<br />

provide telephone or email coordination with network providers and/or the customer’s<br />

IT support staff to promote resolution of network and/or networking equipment issues.<br />

o Remote Equipment Monitoring (REM)- This service proactively monitors the status of a<br />

Covered Product in a remote centric manner in order to determine when it may become<br />

inoperable or incapable of supporting a video conference application. The nature and<br />

extent of REM <strong>Service</strong> varies depending on the device being monitored. The REM<br />

<strong>Service</strong> can monitor the status of a range of devices, including but not limited to:<br />

Video conferencing endpoints.<br />

Video conferencing bridges.<br />

Video conferencing infrastructure equipment.<br />

Routers (router interface only).


92<br />

IP/ISDN networks (via video conferencing endpoints).<br />

o Certification - If the Customer selects One Care Plus, the Covered Products are<br />

subject to a device certification performed by the Contractor. Certification is carried<br />

out remotely.<br />

o Proactive Monitoring - Once the certification is completed, the Contractor will start<br />

proactively monitoring the status of a Covered Product. This will be carried out in a<br />

remote centric manner.<br />

o Monitoring Covered Product Status - The Contractor will provide access to the web<br />

based tool web portal accessible via the public internet. The Customer will be able<br />

to use the web based tool to access the REM <strong>Service</strong> interface. The REM <strong>Service</strong><br />

interface will allow the customer to view the status of each of its Covered Products<br />

that is being monitored by the REM <strong>Service</strong>. This <strong>Service</strong> is available on a 24 x 365<br />

basis.<br />

o REM Reporting - The customer will be able to use the web based tool portal to<br />

access the reporting platform. This <strong>Service</strong> is available on a 24 x 365 basis. A number<br />

of reports related to the REM service are available and can be exported to various<br />

formats to allow customers to customise the output of the standard reports. The<br />

reports available include:<br />

Open Tickets.<br />

Closed Tickets.<br />

Ticket List.


93<br />

Ticket Statistics.<br />

Ticket Monthly Counts.<br />

Tickets by Site.<br />

REM <strong>Service</strong> Performance.<br />

o Network Connectivity between the Customer & the Contractor - In order for the<br />

Contractor to provide the REM <strong>Service</strong>, network connectivity must be put in place to<br />

securely allow REM <strong>Service</strong> traffic to pass from the customer’s Covered Product to<br />

the Contractors management tools.<br />

o Dual Monitoring - The Contractor will not provide the REM <strong>Service</strong> for any Covered<br />

Product that is being simultaneously monitored by another application, such as but<br />

not limited to Tandberg management suit (TMS) and Polycom global management<br />

system (GMS).<br />

Time and Material <strong><strong>Service</strong>s</strong><br />

The Contractor provides time and material services (remote and/or on site). Customers can<br />

request time and material services through the Help Desk call process. Time and materials<br />

service tickets are processed on a “first come first served” basis with no guarantee of resolution<br />

times.<br />

o One Call Maintenance – The Contractor One Call Portfolio is defined as providing a<br />

single point of contact for Level One helpdesk support and dispatch management to


94<br />

customer’s in-house and 3 rd party maintenance providers. The Contractor provides<br />

three levels of One Call support:<br />

One Call.<br />

One Call Plus.<br />

One Call Custom.<br />

o Return On Investment (ROI) enhancement and tracking programs - The Contractor has a<br />

number of service options which ensure that the objectives behind the investment can<br />

be tracked and reported on. This approach allows organisations to facilitate end user<br />

adoption of new services and to track the tangible environmental impact that the video<br />

conferencing solution is delivering.<br />

o Training and adoption - The Contractor provides:<br />

Introduction to videoconferencing, and methodologies for best utilising video.<br />

Introductory courses / support materials for de-mystifying the new technology and<br />

usage.<br />

Training for our online and reporting suite.<br />

Guidance on technology acceptance, processes, and the Contractor’s service support.<br />

Insight on Best Practices, including innovative ways other clients have used video<br />

throughout their organisation to successfully achieve business objectives.


95<br />

o Three levels of program support: The Contractor branded, Co-branded, and Custom<br />

Branded:<br />

The Contractor branded means that all the materials will have the Contractor logo,<br />

look, and feel.<br />

Co-branded materials will include both the Contractor and client on all marketing<br />

collateral.<br />

Custom branded marketing collateral will be designed according to the customer’s<br />

brand, inclusive of their logo, colours, etc.<br />

The appropriate level will be agreed as part of the scoping for a particular project or<br />

deployment.<br />

Items include materials such as quick reference guides, user guides, equipment<br />

guides, door hangers, posters, tent cards, and guidelines for our web based tool.<br />

The Contractors Education & Adoption Program<br />

The Contractor program covers emails, flyers and marketing material that can easily be<br />

branded. The Contractor recommends that video training sessions are recorded so that users<br />

and new users can catch up and learn how to use the systems.<br />

The Contractor will provide the Customer with an education and adoption program to<br />

launch a new video conferencing service. A dedicated Marketing Manager will work with the<br />

Customer to develop a Communication Plan that includes implementation and on-going<br />

educational and training initiatives.


96<br />

The Contractor will employ tried and tested communication techniques for the Customer to:<br />

o Promote the benefits of conferencing.<br />

o Educate and train employees on the new conferencing service.<br />

o Highlight best practices.<br />

o Provide on-going education.<br />

o Request feedback from end users in order to constantly improve the service.<br />

The Contractor offers customised and branded materials at different levels according to the<br />

Customers’ requirements.<br />

The campaign approach to launch the service and drive adoption consists of the following<br />

core elements:<br />

Awareness - Announcement emails<br />

- Posters incl. door sign<br />

- Open days/Webinars<br />

Welcome - Welcome email with users account details (Engage<br />

users only)<br />

Training - Dedicated mini-site with end user support material<br />

i.e. user guides<br />

- A web based tool online training<br />

In-life Education - One educational message per month or quarter<br />

- Short messages that cover key issues<br />

Launch Process: 6 to 7 weeks<br />

The launch process involves five stages:<br />

o Define: Agree communications, target audience, key messages, branding.<br />

o Draft: The Contractor creates the communications design.<br />

o Approve: Customer approval, review feedback process.<br />

o Launch: Customer to launch communications.


97<br />

o Feedback: Capture feedback from users and make any changes.<br />

The Contractor Education and Training <strong><strong>Service</strong>s</strong><br />

The Contractor understands that customer training is critical to the overall success of an<br />

enterprise conferencing solution. When users feel comfortable and confident with the<br />

technology, adoption rates are elevated. Additionally, when more conferencing users embrace<br />

unified collaboration, organizations enjoy significant benefits, such as increased productivity and<br />

reduced travel costs.<br />

The Contractor’s educational training services focuses on the techniques of effective<br />

conferencing as well as system operation itself, with the goal of “minimising the effects of the<br />

technology”. All customer-training is directed through our in-house Educational <strong><strong>Service</strong>s</strong> team<br />

and offers options for training to be delivered via video or on site at the customer’s location.<br />

End User Training Course Content<br />

End user training conducted for a room system is a two hour session designed to be most<br />

effective with up to eight participants per session. Desktop End User Training is a one hour<br />

session for up to three participants per session.<br />

User training sessions are conducted over video however may also be provided at the<br />

customer’s location. The key elements of the training course are:<br />

o Identifying and operating system components.<br />

o Powering the system on/off.<br />

o Dialling point-to-point/dialling into a bridge.<br />

o Dialling an audio call over video (when applicable).<br />

o Performing within a multipoint conference (when to use “mute”, how to start a<br />

meeting, multipoint etiquette).<br />

o Operating and pre-setting near and far end camera control.<br />

o Previewing and sending peripherals within a meeting for presentations.<br />

o Working with a VCR, document camera or other peripheral.


98<br />

o Sending “Freeze Frame Graphics” or snapshots.<br />

o Creating materials for PC/MAC use.<br />

o Incorporating video etiquette into a meeting environment.<br />

Technical and Administrator Training<br />

Technical or Administrative Training is conducted at the customer’s location at the end of<br />

the installation. System components are reviewed, network connections are identified and<br />

explained and system menus are demonstrated to acquaint the administrator(s) with the<br />

system. Each course includes customised training guides for all class participants.<br />

The Security Framework<br />

Security for <strong>PSN</strong><br />

The IL2 <strong>Service</strong> proposed for <strong>PSN</strong> is delivered from the Contractor’s standard conferencing<br />

platform, used to deliver video conferencing and telepresence services across all the<br />

Contractor’s business customers. This platform will be assured to IL2 by a CAS(T) audit and<br />

submitted for accreditation by the Pan <strong>Government</strong> Accreditor as part of the <strong>PSN</strong> certification<br />

process.<br />

The Contractor has also provided videoconference solutions for a number of <strong>Government</strong><br />

organisations with similar Security requirements. Although these do not offer desktop video as a<br />

service, they do show that the Contractor can offer standards based Video Conferencing to an<br />

IL2 level


99<br />

Solution 1<br />

The Video Conference service, as utilised by existing <strong>Government</strong> organisations via the<br />

Contractor, provides videoconferencing accredited at RESTRICTED (IL3). The service comprises<br />

infrastructure across a number of locations for resilience supporting approximately 330<br />

endpoints of various types operating as either Standard Definition or High Definition. There are<br />

a number of Telepresence systems also within the estate.<br />

The service can operate in a fully automated manner with users booking online through to<br />

call launch at a future date for the selected systems. A dedicated helpdesk is provided to assist<br />

with bookings, call launches and problems as required. The helpdesk is the single point of<br />

ownership for all operations within the service. The service operates predominantly using H.323<br />

(IP) although an H.320 (ISDN) capability is maintained.<br />

The managed service is provided by a dedicated Contractor Team based in Preston. The<br />

Team are located in an access controlled area and are dedicated solely to the service provided<br />

for the <strong>Government</strong> organisation, the staff are security cleared to SC or higher. The equipment<br />

providing the service is located in secure premises and is physically separated from other<br />

infrastructure equipment. The equipment provided is not used for any other customer.<br />

Solution 2<br />

This solution is based on IL3 and IL5 Security levels.<br />

The service provides a Managed <strong>Service</strong> based on Internet Protocol (IP) and ISDN providing<br />

conferencing capability at RESTRICTED and SECRET levels, allowing for either point to point or<br />

multi-point video conferencing.


100<br />

The service comprises infrastructure supporting over 400 endpoints, with a mixture of<br />

Standard and High Definition.<br />

The solution is delivered by the Contractor on behalf of the MOD under a single supplier<br />

agreement. The Contractor delivers secure voice, data, LAN interconnect, and other WAN<br />

Defence industry partners also benefit from this Contractor service.<br />

The Contractor has developed a complete range of tailor-made, integrated video-<br />

conferencing and audio-visual services. It’s all been built to rigid security standards.<br />

The service offers IP and ISDN service instances point-to-point and multi-point video-<br />

conferencing at several high security levels between users at the protective markings of.<br />

o RESTRICTED (including NATO RESTRICTED).<br />

o SECRET (including US-Allied SECRET and NATO SECRET).<br />

Suppliers Certification<br />

The Contractor Capabilities: Video Manufacturer Certifications:<br />

CISCO (includes TANDBERG).<br />

The Contractor is a Cisco direct reseller and holds the following<br />

certifications/specializations for Cisco TelePresence technologies:<br />

o Cisco GOLD Reseller.<br />

o ATP - Cisco TelePresence.<br />

o ATP - Cisco TelePresence Global.<br />

o Managed <strong><strong>Service</strong>s</strong> Master.


101<br />

o Global Certified Partner.<br />

POLYCOM<br />

The Contractor has been a Cisco/TANDBERG reseller for over 15 years.<br />

The Contractor is a Polycom reseller and holds the following certifications with<br />

Polycom:<br />

o Platinum Authorized Reseller.<br />

o Certified <strong>Service</strong> Provider.<br />

o Advanced Telepresence VNOC Provider.<br />

LIFESIZE<br />

The Contractor has been a Polycom reseller for over 15 years.<br />

The Contractor is a LifeSize direct reseller and holds the following certifications with<br />

LifeSize:<br />

o National Authorised Reseller.<br />

The Contractor has been a LifeSize reseller for over 4 years.<br />

Additional certifications:<br />

The Contractors <strong>Service</strong> Technicians have certifications in the following<br />

competencies:<br />

o CTS<br />

o AMX<br />

o Crestron<br />

o Cisco – BSCI, Cisco – ONP, Cisco | BSCI, Cisco CCENT, Cisco CCNA ,Cisco CUVC,<br />

o CIW, CompTIA A+, CompTIA Network +


102<br />

o Extron EAVA.<br />

o Madge CP.<br />

o Polycom CMA, Polycom CVE, P olycom HDX, Polycom MGC, Polycom<br />

RMX, Polycom CMA, Polycom SE200.<br />

o Radvision<br />

o Tandberg TCEP, Tandberg TCES, Tandberg TCTA, Tandberg TCTE, Tandberg TCTS, and<br />

Tandberg TMS.<br />

o The Contractor is an alpha and/or beta testing partner for endpoints, MCUs,<br />

software, etc.<br />

The Contractors Sales & Design Engineering Technicians have certifications in the<br />

following competencies:<br />

o Networking: A+, Net+, MCD, MSCE, CCNA.<br />

o ClearOne: Certified Technical Specialist.<br />

o TANDBERG (now Cisco): TANDBERG TCAP, TANDBERG TCTE, TANDBERG TCTMSS.<br />

o CTS InfoComm: CTS, CTS-D.<br />

o Extron: EAVA Extron Certification.<br />

o Cisco: Cisco CSE; Cisco Account Manager.<br />

o Polycom: VSG Video Sales Solutions, VSG Infrastructure Pre-Sales, VSG Video Pre-<br />

Sales Technical.<br />

o LifeSize: Certified Professional, Certified Expert, Technical Professional.<br />

L) Value Added <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for Web Conferencing<br />

The Contractor’s web conferencing applications enable the sharing of documents and<br />

applications through the Web enabling communication through interactive online


103<br />

meetings. The <strong>Service</strong> provides a broad range of web conferencing services that build on the<br />

real-time functionality and capabilities of a dedicated delivery network. This is a private global<br />

network, created with a carrier-class information-switching architecture. Customers can choose<br />

from a range of applications dependant on their requirement.<br />

o Meetings: Users can give presentations, demonstrate software, view and annotate<br />

documents electronically. Teleconferencing is integrated to the service where the user has<br />

an appropriate webcam. The service has options to include additional features such as<br />

record and playback, integrated video, the ability to edit any document collaboratively and<br />

the ability to share applications or a Participant’s entire desktop.<br />

o Large events: For communications events such as press briefings, product announcements<br />

and marketing events. This application combines interactive meeting capabilities with<br />

planning, training, logistics management and real-time support services. It includes online<br />

confirmation, notification, and instruction, customised Participant registration, high-<br />

resolution text and graphics, the ability to demonstrate a broad range of applications in real-<br />

time, audience feedback collection via polling, white board interaction, guided web<br />

browsing, live chat, recording and archiving of seminars for on-demand playback, and end<br />

user reports.<br />

o Training sessions: Training and e-learning applications. With this application, participants can<br />

coordinate training schedules from announcement to enrolment to follow-up, deliver live<br />

instruction from a variety of sources directly to learners' desktops, and give presentations<br />

that include audio, video and interactive multimedia. Participants are able to


104<br />

administer tests, organise multiple simultaneous breakout sessions, and record, edit, play<br />

back and archive entire sessions for future use.<br />

o Remote desktop support: Remote Support is used by customer service organizations to<br />

provide remote hands-on support for system or software application problems. It allows<br />

service agents to support end-users through a web browser. The <strong>Service</strong> can be configured<br />

with a custom user interface to simplify support interactions for both the support agent and<br />

the end-user.<br />

o Enterprise edition: This application integrates the four service options outlined above to<br />

create a comprehensive solution tailor made to fit specific requirements<br />

Web Conferencing features<br />

The current <strong>Service</strong> features are set out below. Note: the Contractor reserves the right<br />

without notice to upgrade the <strong>Service</strong> to a later version which may result in these features and<br />

their descriptions changing.<br />

Generic <strong>Service</strong> features<br />

o Feature o Detail<br />

Share documents, Share and control documents, applications, and desktops


105<br />

o Feature o Detail<br />

applications, or<br />

desktops<br />

Rich multimedia<br />

experience<br />

Video and video<br />

conferencing<br />

remotely in real time without uploading files to a server.<br />

Collaborate on content to view, annotate, and enlarge<br />

documents or graphics. Switch between different sharing<br />

modes without transitions or distractions.<br />

Incorporate multi-media into presentations: PowerP<br />

int, Flash animations, and audio and video.<br />

Real-time visual reference. Simulate face-to-face meeting<br />

with Participants from multiple locations with multi-point<br />

video.<br />

Supported on all Centres with exception of Event Centre.<br />

Supported Platforms:<br />

o Windows, Macintosh (Full support).<br />

o Linux, Solaris (View only).<br />

Min. Network Requirements 128Kbps (256Kbps<br />

Recommended).<br />

Resolutions: SQCIF, QCIF, CIF SQCIF, QCIF, CIF.<br />

Max Resolution (pixels) 352 x 288 (CIF).


106<br />

suite<br />

access<br />

o Feature o Detail<br />

Desktop integration<br />

One-click meeting<br />

Network-Based<br />

Recording (NBR)<br />

Max Frame Rates (per sec.) 15fps (SQCIF, QCIF) 10fps (CIF)<br />

Transport Protocol TCP Port 80, SSL 443.<br />

Maximum Participants 500.<br />

Video Codec H.264.<br />

Additional Features:<br />

o Frame Rate Control.<br />

o Resolution Control.<br />

o Video Snapshot.<br />

o Congestion Control.<br />

Initiate meetings instantly from MS Office, MS Outlook,<br />

Lotus Notes and other instant messaging solutions.<br />

Start a meeting and invite Participants instantly from<br />

desktop.<br />

Available on request with all Centres with Committed<br />

Charges. Allows the Host to record the web and audio<br />

conference on the server with the following specification:


107<br />

o Feature o Detail<br />

File Formats: Advanced Recording Format .arf.<br />

Recording Conversion: .arf to Windows Media .wmv and<br />

Flash .swf.<br />

Recording Resolution 1024x768.<br />

Audio Recording: the Contractor Reservationless service.<br />

Recording Player: Network Recording Player.<br />

File Size: Typically 15MB to 40MB per Hour of Meeting<br />

Time; Results Vary by Meeting Content.<br />

Max Recording Length: 12 hours.<br />

Storage / Distribution: Saves to “My Files,” able to stream,<br />

download, and/or publish the recording URL.<br />

PowerPanels Deliver full-screen views for Participants whilst using<br />

controls to manage meeting activity privately behind the<br />

scenes.<br />

Chat Interact with the audience of the web conference through<br />

an online chat between Host and a Participant, or Host and all<br />

Participants.


108<br />

o Feature o Detail<br />

Annotation Pointers and real time annotation tools to provide<br />

additional commentary and collaboration.<br />

Firewall friendly Work through most firewalls without opening additional<br />

Security<br />

ports.<br />

The solution offers 128-bit SSL (Secure Socket Layer) transport to provide a high level of<br />

security for meeting sessions. The service encrypts network traffic associated with the meeting<br />

session with SSL. This applies not only to session content within an active meeting session, but<br />

also to traffic generated from the solution Web page accesses before and after the actual<br />

meeting session. This includes traffic arising from API calls. Thus, SSL encrypts the session<br />

creation, listing, joining processes, as well as feedback submission.<br />

Additionally, in-session content shared using the Document/Presentation Sharing mode is<br />

encrypted using U.S. National Security Agency authorized 256-bit AES (Advanced Encryption<br />

Standard) encryption prior to transmission. This ensures that such content is encrypted even if<br />

cached on intervening network devices.


109<br />

During a session, information is switched in real time rather than uploaded to a central<br />

server. , At the end of the session, all such data dissipates.<br />

The solution offers a number of in-meeting security options, including:<br />

Support<br />

Assignment of passwords to a session.<br />

Option to create private meetings or un-list them so that attendees must know<br />

the unique meeting key and optional password to join.<br />

Display of the attendee list.<br />

Ability to expel uninvited attendees (both browser and telephone).<br />

Ability to lock a meeting or event.<br />

Routes for support can be either *0 (star zero keyed when in an Audio Conference will bring<br />

a Conferencing co-ordinator into your call to assist with a problem as it happens), or toll-free<br />

helpdesk and technical support. Both these routes have escalation paths to Disaster Recovery<br />

processes.<br />

Web Conferencing Management Information<br />

The Contractor makes management information available monthly and the format and build<br />

is agreed and reviewed with the customer. The Account Performance Report features a number<br />

of comparative metrics over the previous year (by month) and includes, minutes, participants,<br />

expenditure etc.<br />

Management information can also be extracted from the monthly VMBOL (View My Bill<br />

Online) Billing information, VMBOL is a Internet based Billing tool which breaks down the bill to<br />

each individual call and can determine how many participants and how long they participated in<br />

a call, what the individual costs were, and all information can be exported to Excel for<br />

manipulation and internal billing purposes (this via cost-centres associated with each contact if<br />

required).


110<br />

Web Conferencing Partners<br />

The Contractor partners with both CISCO WEBEX and Microsoft in respect to web<br />

conferencing services offered and supported.<br />

M) Value Added <strong><strong>Service</strong>s</strong> - Managed Streaming <strong><strong>Service</strong>s</strong><br />

Streaming, or webcasting, enables the delivery of high impact, rich-media messages<br />

including video, audio and presentations to more attendees. The technology takes audio and<br />

video content and transmits it efficiently over the internet or an organisation’s corporate<br />

intranet. This can be accessed by anyone with a personal computer and a web browser.<br />

Streaming can be delivered either “live” or “on demand”. It requires no infrastructure<br />

upgrades or hardware and the service includes end to end management before, during and after<br />

the event.<br />

Streaming integrates seamlessly with all of the conferencing services offered by the<br />

Contractor to enable the benefits of true unified collaboration.<br />

Event Management service options:<br />

The Contractor will tailor the streaming event to meet customer requirements. <strong><strong>Service</strong>s</strong><br />

available include:<br />

Pre-call consultation and access tests.


111<br />

Preparation and organisation.<br />

Running the conference.<br />

Custom productions.<br />

Post event debrief.<br />

Co-ordinating of AV equipment.<br />

On-site management of the event.<br />

Managed Streaming Options<br />

“Live”<br />

The Contractor provides a URL as part of the booking confirmation. This link becomes live 15<br />

minutes before the scheduled start time of the event. The organisation booking the event e-<br />

mails this to the participants wanting to watch the stream. At the time of the conference the<br />

participants click on the URL and enter their registration details if requested to do so.<br />

“On Demand”<br />

The Contractor provides a URL as part of the booking confirmation. After the conference has<br />

finished the organisation booking the event e-mails this to the additional participants wanting to<br />

watch the stream. They simply click on the URL to watch. On demand content is usually available


112<br />

within 1.5 times the event duration. For example, for a two hour live event the on demand<br />

stream will be available approximately three hours after the event finishes.<br />

Confirmation Process<br />

After booking, the organiser will receive a confirmation email. This will confirm all of the<br />

streamed details including information about the features requested e.g. Presentation package,<br />

the date and time of the streamed conference and the URL for viewers to use to watch the<br />

stream.<br />

An optional registration page enables the event organiser to collect valuable information<br />

from viewers before they access the content of the stream. There is also an optional Presenter<br />

package to enable the organiser to produce and present the streaming session with a variety of<br />

tools. These include question and answer sessions and voting by the viewers to gauge<br />

understanding. It is also possible to create an index of archived presentations for fast and easy<br />

navigation.<br />

Bandwidth Management<br />

To manage corporate bandwidth more effectively the intranet solution uses software<br />

peering technology to deliver the stream. This is done via a desktop client that utilises an<br />

organisation’s existing Local Area Network thus optimising the Wide Area Network bandwidth<br />

demands, removing the need to add more bandwidth or buy additional hardware. The more


113<br />

computers that connect to the stream the more efficient the desktop client becomes, with<br />

reduced load and a higher built in redundancy across the network.<br />

Functional Description for Other Communication <strong><strong>Service</strong>s</strong><br />

The following basket of other communication services are described below:<br />

o Co-Location And Hosting <strong><strong>Service</strong>s</strong>.<br />

o On-Line Storage <strong><strong>Service</strong>s</strong>.<br />

o Antivirus <strong><strong>Service</strong>s</strong>.<br />

o Email Scanning And Filtering <strong><strong>Service</strong>s</strong>.<br />

o Firewalls, Intrusion And Spyware Detection <strong><strong>Service</strong>s</strong>.<br />

o Authentication And Access Management <strong><strong>Service</strong>s</strong>.<br />

o Web And Application Sign On <strong><strong>Service</strong>s</strong>.<br />

o Mail And Messaging <strong><strong>Service</strong>s</strong>.<br />

o Real Time Information <strong><strong>Service</strong>s</strong>.<br />

o Desktop Messaging.<br />

o Messaging Via Email, SMS, Pager And Mobile Or Fixed Line Telephone.<br />

o Secure File Transfer.


114<br />

o Unified Communications.<br />

N) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description Internet services<br />

The Contractors Internet Connect UK <strong>Service</strong> provides Ethernet Access based services to<br />

connect the customer to the Internet. As such all bandwidth speeds are sold as Ethernet (Layer<br />

2) speeds and internet connectivity. The service includes Domain Name Registration and<br />

Primary and Secondary Domain hosting as follows:-<br />

o Primary DNS names are hosted for any domain that the customer owns. Sub-domains<br />

of customer-owned domains are treated as separate domains<br />

o Secondary domain name service for name and address resolution.<br />

.The Contractor can register with the appropriate registration authority the customer’s<br />

requested domain name, subject to that name’s availability.<br />

DNS<br />

IP and application services<br />

Primary DNS 10 primary DNS names are included and hosted free of charge<br />

Secondary<br />

charge<br />

Summary of Key Features<br />

250 secondary DNS names are included and hosted free of


115<br />

o <strong>Service</strong> delivered on a range of bandwidth ( 2 Mbps - 10Gbps) bearers with “Flex”<br />

capability,<br />

o A managed router is provided as standard, as part of the service. This device provides<br />

isolation between the network and any of the Customers own equipment and defines<br />

the Contractors service boundary.<br />

o Resilience options - Failover & Load balancing (the Contractor recommends the latter<br />

option).<br />

o Disaster Recovery options are available.<br />

o Static routed IP addresses.<br />

o Domain name registration and administration.<br />

o DNS (Primary and Secondary name servers).<br />

o Clean-feed, provided as a standard feature, blocks access to Internet sites included on<br />

the Internet Watch Foundation (IWF) list.<br />

Throughput considerations<br />

The effective throughput is affected by the protocol being used and where the throughput<br />

is being measured from. For example the IP layer throughput will be different to the Ethernet<br />

layer throughput due to the overheads associated with delivering the IP packet over the<br />

Ethernet access.


116<br />

The IP throughput can vary based on the type of IP applications being run e.g. IP Telephony<br />

traffic has far greater overheads compared to FTP traffic due to the nature of the voice<br />

application driving the need to package the voice data into small IP packets to be sent over the<br />

IP network quickly and at regular intervals as opposed to the FTP traffic that is typically sending<br />

large (non real-time) data across the network in large IP packets.<br />

The service can potentially achieve an IP throughput of up to 98% however this may<br />

decrease based on applications being used over the Internet Access connection.<br />

This is not just applicable for the Contractors services, any Ethernet (layer 2) Internet<br />

Access service purchased from any other ISP will also be subject to the same bandwidth<br />

throughput considerations.<br />

Access options<br />

The Contractors Internet Connect UK offers a range of access/speed choices:<br />

Speed Access Technology<br />

2-10Mbps EFM Ethernet In the First Mile<br />

10Mbps,<br />

100Mbps, 500Mbps, 1Gbps<br />

& 10Gbps<br />

(Copper)<br />

Ethernet (Fibre)


117<br />

<strong>Service</strong> speeds<br />

The Contractors Internet Connect UK service speeds can be changed within 72 hours.<br />

<strong>Service</strong> speeds start at 256Kbps.<br />

Bearer Access <strong>Service</strong> Increments<br />

10Mbps & 100Mbps 1 Mbps increments<br />

, 1Gbps 10 Mbps increments<br />

Resilience options<br />

The Contractor has the following standard resilience options.<br />

<strong>Service</strong> option Description<br />

Failover In normal operation all the traffic goes over one primary access<br />

circuit. In the event of a failure, the traffic fails over to a secondary<br />

access; which, if available has been diversely routed.<br />

Load balance Load balancing differs from Failover by sharing the traffic in<br />

Security<br />

normal operation over the two physical accesses, diversely routed if<br />

available. In the event of an access failure, all traffic is routed over<br />

the remaining access.


118<br />

<strong>Service</strong><br />

The Contractors Internet Connect UK offers the following<br />

Accreditation BSI 7799 / ISO 27001<br />

Illegal content<br />

Denial of<br />

Cleanfeed uses the Internet Watch Foundations managed black<br />

list to prevent users from downloading illegal content.<br />

<strong>Service</strong> Optionl, Cleanfeed can be turned off.<br />

Internet Connect UK proactively monitors and protects the<br />

Contractors core network against Denial of <strong>Service</strong> attacks.<br />

Proactive <strong>Service</strong> Option, Distributed Denial of <strong>Service</strong> monitoring and<br />

mitigation service. This service mitigates against traffic DDoS<br />

attacks, DoS floods, Protocol Misuse, Worms and behaviour<br />

anomaly based attacks.<br />

Contractors indicative access delivery lead times<br />

<strong>Service</strong> Target <strong>Service</strong> Lead-Time<br />

2 Mbps 40 working days, subject to survey<br />

10Mbps and 100Mbps 45 working days, subject to survey<br />

500 Mbps 70 working days subject to survey<br />

1 Gb 70 working days, subject to survey


119<br />

10 Gb 90 working days, subject to survey<br />

2Mbps - 10Mbps EFM 30 working days, subject to survey<br />

CPE<br />

Included in the service is a monitored Cisco router.<br />

<strong>Service</strong> Option: Customers can choose to supply, manage and or use third party or customer<br />

owned CPE.<br />

Contention<br />

The service is un-contended (1:1) in the Contractors Internet Connect UK network. The<br />

bandwidth selected by the customer is always on.


120<br />

Peering<br />

Internet Connect UK has extensive peering, through the Contractors UK (AS2856) and<br />

International (AS5400) backbone.<br />

Broadband access<br />

The Contractors Total Broadband products provide access options for mobile and home<br />

workers or individuals with light usage requirements. The Contractors Business Total Broadband<br />

service has two access technology services with a variable rate 20Mbps (maximum) and a<br />

40Mbps fibre optic service.<br />

The 20Mbps uses new 'rate-adaptive' ADSL technology to automatically provide and<br />

maintain the fastest broadband speed a phone line can physically support. The actual maximum<br />

speed depends on a range of factors, including the customer's proximity to their telephone<br />

exchange, the quality and length of any telephone extension lines in their home, and the speed<br />

of their computer and modem. A customer living close to their exchange could get the full 20MB<br />

speed, whilst those living further away might achieve lower maximum speeds of 6Mb, 4Mb, or<br />

2Mb. The 20MB service is also subject to local availability.<br />

The Contractor also provides Infinity for business (Super-fast Broadband) that is a fibre optic<br />

access service. Current download speeds of up to 40Mbps are available. Future download<br />

speeds of up to 100 Mbps are targeted today and the Contractor is testing access speeds up to


121<br />

100Mb for release within the near future. This also means that the Contractor can provide<br />

super-fast upload speeds as a proportion of the download speed.<br />

The Contractors Business Broadband connection offers the following key features:<br />

Infinity for business (Super-fast Broadband)<br />

flexible option for connection including Free connection (time limited)<br />

Up to 40Mb download and 10Mb upload<br />

Unlimited Wi-Fi access<br />

Total Broadband Advance Support (Fibre)<br />

flexible option for connection including Free connection (time limited)<br />

Up to 20Mb download and 2Mb upload<br />

Total Broadband Advance Support<br />

As Advance but Unlimited Usage and Premium Support (covering BB and PC’s)<br />

Total Broadband Advance<br />

50GB Usage, Hub, Free UK Phone Support, Unlimited Wi-Fi access<br />

Total Broadband Office Unlimited<br />

Unlimited Usage, Unlimited Wi-Fi access<br />

No Hub<br />

Paid for UK Phone Support, (free online support),


122<br />

Total Broadband Office<br />

10G Usage, Unlimited Wi-Fi access<br />

No Hub. Online <strong>Service</strong>,<br />

Satellite Broadband Mobile<br />

The Contractor’s service can provide a vehicle-mounted broadband IP connection. This is<br />

achieved via a small self-deploying motorised antenna, antenna controller, and satellite modem.<br />

The connection can be used for web browsing, email and other Internet Protocol (IP)<br />

applications.<br />

Virtual Private Networks (VPNs) can be supported via protocols such as Internet Protocol<br />

Security (IPSec) for secure connection to a corporate network. Alternatively, for even greater<br />

security, the customer has the option for a dedicated private connection from the satellite<br />

network hub bypassing the public Internet.<br />

The satellite modem functions as a router and provides an Ethernet interface, delivering IP<br />

connectivity over the satellite back to the satellite hub which has high levels of resilience against<br />

power failures and other events. The Contractors support desk is manned 24/7 with expert<br />

assistance available on call.<br />

Connectivity is provided from this service to the Internet or to a customer-dedicated<br />

backhaul such as a leased line or multiprotocol label switching (MPLS) circuit.


123<br />

Virtual Private Networking (VPN)<br />

The Contractors Satellite Broadband Mobile supports use of Virtual Private Networks (VPNs)<br />

using the IP Security (IPSec) protocol. Note that use of IPSec encryption will mean traffic cannot<br />

be accelerated by compression techniques across the satellite network and this will normally<br />

result in lower throughput speeds. However the Contractors GatewayVPN product can be<br />

combined with this service to provide fully end-to-end accelerated VPN tunnels over satellite<br />

whilst maintaining a high level of customer security which avoids the cost of a dedicated<br />

backhaul from the hub to a customers corporate headquarters.<br />

Dedicated backhaul<br />

Alternative connectivity is available for customers that do not require to connect via the<br />

Internet. The Contractor can provide dedicated backhaul such as a multiprotocol label switching<br />

(MPLS) circuit or a leased line.<br />

Customer equipment<br />

The Contractor provides the satellite equipment required including a self-deploying<br />

motorised 75 or 90 cm satellite antenna, which needs a clear view of the southern sky,<br />

unobstructed by trees or tall buildings to lock onto the network. Exceptionally, some locations<br />

may require a larger 1.2 m antenna. A self-deploying motorised antenna mount and controller<br />

and a satellite modem unit are also supplied.


124<br />

The system can be powered from the vehicle battery – via an inverter – or from a separate<br />

battery/inverter, or from an external 230-volt mains power supply where available.<br />

Key features<br />

Speed: a choice of service peak speeds and the option of a pool of dedicated bandwidth<br />

dedicated to customer sites; both help optimise service levels<br />

Connectivity options: connecting either to the Internet or via an optional secure VPN<br />

tunnel over the internet into your private network<br />

Availability: designed to exceed 99.5 per cent in most locations, boosts efficiency and<br />

minimises downtime.<br />

Remote management: the Contractor can change your service speeds quickly and without<br />

intervention at remote sites.<br />

Fixed pricing: the connection is “always-on,” with no dial-up or per-minute charges. The<br />

monthly service price provides predictable costs.<br />

Convenience: the self-deploying antenna makes accessing the Internet or corporate<br />

network simple and is available 24/7.<br />

O) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for Co-Location and Hosting <strong><strong>Service</strong>s</strong>


125<br />

Co-location services - The Contractors Locate Solutions, is a high level standard<br />

specification, custom built and local data centre offering that resides within the telephone<br />

exchange portfolio throughout the UK. The Locate team utilise the Contractors wealth of<br />

experience at running high availability environments to design and maintain the facilities to a<br />

bespoke SLA. The Contractors “Locate” Solutions offer a range of products from a Single Rack in<br />

a shared European Telecommunications Standards Institute (ETSI) environment to a dedicated<br />

Data Centre within one of the Contractor’s exchanges.<br />

The Contractors Locate Solutions are usually able to offer a site to within 20kms of a<br />

customer's desired location. Contract length is flexible but usually five years.<br />

Lead time for delivering Locate Solutions vary from a 12 week deployment for a single rack<br />

solution, to an eight month build time for the larger data centre depending on requirements.<br />

Locate Solutions Data Centres<br />

The Contractor is a key supplier of business continuity services and has developed a<br />

complete, one-stop solution that is designed to meet the needs of organisations of all sizes. The<br />

Contractor has a vast selection of versatile facilities which can be used for the reliable and<br />

secure hosting of IT and communications equipment.<br />

Locate Data Centre solutions provide:


126<br />

o Secure facilities at Contractors telephone exchanges – enabling customer equipment to<br />

be co-located with the network.<br />

o The diverse selection of sites in the UK – a nationwide spread that ensures that the<br />

contractors facilities are within easy reach of customer locations<br />

o A managed and monitored service in a secure environment.<br />

The Contractor can:<br />

o Source a suitable site<br />

o Supply, move and install customer equipment<br />

o Manage IT services – either remotely or onsite<br />

o Install the racks o Install and manage the cable connections<br />

o Provide complete telecoms connectivity<br />

Data suite components the complete data suite includes the following elements:<br />

o A raised floor<br />

o Power distribution units<br />

o Environmental monitoring<br />

o VESDA (Very Early Smoke Detection Apparatus)


127<br />

o Ironwork and cable trays (underneath the floor)<br />

o Air handling units<br />

o Inergen (inert gas fire suppression that lowers oxygen levels)<br />

o Associated office space(if required)<br />

Benefits<br />

o Flexibility – Ability to change : re-scale operations to reflect the customer changing<br />

requirements through to relocating data centre services to a different location.<br />

o Resilience to power outages: The contractor offers uninterruptible power supply and<br />

the data centre suites are also backed-up by a generator.<br />

o Security – The facilities are protected by a sophisticated electronic security system,<br />

managed from a central access control centre controlling access to authorised card<br />

holders<br />

o Environmental control - The Contractors approach use services that provide minimal<br />

environmental impact such as fresh air, modular cooling systems.<br />

Locate Single Rack, part of the Locate Data Suite, provides the facilities to house customer<br />

communications equipment in a rack in one of the Contractors telephone exchanges.


128<br />

include:<br />

The Contractor offers:<br />

o A monitored, safe and secure environment<br />

o A wide choice of sites throughout the UK<br />

The design, construction and maintenance of the communications rack. This could typically<br />

o a standard 600x600 45u lockable rack<br />

o Ironwork and cable runs<br />

o Dual power feeds, backed up by UPS (uninterruptible power supply)<br />

o 24x7 access to authorised personnel<br />

Key benefits include:<br />

o Lower costs: fixed charges; no major capital investment.<br />

o Performance: a minimum 99.67% power availability target.<br />

o System and data security: a sophisticated electronic security system.<br />

Hosting <strong><strong>Service</strong>s</strong>


129<br />

The Contractor’s Managed Hosting service is the provision of a fully inclusive hosting service<br />

within one of the Contractors data centres. The core service comprises of a data centre,<br />

common front end, connectivity and the necessary servers, storage devices; and services<br />

required to provide a managed service to the Customer. The Contractor provides all the<br />

necessary equipment to the customer or agent acting on behalf of the customer.<br />

These include :<br />

Data Centre<br />

Common front end<br />

Network Connectivity<br />

Managed services<br />

The Data Centre<br />

The contractors Data Centre services provides service options from the provision of power,<br />

cooling and space through to a complete managed service. Within a managed environment it is<br />

possible to connect the Customers devices to their network with a secured connection.<br />

The contractors Data Centres have built-in business continuity backed by network, server<br />

and storage SLA’s and aligned with ITIL processes & ISO 20000/27001 principles.<br />

The Contractor’s Managed Data Centre services are complemented by its Application<br />

Assured Infrastructure (AAI) service. AAI provides consultancy audits on application environment


130<br />

and impacts of IT changes and offers continuous monitoring and optimisation of application<br />

performance from desktop to data centre.<br />

The On-net Hosting service provides access to the Contractors MPLS network. The<br />

service enables IP Clear Customers to more easily and cost-effectively connect into their DCS<br />

Hosting Platforms via shared MPLS connectivity. The infrastructure is already in place and can be<br />

configured by the Contractor to provide a faster delivery. Data Centres are inherently resilient<br />

with multiple high bandwidth connectivity having a 99.55% to 99.99% target availability.<br />

The Contractor offers business continuity and disaster recovery solutions to provide a full<br />

end-to-end solution covering everything from PBX backup to intra-data centre data storage and<br />

retrieval networks and professional services for business impact analysis, risk and vulnerability<br />

assessments.<br />

Common Front End<br />

The Common Front End is the collective term used to describe the proven service design pattern<br />

for shared switches and routers incorporated into the data centre<br />

Network (connectivity)<br />

The Contractor standard network options are , Internet and MPLS<br />

Note: availability of these services are not present at all data centres.


131<br />

Internet Bandwidth is available in a number of options:<br />

a traffic allowance or dedicated capacity at some data centres and<br />

fixed, burstable and pay-as-you-use at other sites.<br />

Some data centres also have access to the MPLS network (On Net Hosting). This allows for<br />

very cost effective connectivity between the Contractors data centre and the Customers' MPLS<br />

network.<br />

Managed <strong><strong>Service</strong>s</strong> (servers, storage devices)<br />

The Contractor<br />

offers a set of products, locations, services CPE and resilience options to support a<br />

wide range of Co-location and hosting services;<br />

is vendor agnostic and can provide connectivity and services including a number of<br />

partners that give flexibility in supporting a variety of applications, servers, hardware,<br />

operating systems and Web and database servers.<br />

Hosting services<br />

The Contractors Web Hosting service provides an Internet website service including:<br />

Website hosting, creation, and maintenance of applications;


132<br />

include:<br />

E-chat and integrated messaging<br />

Customer communication and Website promotion applications.<br />

E-Shop provides E-commerce facilities within a website, allowing credit card<br />

transactions and other forms of payment.<br />

The Contractor also provides a bespoke corporate website service which has features that<br />

Website design and creation<br />

Website security testing<br />

Worldwide content distribution services,<br />

E-commerce gateways<br />

Performance testing and optimisation<br />

The services use the infrastructure of the Contractor’s managed hosting service.<br />

P) Other Communication <strong><strong>Service</strong>s</strong> - The <strong>Service</strong> Description for on demand storage services<br />

The Contractors solution is On Demand Compute. This is a web-based system that allows<br />

customers to create and manage their own infrastructure and access the service through the<br />

Contractors Compute Selfcare portal.


133<br />

Through the portal the customer controls the creation, modification and management of<br />

the Compute requirements through a series of easy to follow menus allowing the customer to:-<br />

add /remove virtual servers<br />

modify firewall sets.<br />

The service is based on a modular, layered architecture, which offers both scalability and<br />

virtualisation at each of the main layers. The layers include:<br />

Network layer – This includes the provision of firewall services; virtual ‘service’ load<br />

balancing; and virtual networks and switches.<br />

Storage layer – This enables the customer to allocate data space and includes virtual<br />

application storage (fast); virtual shared storage (slow); and snap backup and restore.<br />

Computing layer – This enables the customer to create, customise and control small,<br />

medium and large virtual servers via the portal. Options include high availability and additional<br />

value add services.<br />

Security layer – The security layer underlies the other three layers and provides multiple<br />

tiered firewall services, virtual load balancing and virtual SSL (Secure Sockets Layer).<br />

Features and functions<br />

The Contractor provides a suite of globalised data centre services that provide:


134<br />

o Automation – Full Automated <strong>Service</strong> Delivery and <strong>Service</strong> Assurance<br />

o Autonomics – Self Healing / Self Defending<br />

o Autonomy – Customer Self <strong>Service</strong> and Change Control<br />

The following features are provided as standard:<br />

o System Compatibility – A complete Application Hosting Environment supporting<br />

Microsoft Windows compatible applications.<br />

o <strong>Service</strong> Level –On Demand Compute is underpinned by an ITILv3 <strong>Service</strong> Wrap to<br />

known and agreed security levels, delivered to a known <strong>Service</strong> Level Availability target<br />

of 99.95%.<br />

o Standard Configuration - Virtualised instance(s) are configured to standard build<br />

templates, allowing fast turnaround of orders and changes.<br />

o Quick provisioning –On Demand Compute offers virtual servers built within five working<br />

days. Most in-life service changes take from 4 hours.<br />

o Managed service – The infrastructure supporting the customer’s service will<br />

be managed, and the virtual machines monitored for availability.<br />

o Storage flexibility – The customer can increase the storage up to a total of 2048Gb per<br />

virtual server or group of virtual servers.<br />

o Backup and Restore – Customers have a choice of backup schedules for application<br />

storage and can also restore backed-up drives.<br />

o Control of Resource – On Demand Compute enables customers to control many aspects<br />

of their service. These include adding and removing virtual servers, adding storage,<br />

increasing Internet bandwidth and adding and changing firewall rule sets.<br />

The service has an option for a “private cloud” service using dedicated servers and<br />

infrastructure within the Contractor’s data centres. The service is the same as offered with the<br />

On-Demand compute product, but based on dedicated hardware<br />

The following features are provided as standard:


135<br />

o System Compatibility – An Application Hosting Environment supporting Microsoft<br />

Windows compatible applications.<br />

o <strong>Service</strong> Level – an ITILv3 <strong>Service</strong> Wrap, delivered to a known <strong>Service</strong> Level Availability<br />

target of 99.95%.<br />

o Standard Configuration - Virtualised instance(s) are configured to standard build<br />

templates, allowing fast turnaround of orders and changes.<br />

o Provisioning – A new collection of virtual servers can be built within five working days.<br />

Most in-life service changes take from 4 hours.<br />

o Managed service – The infrastructure supporting the customer’s service is managed,<br />

and the virtual machines monitored for availability.<br />

o Storage flexibility – The customer can increase the storage up to a total of 2048Gb per<br />

virtual server or group of virtual servers.<br />

o Backup and Restore – Customers have a choice of backup schedules for application<br />

storage and can also restore backed-up drives.<br />

o Control of Resource – enables the Customer to control their service. This includes adding<br />

and removing virtual servers, adding storage, increasing Internet bandwidth and adding<br />

and changing firewall rule sets.<br />

Q) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for antivirus services (internet protection<br />

and control)


136<br />

Comprehensive Web protection and control<br />

Web Security.Cloud helps defend against Web-borne threats. To protect against email and<br />

instant messaging related risks including links to malicious sites sent through instant messaging<br />

services, email-borne malware, spam, data leaks, and potential lawsuits caused by the<br />

distribution of inappropriate content. This is achieved by preventing malicious content located<br />

on requested destinations from being passed to the customers systems, filtering Web traffic<br />

requests to potentially dangerous sites, and inspecting download responses for all Web content.<br />

See Figure 4 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

Symantec.cloud Web security and control<br />

See Figure 5 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

Threat intelligence is shared across communication protocols for increased<br />

protection.<br />

Web Security.Cloud consists of two core components:


137<br />

o Uniform Resource Locator (URL) Filtering – All Web requests are verified against a<br />

sophisticated policy engine and URL categorisation database containing over 80<br />

categories to ensure appropriate content remains accessible while restricted content is<br />

carefully controlled. The policy engine is highly flexible and intuitive, enabling the<br />

Customer create policies and monitor behaviour for specific users and groups. The<br />

Customer can also place time and volume consumption based limitations on Web use to<br />

help prevent misuse and protect corporate bandwidth.<br />

o Multi-layered Security – Multiple commercial antispyware and antivirus engines scan<br />

the clients Web content for malware. These defences operate at the internet level to<br />

block threats before they reach the Customers network. The engines are continually<br />

updated by Symantec.Cloud to ensure accurate detection of the latest known<br />

threats. Proprietary Skeptic heuristic technology additionally guards against new and<br />

converging threats which can target Web users via other protocols such as email and<br />

instant messaging.<br />

Web URL Filtering<br />

Web URL Filtering enables the Customer to set up a rich set of policy rules for Web traffic<br />

requests to adhere to when submitted by a user. Policy rules are individual rules set up in order<br />

to identify the action to be taken when the administrator defined conditions are matched by a<br />

user’s Web request. There are over 80 URL categories to select from when creating rules and a<br />

URL Category Lookup tool to aid in the accurate and rapid creation of policies.<br />

Web URL Filtering is supported by a database of over 67 million URLs and the categorisation<br />

database offers multiple category support for a single URL. This ability helps to address the


138<br />

challenges of dynamic content, such as portals and Web 2.0 sites. This means that a Customers<br />

policies will be consistently enforced. Users can be protected from sites that are acceptable one<br />

day and contain content or files which should be blocked the next.<br />

Rules are configured using the Symantec.Cloud user interface, known as ClientNet. The<br />

ClientNet online portal enables the Customers administrators to configure, monitor and obtain<br />

reports about their services. Using ClientNet, rules can be configured for select users, groups,<br />

categories, file types, specific blocks of time or by bandwidth consumption levels.<br />

The ability to block certain undesirable file types from being downloaded can be particularly<br />

useful to aid in protecting corporate bandwidth and productivity. Files such as streaming media<br />

that tend to be large or consuming can be blocked completely or halted by the bandwidth levels<br />

they consume.<br />

Web URL Filter rules can be configured to apply to specified users, groups of users and can<br />

be applied to specific blocks of time. This assists Customers in creating policies which help<br />

monitor and enforce user compliance with their Web Acceptable Use policy regardless of their<br />

time zone. Additionally, the Customers administrators can take advantage of the service’s quota<br />

capability which allows for limits to be placed upon end-user browse time and bandwidth<br />

consumption levels. These capabilities are particularly useful for Customers interested in<br />

minimising challenges such as lunch hour browsing.<br />

Web Security.Cloud is provided with default rules, based on best practices, that can be used<br />

to block traffic to Web pages with URLs that are known to contain content in the multiple<br />

categories. Some examples of the categories the Customer can use include Adult/Sexually


139<br />

Explicit, Criminal Activity, Spam URLs, and Spyware. Customers have the ability to either use the<br />

default rules or to configure custom rules to reflect their own Web Acceptable Use Policy.<br />

Web URL Filtering rules are made up of the following components:<br />

o Conditions – A defined set of conditions that must be met in order to trigger the rule<br />

and its corresponding actions.<br />

o Time – An administrator may select periods, days or blocks of time in which the rule<br />

should be observed and enforced.<br />

o Groups – Select user groups may be specified within a rule. This allows for granular rules<br />

to be created based on Active Directory groups or custom groups defined by the<br />

Customer.<br />

o Quotas – Quotas can be used to select daily allowances that reset at 00:00 in the time<br />

zone(s) they are configured for. Quotas can be set by days of the week, selected hours<br />

of the day and applied to specific users or groups of users. Both time-based and<br />

bandwidth-based options are available.<br />

o URL Categories – These consist of several choices that filter out commonly visited sites<br />

which are inappropriate for work use, viewing in the workplace environment or which<br />

impact user productivity. Examples include: Sports, Adult/Sexually Explicit, Social<br />

Networking, Shopping and Web-based E-mail.<br />

o Specific URLs – Specific sites can be blocked which are deemed inappropriate or are not<br />

in keeping with the Contractor Web Acceptable Use Policy or allowed. For example the


140<br />

Travel URL Category may be blocked, but the Customers corporate travel agency’s<br />

Website may be allowed.<br />

o Content Types – This is a useful way of preventing streaming media and larger file types<br />

from being downloaded or accessed in order to protect bandwidth, storage and<br />

productive Web use. Rules can be configured for specific MIME (Multipurpose Internet<br />

Mail Extensions) types and categories as well as custom file types and categories.<br />

o Action – The Customers administrators are able to define the action that is performed<br />

when a Web request meets the conditions of a rule.<br />

Policy Stack and Processing<br />

Once rules have been created using ClientNet, each policy rule is placed into a rule ‘stack’<br />

which is then evaluated in order from top to bottom. When the Hosted Web Security service<br />

proxy receives a request, it passes the request to the policy engine for processing and validation.<br />

In order for a rule to be called on, the criteria of each rule above it must be examined<br />

first. For example, the client may have policy rules to block users from downloading content by<br />

URL categories or specific URL/IP addresses. In this case, the policy engine will first check if the<br />

requested IP/URL matches any rules which ask for that specific destination to be blocked. If a<br />

match is identified, the page will not be retrieved and the user will be redirected to a block page<br />

notifying them of the action taken by the service. If no match is found, a subsequent rule<br />

requiring MIME or File type content to be checked would be called upon next. The requested


141<br />

object would then be checked separately from the other objects on the page and would be<br />

allowed or disallowed based on the findings presented to the engine.<br />

The policy engine avoids the need for confusing exception-based block or allow lists from<br />

being inserted into each rule. It also allows for the use of a number of detailed rules that can<br />

handle business exceptions based on their order within the stack.<br />

When the Web Security.Cloud service identifies a Web traffic request which matches a<br />

policy, it will follow the default or custom rule set defined by the customers service<br />

administrator. Possible actions include allow, block, log, allow and log, block, and block and log.<br />

Web AntiVirus & AntiSpyware<br />

After passing through Web URL filtering, Web traffic requests are then transferred to Web<br />

AntiSpyware and AntiVirus services for analysis. The hosted service enables threats to be<br />

detected at the internet level in order to identify and block inappropriate content or malware.<br />

Web Security.Cloud starts by searching for known Web-borne threats. Web traffic requests<br />

are routed through multiple, commercially available, signature-based scanners in<br />

parallel. Traffic passed through the service is scanned for malicious content including viruses,<br />

trojans, spyware and adware.<br />

The scanners examine the requested traffic target for known threats that match virus<br />

signature files. If the scanner response is unknown, the process continues in the next scanner to


142<br />

look for any malware matches. The scanners are automatically and continuously updated to<br />

ensure that the most current virus definitions are being used.<br />

If a Web page request, or a request for a file to be downloaded from the Web, is perceived<br />

by Web AntiVirus or Web AntiSpyware to contain a potential threat, it is blocked and not<br />

delivered to the end-user. The end user will then receive a block page which can be customised<br />

to suit specific customer needs. The block page assists in making the end user aware of what<br />

has happened, and why action was taken by the service.<br />

Skeptic Heuristic Technology<br />

In order to detect new, ‘zero hour’ threats, Web Security.Cloud utilises predictive heuristic<br />

technologies built into a proprietary defence layer called Skeptic. Skeptic is used to<br />

determine if the requested Web traffic target contains any components of malicious<br />

code. Skeptic’s multiple patented technologies and thousands of rules are applied to analyse<br />

and detect new and emerging threats.<br />

To provide enhanced performance, when a new item of malware is identified by Skeptic, a<br />

signature is created to enable faster identification of the item for future instances of the<br />

threat. Unlike commercial anti-virus scanning engines, Skeptic cannot be downloaded and<br />

tested by cyber-criminals for exploits.<br />

Skeptic, also has access to information shared by the MessageLabs Email Security.cloud and<br />

Instant Messaging Security.cloud services to assist in the detection of converging threats<br />

(threats that leverage more than a single protocol). This extends the ability of Web


143<br />

Security.Cloud to efficiently address the evolving nature of threats. For example, threats that<br />

use URLs which link to malware and are sent within emails, but are executed using the Web.<br />

Skeptic proprietary heuristic techniques leverage the processing power of a cloud-based<br />

solution to protect the customer against treats spanning email, web and IM.<br />

An overview of Web Security.cloud functionality.<br />

See Figure 6 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

See Figure 7 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

Simplify management<br />

Web Security.Cloud uses a single, integrated management console for email, Web, and<br />

instant messaging. The console helps to simplify administration and lower total cost of<br />

ownership while providing increased visibility into user behaviour.


144<br />

Web Security.Cloud includes several reporting options to inform administrators of the<br />

service’s effectiveness and actions. Insight into the Customers end-user behaviour and service<br />

performance is enabled by the services dashboard, summary, detailed and scheduled reporting<br />

options. Reports are configurable to help provide the Customer with visibility, accountability<br />

and confidence in the effectiveness of the service.<br />

The Dashboard provides an at a glance view of the current service performance levels and<br />

notable activities. Dashboard graphs and charts show statistics for selected periods of time and<br />

include a summary of the volume of Web usage volume, blocked requests, filtered requests and<br />

top five blocked categories. Available timeline views range from 24 hours up to 12 months of<br />

service activities.<br />

Summary reports provide status updates and metrics in a convenient PDF format. The<br />

summary report contains graphs, tables, and key statistics on Web volume, user activity,<br />

blocked threats and blocked Web page requests which violated the Customers policy. These<br />

reports can be customised to reflect a fixed or custom date range, and data for these reports is<br />

available from the previous day to the last 12 months of the use of the service.<br />

Detailed reports are useful for in-depth service data analysis. Data can be downloaded in<br />

the Common Separated Values (CSV) format providing detailed service statistics. These CSV files<br />

can also be exported for more detailed analysis and to create custom reports.<br />

Data in the detailed reports includes information on the performance of individual aspects<br />

of the service (Web AntiVirus and AntiSpyware performance, Web URL Filtering performance,<br />

User browse time by URL category, User browse time by individual URL, User bandwidth usage<br />

by URL category, User bandwidth usage by individual URL Bandwidth by user, Browse time by


145<br />

user, the number of URLs visited by specific users, browse time or bandwidth by URL category or<br />

individual websites).<br />

Detailed reports can also be customised by specific users, groups, IP (or IP range) date<br />

ranges and domains. The date ranges available include the last 60 minutes, 12 hours, previous<br />

day, last 7 or 30 days.<br />

Audit Reports enable the client to view detailed information on individual users and are<br />

provided in a PDF format. Audit reports include the same customisations that are available with<br />

the detailed reporting option. It is also possible to specify additional report criteria for more<br />

granular data (Categories, rules triggered and destination URLs)<br />

Scheduled reports are available to supply regularly updated information about the activities<br />

of the service. These reports are sent by email to the Customers service administrators and can<br />

be configured to supply information either globally or by domain. The frequency of the report<br />

can be customised and scheduled to occur on a daily, weekly, or monthly basis.<br />

Flexible Web Acceptable Use Policies (AUPs)<br />

Web Security.Cloud helps the Customer enforce Web acceptable use policies.<br />

Roaming User Agent<br />

Web Security.cloud has an optional roaming user agent capability (known as Smart Connect)<br />

that helps the Customers administrators to enforce their organisation’s policies and protect<br />

users who are outside the corporate network.<br />

See Figure 8 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’


146<br />

An overview of Smart Connect Roaming Agent functionality.<br />

Smart Connect uses a locally installed agent-based technology that works in conjunction<br />

with the Web Security.Cloud service infrastructure to protect roaming Web users.<br />

The agent draws from the following capabilities to protect users and enforce policies<br />

without noticeable delay:<br />

Network Environment Discovery – Smart Connect understands differences in end user<br />

networking environments and adjusts its behavior accordingly. For example, the agent forwards<br />

traffic in a passive state when in a captive portal (such as a Wi-Fi hotspot), to allow payment<br />

authorisation. Once the payment process is complete, the agent automatically switches to an<br />

active state by redirecting the user Web traffic to the Symantec Hosted <strong><strong>Service</strong>s</strong> infrastructure.<br />

Location awareness – Smart Connect uses a geographic location capability to identify a<br />

user’s location and then connect them to the recommended infrastructure Point of Presence<br />

within the Symantec.cloud global infrastructure. This helps to ensure the best possible<br />

performance can be provided.<br />

End user transparency – Smart Connect provides a consistent sign-on experience regardless<br />

of whether the user is roaming off-LAN or connecting through a Web gateway within the<br />

customers corporate LAN environment.<br />

Added security – Smart Connect protects Web browsing via a Secure Sockets Layer (SSL)<br />

channel that is established between the agent and Symantec.cloud infrastructure. All


147<br />

communication occurs once both agent and infrastructure have mutually authenticated using<br />

X.509 digital certificates.<br />

Smart Connect not only provides protection against Web-borne malware for users when<br />

they are outside of the corporate network, but also reduces the risk of a system becoming<br />

compromised and bringing malware back into the Customer’s network.<br />

Reduce IT time and costs<br />

Implementation of Web Security.Cloud is fast and easy. There is no software or hardware to<br />

buy, install or configure which makes the upfront cost of deployment far less than an in-house<br />

system. This enables the Customer to achieve a simpler network with less hardware.<br />

The hosted services are operated at the Internet level and managed by<br />

Symantec.cloud. The services provide the ability for the Customer to configure each service to<br />

suit organisational policies and needs. Symantec.cloud’s online portal, ClientNet, provides a<br />

single, central interface for the Customer to access and control hosted services.<br />

Once installed and configured to suit specific client requirements, the hosted services run in<br />

the background providing 24/7 protection. Symantec.cloud will manage all ongoing<br />

maintenance such as updates, capacity planning, and service performance.<br />

Increase end-user productivity<br />

Web security.cloud assists in optimising network bandwidth to process securely filtered<br />

Web traffic. Symantec.cloud’s globally distributed architecture supports minimal latency and


148<br />

enables the Customers end users to engage in secure, high quality web browsing with minimal<br />

delay.<br />

Web Security.cloud services help to protect organisations from Web misuse and help to<br />

prevent wasted bandwidth and reclaim end-user productivity.<br />

Continuous and automated hosted service updates help to eliminate the loss of the client<br />

employee productivity associated with downtime and unacceptable Web usage. Employees are<br />

free to focus on legitimate Web activities that help to drive business.<br />

R) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for email scanning and filtering services<br />

Cloud-based Email AntiSpam and AntiVirus Protection<br />

The Contractor provides antivirus services through it partnership agreement with<br />

Messagelabs (Symantec)<br />

Email Security.cloud includes an email antivirus service (known as Email AntiVirus.cloud)<br />

that provides multi-layered protection to stop one hundred percent of known. The multi-<br />

layered architecture consists of proprietary Skeptic heuristic technologies combined with<br />

multiple commercial scanners.


149<br />

Email AntiVirus.cloud delivers ‘zero-hour’ protection by identifying and combating new virus<br />

threats in real time. Another unique feature of the service is a ‘link-following’ capability which<br />

utilises commercial scanners and Skeptic technology to check every URL within customers email<br />

for malware or virus-bearing destinations. The service is configurable, with a range of actions<br />

for identified viruses and malware. Support is offered for all email messaging platforms<br />

including Microsoft Exchange, Domino, Groupwise, and Linux.<br />

Email AntiVirus.cloud is backed by a <strong>Service</strong> Level Agreement that offers a performance<br />

level of of 99.999%<br />

Email AntiVirus.cloud and Email AntiSpam.cloud<br />

See Figure 9 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

Email Security.cloud also includes an email AntiSpam filter service (known as Email<br />

AntiSpam.cloud) that provides customers with a proven, industry-leading spam filtering


150<br />

solution. The spam filter service uses multiple layers of protection including Skeptic heuristics to<br />

protect against both established and emerging spam techniques. Protection is provided by<br />

scanning within the email header, subject and body, as well as supported Microsoft ® Office,<br />

PDF attachments and compressed file types. Word list thresholds allow customers<br />

administrators to determine how often keywords or phrases can occur before a rule is<br />

triggered. The service also offers extended character list recognition of keywords or phrases in<br />

non-western characters so emails can be scanned for inappropriate content regardless of their<br />

geographical, cultural or linguistic source. Symantec.cloud scans email at the internet-level and<br />

blocks 99 percent of spam before it enters the customers network.<br />

See Figure 10 in ‘BT_<strong>PSN</strong>S_Appendix1_Award<br />

Questionnaire_SectionB_v2.0 graphics’<br />

Email AntiSpam.cloud provides multiple layers of filtering.<br />

As a hosted solution, implementation of Email Security.cloud is a very simple and quick<br />

process. With no software or hardware to buy, install or configure the customer can achieve a<br />

simpler network with fewer servers/appliances.<br />

All Symantec.cloud services are provided at the Internet level and managed by the<br />

Contractor and Symantec.cloud. The customer can configure each service to suit organisational<br />

policies and needs. Symantec.cloud’s online portal, ClientNet, provides a single central location<br />

for the customer to access and control all of the information for their hosted services.


151<br />

The hosted service leverages an advanced cloud-based infrastructure consisting of 15 highly<br />

available data centres located across 4 continents. The data centres providing this global<br />

infrastructure footprint are load-balanced and housed in secure, well-established<br />

telecommunications centres located at major Internet exchange points. The load-balanced data<br />

centres make it possible for Symantec.cloud to handle Internet traffic spikes and to deliver<br />

redundancy and resilience. The Symantec.cloud servers also run at an average of 33 percent of<br />

their maximum capacity allowing for unexpected spikes in traffic.<br />

The Clientnet online portal provides the ability to centrally manage and control hosted<br />

services on site or from virtually any internet enabled location.<br />

See Figure 11 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0<br />

graphics’<br />

The Email Security.cloud AntiVirus and AntiSpam services are configurable using the<br />

ClientNet interface. A range of actions are available for identified viruses and malware. The<br />

AntiSpam service enables the Customer administrators to select from custom and/or public<br />

block lists, as well as choose the appropriate actions for mail identified by these filters.<br />

See Figure 12 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’


152<br />

The ClientNet management interface allows for flexible AntiSpam and AntiVirus<br />

configuration<br />

ClientNet provides the Customer with a dashboard view providing summary data on how<br />

the service is performing such as levels of spam and viruses stopped.<br />

Once installed and configured to suit specific Customer requirements, the hosted services<br />

run in the background providing 24 x 365 protection. Symantec.cloud services will take care of<br />

all ongoing maintenance such as updates, capacity planning, and service performance.<br />

Continuous and automated hosted service updates help to eliminate the loss of the user<br />

productivity associated with downtime and reading and deleting unsolicited messages.<br />

Flexible Reporting<br />

Email AntiSpam.cloud comes with a range of flexible reporting options including dashboard<br />

summary, detailed, and scheduled reports. Reports can be scheduled for automatic delivery<br />

with selected data points, a PDF summary report can be downloaded, or detailed spreadsheets<br />

can be downloaded.<br />

See Figure 13 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’


153<br />

Reports display performance by service and are configurable to the user level<br />

for detailed per-user analysis<br />

Prevent data loss and reduce exposure to legal risk<br />

Email Security.cloud - Email Content and Image Control <strong><strong>Service</strong>s</strong><br />

With the potential for confidential data loss to result in litigation, regulatory fines, or loss of<br />

reputation and business, Email Security.cloud aims to provide the Customer with reduced<br />

exposure to legal risk. The content scanning services also help to ensure that any of the<br />

Customers proprietary and confidential documents, content and images do not leave the<br />

organisation without authorisation or are mistakenly distributed to incorrect recipients.<br />

Delivered as hosted services, Email Content Control.cloud and Email Image Control.cloud<br />

solutions are quick and easy to set up, automatically updated and backed by a service level<br />

agreement.<br />

Email Security.cloud allows customisable control over all email content entering and leaving<br />

the Customer. The Content Control services allow the Customer to put measures in place that<br />

allow authorised users to receive and send sensitive content, while un-authorised users will be<br />

stopped at the network perimeter from either sending or receiving the same content. Email<br />

Image Control.cloud allows the Customer to create preventative filters to control and monitor<br />

intellectual property or confidential information contained in images or diagrams thus helping<br />

to safeguard the most valuable pieces of the Customers information from falling into the wrong<br />

hands. Flexible customisation of hosted service settings provides the Customer with the ability<br />

to enforce compliance with acceptable usage policies.


154<br />

Identify and block inappropriate email content and images<br />

Email Security.cloud uses content and image control services to provide protection against<br />

both email content and images of an offensive or inappropriate nature to ensure they do not<br />

reach user inboxes.<br />

The Email Content Control.cloud scans emails and attachments for confidential or<br />

inappropriate text-based content within emails and attachments sent or received by the<br />

Customers employees. Scanning and analysis is performed on all email components including<br />

the header, subject, email body and attachments. Comprehensive rule-building processes allow<br />

the Customer to quickly and easily establish policies and actions for matching email<br />

content. The service scans within subject, header and body as well as PDF, Microsoft ® Office and<br />

compressed file attachments. Content that matches the Customer created rules is subject to a<br />

range of configurable actions while approved messages pass through to their intended<br />

recipients. A customisable word list threshold allows the Customers administrators to establish<br />

how many occurrences of keywords or phrases must be present before a rule and action are<br />

applied. The service also provides extended character list recognition to allow for rules and<br />

actions to be applied to non-western characters.<br />

The Email Image Control.cloud service scans emails and attachments to identify, control and<br />

block inappropriate images contained within emails and Microsoft ® Office and PDF documents<br />

attached to or embedded in emails entering or leaving the clients network. Multi-layered<br />

technologies have been designed to detect adult or other inappropriate image<br />

content. Powered by an Image Composition Analysis scanning engine, the service is particularly


155<br />

suited for the detection of pornographic images. The service is highly configurable, allowing the<br />

Customer to determine sensitivity levels, actions and approved sender and recipient<br />

lists. Signature databases are also customisable to allow the Customers administrators to create<br />

local databases of images that are proprietary or specific in nature. An additional feature<br />

delivering further increased accuracy is the optional global image signature database. This<br />

database is submitted by the MessageLabs client community and maintained by<br />

Symantec.cloud. The feature offers the Customer access to a database of images that are<br />

emerging as newly discovered inappropriate images.<br />

Clean inboxes enable the Customers end users to remain focused on work and not<br />

distracting, offensive or inappropriate content and images. Email Image Control.cloud and Email<br />

Content Control.cloud services help to protect the users from offensive, unwanted images and<br />

content from both a productivity and legal perspective.<br />

S) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for Firewalls, intrusion and spyware<br />

detection services<br />

The Contractors Managed Firewall service protects the perimeter of an organisation’s<br />

private network at the point it meets the Internet. It enforces their security policy, and ensures<br />

tightly controlled access from the Internet to their resources, according to the organisation’s<br />

needs – for example, public web servers, remote access for their users, etc.<br />

The operator provides protection for the organisation’s network


156<br />

The Contractor provides a range of offerings as part of its managed firewall service, from<br />

design and policy definition, through implementation, to full 24 x 365 proactive management,<br />

monitoring and reporting. The service is managed by highly specialised engineers and analysts in<br />

the Contractors accredited Security Operations Centres (SOCs).<br />

Firewall technology<br />

The Contractors Managed Firewall service uses technology from Check Point and Cisco.<br />

The service is based on dedicated hardware appliances that are specifically designed for this,<br />

in order to provide the most stable and secure solution.<br />

The service protects an organisation’s private network from Internet-sourced threats.<br />

Hackers download routinely available software and then scan organisations’ networks for<br />

vulnerabilities<br />

The Contractor recognises a balance is required when connecting to or through the internet<br />

so that the benefits can be realised whilst the risks are mitigated. To this end, great care is taken<br />

to understand each organisation’s business requirements and ensure these are implemented as<br />

best-practice configuration. Therefore the Contractor can define access permissions tightly and<br />

accurately.<br />

Key areas of firewall functionality include:<br />

o Site -to-Site IPSec VPNs: to establish secure connectivity between an organisation’s<br />

sites over the Internet; where this is a more appropriate networking option for the<br />

organisation than dedicated private network connectivity.


157<br />

o Remote Access IPSec VPNs: to provide access for an organisation’s users whilst they are<br />

away-from-base, to defined resources on their network. The Contractor will interface<br />

with each organisation’s authentication methodology – e.g. Radius.<br />

o DMZs (De-Militarised Zones): provide the best security for an organisation’s key<br />

applications, enabling them to be accessible from the Internet under tightly-defined<br />

conditions, whilst denying access from the Internet to other resources on their<br />

network.<br />

o Intrusion Prevention (Check Point SmartDefense): this is an option that will scan traffic<br />

for a range of known attack signatures, and deny that traffic where appropriate.<br />

CPE Options<br />

There are 3 CPE options, for Customers to choose from:-<br />

Contractor Takeover<br />

The Contractor can, takeover management and monitoring of certain customer installed CPE<br />

solutions.<br />

Client Owned<br />

The Contractor will provide the Customer with a specific CPE kit list which will meet the<br />

contractors standard solution designs, so that they can procure and purchase the CPE<br />

themselves. The Contractor will then install, configure and provide on-going management and<br />

monitoring of the solution.


158<br />

CPE Take Over<br />

The Contractor can take over the management / maintenance until the vendor no longer<br />

supports it. Maintenance for these devices is bought on a yearly basis, with the minimum<br />

contract being for one year.<br />

Features and benefits<br />

Features:<br />

The service includes expert deployment and is tailored to match each customer’s specific<br />

requirements.<br />

o Optimised policy configuration: the contractors experts specialise in firewall<br />

configuration and will implement best-practice approaches for security and technical<br />

performance. Firewalls are proactively tested as further assurance of security, both on<br />

set-up and following in-life changes.<br />

o Network configuration: the contractors managed firewalls will support multiple DMZs<br />

(“De-Militarised Zones”) to best-protect key applications, such as Internet-facing web<br />

servers. It will also provide a range of IPSec VPN options to enable secure<br />

communications over the Internet, for example with an organisation’s firewalls on other<br />

sites to create a private network, or to provide inbound remote access.<br />

o <strong>Service</strong> installation: The Contractor can deploy complex solutions to customers’ sites<br />

globally, with project management and service commissioning.<br />

� The contractors service includes management, as well as global 24 x 365<br />

support.<br />

o <strong>Service</strong> management: The Contractor’s accredited security team will proactively<br />

manage customers’ firewalls 24 x 365. The management processes include in-life policy<br />

updates and application patches.<br />

o Onsite support: The Contractor’s IT support partners can provide onsite attendance<br />

around the world, to replace faulty equipment and restore service.<br />

o Reporting: detailed reports can be accessed through a secure customer portal,<br />

providing information on system health and threat activity. These can be used to<br />

analyse user activity and provide assurance of hacking prevention.<br />

o Vendor relationships: The Contractor has strategic relationships with key vendors,<br />

enabling competitive pricing and the best support.


159<br />

o Flexible and scalable offerings: The Contractor offers a range of scalable, hosted or<br />

customer-premise solutions, designed to meet each organisation’s full range of<br />

requirements.<br />

o <strong>Service</strong> resilience and reliability: Our resilient solutions help protect against prolonged<br />

service downtime.<br />

T) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> <strong>Descriptions</strong> for authentication and access<br />

management services<br />

follows:<br />

The Contractor provides a number of authentication and access management services as<br />

o URU service<br />

o Fraud reduction service<br />

o Authentication management service<br />

o Bespoke professional services<br />

URU service<br />

The Contractors Assure URU service is an innovative web-based service to help<br />

organisations fight identity fraud and attempted money laundering. It provides an easy way to<br />

verify identity details taken from a variety of paper documents. This data is checked against<br />

some of the most comprehensive and reliable data sources available in the UK, in real time,<br />

providing an easy-to-understand response which can be used to decide whether to accept the<br />

consumer’s application.


160<br />

As the system is automated, the service avoids any lack of consistency due to the<br />

subjectivity of operatives.<br />

Key Features<br />

o easily-accessible online service,<br />

o securely hosted and managed by the Contractor.<br />

o compares submitted name, address and other consumer information (e.g. driving<br />

licence, passport details) against a wide range of databases, cross-checking the data<br />

o providing an easy-to-understand summary of the results,<br />

o Typically completed within 3 seconds per enquiry.<br />

Fraud reduction <strong>Service</strong><br />

The Contractors Assure Fraud Reduction service is an automated fraud screening service,<br />

for alerting Customers in real time to the risks of payment transactions.<br />

It is provided as a web service that integrates directly with the Customers’ e-commerce<br />

application and provides risk scores alerting the Customer to accept, reject, or review the<br />

transaction.<br />

The service assesses the risk of a transaction by screening the transaction against the<br />

Customers’ fraud profile and validating information related to the consumer, the transaction,<br />

and past behaviours against third party anti-fraud services.


161<br />

Key Features<br />

o Contractor hosted service<br />

o Fraud profile against multiple anti-fraud services<br />

o Risk scores are returned to client<br />

The Contractors Assure Fraud Reduction works by taking the supplied and derived<br />

parameters associated with each transaction submitted to the online application and processing<br />

them through a series of rules and policy checks, each of them contributing to an overall risk<br />

score. The parameters examined will include:<br />

o the origin of the transaction (using IP geo-location)<br />

o the user’s transaction history<br />

o the device used to originate the transaction (using device recognition technology)<br />

as well as supplied parameters such as:<br />

o the card used in the transaction<br />

o the value of the transaction<br />

o the delivery address<br />

o the email address


162<br />

o the velocity of the transaction v’s earlier transactions from the same originator<br />

The context-based, fine-grained risk analysis allows the service to make intelligent real-time<br />

decisions about the risk associated with online transactions. Those determined to be ‘high-risk’<br />

can be blocked, quarantined for later prioritised review, or automatically ‘stepped up’ to<br />

perform further validation of the end-customer’s identity details. Every risk-assessed transaction<br />

can be re-reviewed (prior to any goods being shipped or monies being paid out) via an online<br />

reporting and case-handling interface.<br />

Risk assessments are performed in real-time and based on user behaviour, location and<br />

device recognition as well as transaction-specific parameters, all of which are transmitted to the<br />

Contractors Fraud Reduction service in simple web calls. The Contractors Assure Fraud<br />

Reduction returns risk scores in real-time along with full details of how the risk score was<br />

determined so the customer’s application can make a fine-grained transaction handling<br />

judgment.<br />

The Contractors Assure Fraud Reduction works in collaboration with the Customer’s existing<br />

fraud tools such as Verified by Visa, MasterCard SecureCode, Address Verification <strong>Service</strong>, and<br />

CVV checks.<br />

The Contractor has built its solution around a service bus architecture. This means that the<br />

Contractor can add additional anti-fraud measures to the service as they become available,<br />

without impacting established customer interfaces. Currently the Contractor can include a risk<br />

assessment of the card used in the transaction, an identity verification check via the Contractors


163<br />

Assure URU and IP address geo-location checks. The service bus aggregates the returns from the<br />

services called to ensure that a single, comprehensive risk assessment is returned to the client<br />

application for every transaction.<br />

Authentication Management service<br />

The Assure Authentication Management service provides online authentication of one time<br />

passwords generated by software or hardware tokens. The service supports a range of one-time<br />

password tokens, including OTP via SMS, knowledge based authentication, image based<br />

authentication, and other authentication options.<br />

The Contractor provides a service for<br />

o issuing and managing strong authentication tokens;<br />

o the provisioning, rollout, end-customer issuance, and on-going authentication of both<br />

software and hardware tokens.<br />

The Contractor’s service uses ActivIdentity’s 4Tress platform. ActivIdentity provides access<br />

to a wide range of authentication mechanisms and supports channel by channel authentication<br />

policies.<br />

Key Features<br />

o The platform architecture is resilient and operates on a 24x365 basis.<br />

o Managed firewalls protecting all access to the platform.


164<br />

o Network-based Intrusion Detection (NBID) across all network interfaces to the platform.<br />

o Physically secure server farms.<br />

o Signature Host-based Intrusion Prevention (HBIP) across all platforms.<br />

o Hardened operating systems.<br />

o All operational and administrative access to the production platforms is carried out the<br />

Contractors staff and requires token-based 2FA authentication.<br />

o Tamper-evident audit logs.<br />

o Users access an individual customer instance of the authentication application with data<br />

held in separate backend schema on a per-customer basis<br />

o Assure Authentication Management is accessed using synchronous web-service calls.<br />

o Dedicated network connections option.<br />

The Contractor has capabilities in providing managed Single Sign-On <strong><strong>Service</strong>s</strong> and Federated<br />

Identity Management. The Contractors Identify Access Management services are consultancy<br />

and professional services led projects utilising ‘Quick Start’ assets. The Contractor has<br />

partnerships with several suppliers that include Oracle (Oracle IDM) and Computer Associates<br />

(CA Site minder).


165<br />

Key Features<br />

o A single Sign-on <strong>Service</strong> that allows access to customer secure applications that can be<br />

tailored for an individual customer or for a community of customers<br />

o <strong>Service</strong> designed to fulfil the <strong>Service</strong> levels for customers’ specific business<br />

requirements.<br />

The capability can provide application sign-on services for an individual enterprise or a<br />

community of organisations and users for single or two factor authentication including One<br />

Time Passwords.<br />

Federation services are capable of supporting the integration of different trust domains and<br />

supporting a range of industry standard federation standards e.g. Security Mark-up Language<br />

(SAML), WS-Federation and Liberty Alliance.<br />

U) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for web and application sign on services<br />

services<br />

The Contractor provides the following services supporting its web and application sign on<br />

o Logical Access Integration<br />

o Single Sign On<br />

Logical Access Integration


166<br />

The Contractor’s Logical Access Integration service offerings are designed to consolidate the<br />

digital access components of an organisation's security infrastructure.<br />

The Contractor will ensure and enforce more consistent security policies throughout your<br />

enterprise, applications, desktops, PCs and remote workers, with a wide range of multi-vendor<br />

resources and capabilities.<br />

The service will Identify users and permit access or transactions.<br />

Logical Access Integration offerings provide both web-based applications and hardware<br />

backed by globally trusted identity and access management resources and expertise.<br />

Single Sign On (SSO)<br />

This is a managed service provided by the Contractor on a bespoke basis that reduces the<br />

number of passwords required, providing a single and secure access point to an organisation's<br />

applications. Single Sign On delivers:<br />

o Faster, easier and more convenient user access<br />

o Reduced incidents of forgotten passwords<br />

o Less costly intervention through the helpdesk<br />

o Increased security with improved provisioning and de-provisioning<br />

o Enhanced support for remote workers<br />

o Easier auditing of access controls for regulatory compliance


167<br />

The Contractor works with multiple suppliers to deliver a variety of SSO solutions. These<br />

include ActivIdentity, Oracle, Passlogix and Sun to ensure compatibility with an organisation's<br />

existing applications and desktop. This enables the following capabilities:<br />

o Enterprise Single Sign On: deploy SSO software to individual PCs to remember user<br />

names and passwords, particularly where applications cannot be easily web-enabled.<br />

o Web Single Sign On: a web-based service that creates a centralised repository of users<br />

and their authorisation details so organisations can manage access.<br />

o Federated Single Sign On: enables users to access resources located in other security<br />

domains or organisational domains.<br />

V) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for mail and messaging services<br />

Secure mail<br />

The Contractors Assure Secure Mail is a subscription-based service that enables<br />

organisations to benefit from high-level email encryption technology without having to install<br />

complex software or hardware. The service supports commercial confidential email messages to<br />

any email address in the world, and enables secure intra-office communication.<br />

Integration<br />

The only software needed to install is the plug-in, which is compatible with Microsoft Outlook,<br />

Outlook Express and Lotus Notes email clients. It is a short integration process, and once<br />

installed, its single-click operation ensures that there is no need for complex training. Assure<br />

Secure Mail can also be used with a BlackBerry or similar portable device, so mobile workers can<br />

send and receive information securely.


168<br />

Managed infrastructure<br />

Encrypted messages are managed through a secure infrastructure platform. The number of<br />

service users can be increased or decreased by your system administrator..<br />

Single click operation<br />

The ‘secure’ button, on the ‘compose’ screen of the email client, enables users to send<br />

encrypted mail to any other email address. Reading encrypted mail sent by another subscriber<br />

requires the user to.<br />

Message Pickup Centre<br />

Users receiving an encrypted email are instructed to visit the Message Pickup Centre. This is a<br />

secure website that requires the recipient to enter a unique password, which will then enable<br />

the recipient to read the encrypted message and view any attachments online. The Message<br />

Pickup Centre can feature corporate branding, and enables email users across the globe to<br />

receive messages encoded by Assure Secure Mail<br />

Assure Secure Mail is based on the industry-trusted standards PKI (public key<br />

infrastructure), X509 and S/MIME (Secure/Multipurpose Internet Mail Extensions). This enables<br />

it to support digital signatures for sender authentication, message integrity and non-<br />

repudiation, which is not possible with PGP (Pretty Good Privacy)-based services.<br />

Simple installation<br />

Installation of Assure Secure Mail across the customer organisation is delivered as a pre-<br />

packaged Microsoft Installer (MSI). The MSI can then be installed using common enterprise<br />

application management tools such as Microsoft SMS (Systems Management Server) or<br />

Tivoli.The software does not have to be installed on each machine separately, and has an


169<br />

automatic update function is builtin. User-controlled encryption<br />

The Assure Secure Mail enables the user to be responsible for their communications.<br />

End-to-end encryption<br />

Assure Secure Mail offers true end-to-end encryption. Messages must be secured on the<br />

desktop of the sender, and unlocked on the recipient’s computer. Continuous encryption is the<br />

rule, rather than the exception, so any stored messages must be decrypted each time they are<br />

read.<br />

Administration<br />

Administrators using a simple user interface can add, suspend, remove users, and view and<br />

manage credentials. Bulk enrolment across your enterprise is available using a CSV (comma<br />

separated value) file with the email address, first name and last name of the proposed users.<br />

Secure Content Management<br />

Available as an add-on to the service, Secure Content Management is designed to reside in an<br />

enterprise or hosted email messaging environment. A universal application programming<br />

interface for third-party email hygiene and filtering solutions enables scanning of both inbound<br />

and outbound encrypted messages. Plug-in extensions mean that individual hygiene and<br />

filtering solutions can be added quickly and efficiently.<br />

Message Exchange<br />

The Contractors Assure Message Exchange is a web-based service that provides a highly<br />

secure means of sending sensitive data to groups via email. It uses public key cryptography and


170<br />

digital signatures to ensure emails are not intercepted or tampered with in transit. Routing<br />

messages through this portal enables customers to safely share information with authorised<br />

colleagues, partner organisations, suppliers and clients across the globe.<br />

When a secure message is sent, recipients are notified with an alert to their nominated<br />

email account. Members can have their own personal Assure Message Exchange inbox, while<br />

non-members and recipients outside your organisation are directed to a secure message pick-up<br />

centre. Assure Message Exchange, has no impact on user desktops and existing email messaging<br />

services, and is ideal for closed user communities.<br />

A management console is available to system administrators to enrol or disable end-users<br />

and reset passwords. Assure Message Exchange can also be configured to give all users within a<br />

messaging community equal service feature rights. Alternatively, the service can assign certain<br />

end-users a reduced service, such as basic read-only access, at a reduced subscription rate.<br />

Becoming a member requires simple web registration. Once registered, users are assigned<br />

authentication keys to access. Assure Message Exchange. Members can:<br />

o Access their personal Message Exchange inbox by entering their email address and<br />

authentication password.<br />

o Use point-and-click folder navigation to compose and open encrypted messages.<br />

o Receive email notification in their inbox each time they are sent an encrypted message<br />

and simply click the link to be taken directly to the Assure Message Exchange portal.<br />

o Collect, reply, forward and store all their encrypted messages and attachments.


171<br />

o Send encrypted messages to non- Assure Message Exchange members, who are directed<br />

to a secure message pick-up centre to read and reply to the sender, depending on their<br />

Assure Message Exchange access rights.<br />

The Contractors Assure Message Exchange helps customers create a highly secure,<br />

collaborative environment for sharing confidential information electronically. Using data<br />

encryption techniques – including public key cryptography and digital signatures – and a secure<br />

web portal to send and receive private messages, customers can:<br />

o Set up group collaboration and communities of interest in which you can exchange<br />

information without risking data integrity.<br />

o Use strong password authentication and reminders to ensure confidential information<br />

does not fall into the wrong hands.<br />

o Ensure emails are tamper-proof using digital signatures that prevent sender identity<br />

spoofing.<br />

o Keep secure messages encrypted, even when they are stored in the Assure Message<br />

Exchange portal, preventing data leaks from internal or external threats.<br />

o Generate audit trails to review, track and monitor Assure Message Exchange<br />

communications to comply with data security regulations.


172<br />

Assure Message Exchange is available as an on-premise or managed and hosted service.<br />

Requiring no end-user training, its flexible management console and easy-to-use web portal,<br />

enable customers to:<br />

o Assign hub community members full service privileges while restricting spoke users to<br />

read-only or reply-to-sender rights.<br />

o Deploy secure service quickly with bulk enrolment options for large user groups, while<br />

easily expanding or reducing the user base as required.<br />

o Rely on redundant hosted capabilities to enable uninterrupted service.<br />

o Increase brand recognition with a service that can be branded with customer logo<br />

throughout.<br />

Enables the exchange of confidential information with colleagues and clients without<br />

putting data integrity at risk. Assure Message Exchange uses trusted public key infrastructure<br />

and secure/multi-purpose Internet mail extensions that enable communities of interest to:<br />

o Keep private data secure: send sensitive information by email to interested parties<br />

through a secure encryption service to safeguard data.<br />

o Prevent unauthorised access: mitigate the risk of internal and external threats to data<br />

security with password protection of encrypted emails.<br />

o Know who you’re dealing with: ensure emails are sent to and received from authorised<br />

users with digital signatures that authenticate sender identity.


173<br />

o Encryption best practice: protect the privacy of confidential emails, even when “at rest”<br />

in the mail store, as data remains encrypted.<br />

o Meet compliance regulations: safeguard corporate intellectual property and<br />

use clients’ private information responsibly.<br />

o Gain a competitive edge: increase data security to improve brand reputation.<br />

o Reduce operational costs: email sensitive data instantly and with confidence,<br />

eliminating communication delays and the need for couriers or postal services.<br />

W) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for real time information services<br />

The Contractor’s IPTV service consists of the following components:<br />

o Acquisition and encoding of real-time TV signals from Terrestrial TV, Satellite and Private<br />

sources<br />

o Transmission of live video from outside events and press conferences<br />

o Provision of private and temporary TV studios, including production facilities and<br />

experienced staff<br />

o Encoding of video into live streaming formats including Windows Media and live MPEG-2<br />

Transport Stream (MPEG-2 TS)<br />

o Quality of <strong>Service</strong> engineering of existing IP networking equipment


174<br />

o Video recording and storage, including content distribution for replay<br />

o Provision of websites for both internal and external use containing live video<br />

The Contractor will provide service using equipment from Cisco and Motorola.<br />

The Contractor can also supply, via reseller agreements with major providers, News and<br />

Financial Information <strong><strong>Service</strong>s</strong> delivered in real time over high performance dedicated<br />

infrastructure.<br />

The Contractor can design and operate custom build XML based services reporting on Real<br />

Time information feeds available to the Contractor and or the Customer. These can include<br />

Twitter and RSS feeds.<br />

X) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for desktop messaging<br />

The Contractors Secure Message Exchange (SMX) is a web-based portal that allows<br />

communities of interest to exchange information privately. The messages use trusted Private<br />

Key Infrastructure (PKI) and Secure Multipurpose Internet Mail Extensions (S/MIME) for<br />

encryption and digital signatures.<br />

o Registered members of SMX can securely send, receive and reply to encrypted<br />

messages, including data attachments<br />

o Non-members receive and reply to encrypted messages via a secure web-based message<br />

pick-up centre


175<br />

o SMX members are notified once they receive an encrypted message via email<br />

The messages stay encrypted when stored on the SMX web based portal. Messages are<br />

digitally signed, such that a user can be sure that the message has originated from the right<br />

person. The logging facility enables messages to be tracked back to their originator, confirms<br />

that the message has been read and allows searching based on dates, times and subject. The<br />

service also allows users to confirm that their message has been received and read. A key<br />

escrow facility allows administrators to recover the encryption key of staff who are no longer<br />

employed.<br />

SMX is a “Cloud” Solution that does not require any additional client software or hardware.<br />

The enrolment process involves the administrator sending an email request for enrolment to the<br />

user. The user then self-enrols from a web interface. Users can be enrolled in bulk with groups<br />

pre-set up for distribution within communities.<br />

The appearance of Secure Mail can be modified to display the Customer’s logo and branding<br />

Direct communication between client and user within a branded environment.<br />

Y) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description for messaging via email, SMS, pager and<br />

mobile or fixed line telephone<br />

The operators integrated SMS Hubbing is a service for mobile operators to exchange 1 way<br />

machine to peer and 2 way person to person SMS. Traditionally mobile operators have needed<br />

to sign individual interconnect agreements in order to exchange international SMS, but by


176<br />

interconnecting with an SMS Hubbing partner, customers can benefit from the range of<br />

connectivity using just a single agreement with the Contractor. The Contractor is also able to<br />

manage these relationships on behalf of the customer. The Contractor will sell SMS Hubbing as a<br />

White Label <strong>Service</strong> in partnership with Tyntec.<br />

This outbound SMS service provides reliable and secure SMS sending to practically all GSM<br />

networks worldwide through a single messaging interface.<br />

The Contractor’s SMS Hubbing service provides bulk handling of text messages to multiple<br />

mobile service provider networks. The messages can be sent via Short Message Peer to Peer<br />

Protocol (SMPP) or via a web browser interface.<br />

The service comprises:<br />

o 1-way service to mobile.<br />

o 1-way service from mobile<br />

o 2-way service for interactive applications.<br />

SMS Hubbing can also be combined with the Contractor’s One Managed Microsoft service to<br />

create bespoke solutions covering a variety of communications channels.<br />

Target consumers:<br />

SMS MT (one way messaging)


177<br />

1. Anyone who is interested in increasing their international footprint and in parallel creating<br />

revenues with their subscribers by offering quality SMS – without worrying about the<br />

logistics needed to provide such a service<br />

2. Targets: Carrier for reselling to Enterprises (e.g. Banking, Airline area), Aggregators,<br />

Marketing campaign companies, Mobile Network Operators (MNOs) and Mobile Virtual<br />

Network Operator (MVNOs)<br />

3. Operators and Aggregators need reliable sending facilities, insight into the transmission<br />

path and clear status feedback for every message sent<br />

SMS IMT (two way messaging)<br />

1. Large Carriers seeking a cost effective alternative to the maintenance of countless roaming<br />

agreements for SMS<br />

2. Carriers facing interoperability due to inter standard roaming and/or Mobile Number<br />

Portability (MNP)<br />

3. New entrants seeking operability right away<br />

4. Targets: MNOs, MVNOs, Carrier for reselling<br />

5. Operators need a reliable hub to connect to – with standardised access points and an easy<br />

to manage tool for setting up connections including checking the status of existing<br />

connections<br />

Contractors capabilities


178<br />

SMS MT 1 way<br />

o TynTec’s platform has proven reliability throughout its 6-year existence and billions of<br />

SMS sent / received to >300 customers across vertical sectors worldwide<br />

o TynTec can provide message status feedback for all stages of the sending process<br />

o TynTec’s messaging platform provides 1 interface (available for HTTP or SMPP) realising<br />

1 contract and 1 bill for reaching 540 networks<br />

SMS IMT 2 way<br />

o TynTec’s Hubbing platform offers SS7 or SMPP access and a web-based connection<br />

control portal<br />

o TynTec’s Hubbing platform provides 1 interface = 1 contract = 1 bill – for reaching 508<br />

networks TynTec supports Hubbing customers with customised reporting for all aspects<br />

of message handling<br />

o MNOs and Carrier may combine IMT and MT to optimise the coverage<br />

o Genuine GSMA OC-compliance<br />

o Maximum 2-way coverage by peering with other SMS hubs<br />

o Only successfully delivered SMS are invoiced<br />

o Only outgoing SMS are invoiced


179<br />

o Using sophisticated Anti-Spam filtering, using Tyntec’s unique and individually written<br />

software<br />

o SMPP / SS7 conversion provides flexibility<br />

o Large scale SMS messages can be sent within low latency times<br />

o All message types and all originator types are supported within all networks<br />

o Delivery Receipts are provided for each message in real-time, sourced directly from the<br />

handset.<br />

o Full Mobile Number Portability check is already included in this service. All messages<br />

reach their destination, regardless of the existence of ported numbers<br />

o Reliable, secure carrier-grade service, minimal configuration changes à Short time to<br />

market<br />

o Web-based portal allows an easy partner management<br />

o Provide SMS Hubbing solution to customer without additional investment<br />

o High quality SMS Hubbing for customers<br />

Z) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description Secure File Transfer


180<br />

The Contractors managed Secure File Transfer <strong>Service</strong> uses the MOVEit solution from<br />

Ipswitch. The Contractor has a partnership agreement to deliver manage and supply solutions<br />

and service in partnership with Ipswitch<br />

<strong><strong>Service</strong>s</strong> offered:<br />

MOVEit EZ® is a unique secure transfer client that moves files on a scheduled, automated,<br />

firewall-friendly basis between Microsoft Windows Vista Business Edition, 2003, XP, 2000, ME,<br />

and NT desktops and a MOVEit DMZ secure transfer server, with minimal user involvement.<br />

MOVEit EZ uses of the HTTPS (HTTP over SSL) protocol enables MOVEit EZ to communicate<br />

through a single firewall port (443). This is the same port that Web browsers use for secure<br />

connections, so it is almost always open.<br />

MOVEit EZ is easy-to-install, easy-to-use, and easy-to-support.<br />

The MOVEit Central solution manages workflow and allows for machine to machine<br />

transfers, this includes the moving of files between the different MOVEit DMZ servers for the<br />

different impact levels. MOVEit DMZ provides person to person ad-hoc transfers initiated via a<br />

web interface or through Microsoft Outlook integration.<br />

MOVEit DMZ server, MOVEit Central super-client, and the other clients that make up the<br />

MOVEit secure transfer, processing, and storage software family are described below. The<br />

solutions are MOVEit DMZ and MOVEit Central, which work together.<br />

MOVEit Central Super-Client is an enterprise transfer and processing engine. IT staff use it<br />

to pull, process, and push files on an automated, scheduled, event-driven or on-demand basis


181<br />

between internal and external systems, including MOVEit DMZ. This is done using easily created<br />

tasks (no scripting or programming required) that can move files with a variety of secure and<br />

other methods, and that can automatically process the files using built-in functions and custom<br />

VBS scripts.<br />

MOVEit DMZ Server is an enterprise secure transfer and storage portal.<br />

Programs and users can securely exchange files, messages, and Web postings through MOVEit<br />

DMZ, which encrypts and securely stores them until picked up. MOVEit DMZ enables uploads<br />

and downloads by MOVEit and third-party clients.


182<br />

MOVEit Central Features<br />

o Task and event driven automatic “pull, process and push” files between internal and<br />

external systems, including MOVEit DMZ servers<br />

o Secure including FTP over SSH2 (SFTP), FTP over SSL (FTPS) for TLS-P, TLS-C, and IMPLICIT<br />

transfers (including Passive and encrypted transfers to/from NAT networks), HTTP<br />

(HTTPS), and S/MIME encrypted email. MOVEit Central also offers optional secure file<br />

transfers using AS1 (SMTP/POP3), AS2 (HTTPS) and AS3 (FTP and FTPS).<br />

o PGP Option to encrypt, encrypt and sign, decrypt and manage keys using a built-in,<br />

commercial PGP software module licensed from Veritas.<br />

o Remote Administration using MOVEit Central Admin program,<br />

o Email Notification<br />

o Encrypted Storage of user names, passwords, and VBScripts using the strong 256-bit AES<br />

encryption in its built-in FIPS 140-2 validated cryptographic module.<br />

o Comprehensive Audit Trail<br />

o API Interface Option<br />

o Failover Option<br />

MOVEit DMZ Security Model


183<br />

This Contractor <strong>Service</strong> offers FIPS 140-2 Validation. Files, messages, passwords, and other<br />

sensitive data handled by MOVEit DMZ are protected by its built-in FIPS 140-2 validated<br />

cryptography.<br />

o Encrypted Storage. Every file and message handled by MOVEit DMZ is securely stored<br />

using its strong, built-in, FIPS validated 256-bit key AES encryption.<br />

o OS Security Independence.<br />

o End-to-End Encryption<br />

o No Push Capabilities. By design, MOVEit DMZ cannot push files to other systems.<br />

o No Open Ports<br />

o Tamper-Evident Audit Trail.<br />

o tight administrative control over what each user can<br />

MOVEit DMZ Server Features<br />

o MOVEit DMZ provides a secure exchange-point through which a Customers internal and<br />

external users and systems can exchange files and messages using Web browsers and<br />

MOVEit and third-party AS2, AS3, HTTPS, FTPS, and SFTP/SCP2 secure file transfer<br />

clients<br />

o Multi-Factor Authentication using passwords, SSL hardware and software certificates,<br />

SSH Public keys (“fingerprints”), and/or IP addresses/address ranges.


184<br />

o File Non-Repudiation using sender and recipient authentication, and FIPS 140-2<br />

validated SHA1 integrity checking of each file exchanged with MOVEit DMZ<br />

o Guaranteed Deliver which includes Non-Repudiation and automatic retry of transfers<br />

o Email Notification<br />

o User Groups and Group Admins<br />

o Comprehensive Trail based on secure records<br />

o Reporting Capabilities including 90+ pre-defined, customizable reports<br />

o External Authentication option<br />

o Secure Messaging option<br />

o API Interface option.<br />

o Multiple Organizations option<br />

o Multi-Lingual Interface option<br />

o High Availability option.<br />

MOVEit DMZ Microsoft Outlook integration<br />

The Ad Hoc Transfer module enables secure person-to-person file transfer using the<br />

convenience of a Web browser or Microsoft Outlook. Authorised MOVEit DMZ Enterprise users<br />

can send files to anyone in the world with an email address – quickly, easily, and securely.


185<br />

AA) Other Communication <strong><strong>Service</strong>s</strong> - <strong>Service</strong> Description Unified Communications<br />

The Contractors Unified Communications and Collaboration based on Microsoft technology<br />

enables collaboration more efficiently with employees, suppliers, customers and business<br />

partners. By enabling the communications infrastructure, mobility, desktop and applications to<br />

work together, users can take part in almost any kind of communication, with anyone, at any<br />

time. The Contractor possesses the blend of skills and expertise required from both the IP<br />

communications and IT services worlds, for truly unified communications.<br />

The contractors Gold Partner accreditation with Microsoft enables us to provide a tailored<br />

and flexible service to meet a customers specific requirements.<br />

Microsoft BPOS provided by the Contractor and the Contractors MS Managed <strong><strong>Service</strong>s</strong><br />

provides a fully integrated array of communications services, including:<br />

o Office Communications Server: provides instant messaging and presence as well as VoIP<br />

(voice over Internet Protocol), and audio, video and web conferencing. It is a secure,<br />

scalable, enterprise-grade service that seamlessly integrates with other Microsoft<br />

products.


186<br />

o LiveMeeting: enables multiple users to participate in online meetings, training and<br />

events using interactive tools that integrate with existing systems and productivity<br />

applications.<br />

o Microsoft SharePoint: provides an intelligent portal that connects users to enable more<br />

efficient working and distribution of information throughout the<br />

customers organisation. It also integrates information from various systems into one<br />

service through federation services and enterprise application integration.<br />

o Microsoft Exchange Server 2007 (or later) Unified Messaging: delivers all messages,<br />

including voicemail, email and fax messages, into a single mailbox.<br />

The Contractor is an early adopter of Microsoft Lync and is deploying Microsoft Lync<br />

managed services<br />

The Contractor and Microsoft combined solutions are supported by the Contractors Unified<br />

Communications and Collaboration (UCC) Professional <strong><strong>Service</strong>s</strong>. This enables the Contractor to<br />

offer a comprehensive UCC service. The Contractors UCC Professional <strong><strong>Service</strong>s</strong> include:<br />

o Contractors UCC Quick Start service: provides customers with the right tools to embark<br />

on the road to unified communications and collaboration.


187<br />

o Audit and performance analysis: The Contractors specialists assess the<br />

customers specific requirements, develop a tailored roadmap, leading to pilot<br />

implementation.<br />

o Design, implementation and integration: following the pilot implementation, the<br />

Contractor can further customise Microsoft products to meet the customers specific<br />

infrastructure, directory, platform and voice integration requirements.<br />

o Project management: critical for a successful implementation and on-going<br />

maintenance.<br />

o User training and adoption: training to achieve appropriate training level and skills and<br />

develop maximum return on investment.<br />

o Business Premium Care: provides maintenance and support services from the<br />

Contractors UCC professionals and can include an engineer permanently on site.<br />

Key benefits<br />

Opting for tailored applications enables the following:<br />

o Integration a range of UCC applications throughout the customers organisation via the<br />

contractors implementation services.<br />

o Control of communication technology through transparent, collaborative approach to<br />

systems reporting and management.


188<br />

o Benefit from the Contractors Business Premium care service, providing maintenance and<br />

support services from experienced UCC professionals.<br />

o Seamless communications by consolidating the customers existing systems into one fast,<br />

easy-to-operate, Microsoft-based package. This can include voice, email, calendaring,<br />

instant messaging, presence and audio, video and web conferencing.<br />

o Improved ability to respond via various communication forms through converged voice<br />

and data.<br />

o Quickly solve any problems with the Contractors one-touch service desk manned by UCC<br />

professionals experienced at supporting Microsoft products.<br />

BB) Sustainability <strong><strong>Service</strong>s</strong><br />

The Contractor provides two core Sustainability packages: Equipment And Power Efficiency<br />

Package; and Efficient Working Package.<br />

Equipment and Power Package - In totality the equipment and power in Lot 1 can add up to<br />

a substantial environmental footprint. The Contractor's solution and product portfolio for Lot 1<br />

is designed to reduce carbon emissions where possible and adhere to a 'zero to landfill<br />

policy.' Products and services in the Contractor's supply chain are strictly vetted to ensure<br />

compliance to Sustainability standards and codes of practice where they apply (e.g. EPEAT,<br />

Energy Star, ISO27001).


189<br />

Efficient Working Package -The Contractor recognises under Lot 1 that many of the services<br />

offer opportunities to improve HMG's Sustainability Performance. The Sustainability <strong><strong>Service</strong>s</strong><br />

described below are available to the Customer across the engagement lifecycle as professional<br />

services or as part of an on-going customer engagement dialogue.<br />

<strong><strong>Service</strong>s</strong> - The Contractor offers a range of Sustainability <strong><strong>Service</strong>s</strong>, the scope of which are<br />

agreed on a case-by-case basis to accommodate the specific requirements of the Customer<br />

under each call-off. These include:-<br />

o Inventory Carbon Footprinting: the Contractor has developed methodologies and tools<br />

to estimate the use-phase and embodied carbon emissions of equipment supplied<br />

under the contract. Reports can be provided on a periodic basis (e.g. annually) giving<br />

insights into the carbon profile of the solution over time and identifying carbon hot<br />

spots worthy of more attention. Similarly, where taking responsibility for or replacing a<br />

legacy service the Contractor may be able to offer a carbon footprint analysis of the old<br />

versus new services.<br />

o <strong>Service</strong> Carbon Footprinting: the Contractor is able to offer full service carbon<br />

footprinting, and estimate the carbon emissions associated with the use of shared<br />

network services and operational activities including planning, building,<br />

maintaining/supporting and customer services in addition to those associated with the<br />

equipment inventory.<br />

o Carbon Impact Assessments / Sustainability Impact Assessments: the Contractor’s<br />

Sustainability Consultants are able to work with customers to assess their wider


190<br />

business operations and identify opportunities to reduce their carbon emissions and/or<br />

improve their sustainability performance through deployment of additional IT services.<br />

o Redundant Equipment Recycling <strong><strong>Service</strong>s</strong>: the Contractor is able to offer secure recycling<br />

of redundant equipment, balancing the need to minimise environmental impact with<br />

the removal of data. Where reuse is not an option due to data security issues, assets are<br />

recycled with typically 99% reconstituted into raw materials and zero landfill achieved<br />

through incineration of the remaining materials. The recycling service will comply with<br />

both the Environmental Protection Act and the Data Protection Act, along with the<br />

WEEE Directive, ISO 9001, ISO 14001 and ISO 270001.<br />

Relating to the provision of all elements:<br />

Contracting Options<br />

The Contractor offers a range of contracting options to supply Communication services. The<br />

Contractor recognises that some organisations regard IT as strategically core to their business and insist<br />

on an in-house capability whilst other organisations regard IT as non-core and have a preference to out-<br />

source. The Contractor has therefore structured its portfolio to cater to the contracting needs<br />

demanded by the varying requirements within the market place.<br />

The Contractors capability covers the following procurement options to meet the differing needs of<br />

customers within the Public Sector.<br />

3 rd Party Product Supply


191<br />

3 rd party HW and SW sourcing and delivery which takes advantage of the<br />

Contractors existing negotiated pricing.<br />

Professional <strong><strong>Service</strong>s</strong> (Rate Card or Fixed Price)<br />

Project Management (Prince2) and Programme Management<br />

Solution Planning and Design and Design Assurance (TOGAF)<br />

Field Force Deployment – Selection of; Basic Cleared (BC), Security Cleared (SC)<br />

and Developed Vetting (DV) personnel.<br />

Testing and Commissioning<br />

Customisable design, delivery and maintenance of service for bespoke solutions.<br />

Customer Support for Enterprise Bespoke Solutions (Input based pricings)<br />

Maintenance (Break and Fix) – geared to Time to Repair – and a Basic Cleared<br />

(BC), Security Cleared (SC) and Developed Vetting (DV) Field Force.<br />

Dedicated On-site Support – performing maintenance, moves and changes,<br />

patching and re-configuration.<br />

Proactive CPE Remote Monitoring (IL2 to IL6)<br />

<strong>Service</strong> governance (ISO 20000 principles) model – dedicated or shared resource<br />

model


192<br />

Agency Management – providing a menu of Governance Functions (Cost Plus)<br />

Bill Payment<br />

Licence management<br />

Full service/asset inventory management – including reconciliation management<br />

Supplier optimisation services<br />

<strong>Service</strong> Governance – ISO 20000 principles<br />

Managed Enterprise <strong>Service</strong> (Output and performance based pricing)<br />

End-to-end service management governed to ISO20000 principles – IL0 to IL6<br />

Customised bespoke SLA derived architecture<br />

Contractor owned Assets – typically dedicated to one customer<br />

Core elements hosted in either the Contractors or the Clients Locations.<br />

Hosted <strong><strong>Service</strong>s</strong> (Commoditised Pricing)<br />

End-to-end service management governed to ISO20000 principles<br />

Common <strong>Service</strong> Level derived architecture<br />

Contractor owned Assets – shared by 2 or more customers<br />

Core elements hosted in the Contractors Locations


)<br />

)<br />

)<br />

)<br />

)<br />

The table below is a summary of the commercial options that apply to Lot 1<br />

Capability<br />

a<br />

b<br />

c<br />

d<br />

e<br />

193<br />

Voice Access<br />

Voice Call<br />

Packages<br />

Voice Minutes<br />

Premium Rate<br />

Numbers & Non-<br />

Geographic DDI<br />

Numbers<br />

Call Preference<br />

<strong><strong>Service</strong>s</strong><br />

Party<br />

and<br />

3 rd<br />

Product<br />

Supply<br />

Yes<br />

Yes<br />

Yes<br />

Yes<br />

Yes<br />

onal<br />

Professi<br />

<strong><strong>Service</strong>s</strong><br />

mer<br />

Custo<br />

Support<br />

for<br />

Enterprise<br />

Bespoke<br />

Solutions<br />

Agency<br />

Management<br />

ged<br />

Mana<br />

Enterprise<br />

<strong>Service</strong><br />

sted<br />

Ho<br />

<strong>Service</strong>


)<br />

)<br />

)<br />

)<br />

)<br />

)<br />

)<br />

)<br />

)<br />

f<br />

g<br />

h<br />

i<br />

j<br />

k<br />

l<br />

m<br />

n<br />

194<br />

Smart Numbers<br />

Traditional Voice<br />

<strong><strong>Service</strong>s</strong><br />

IPT <strong><strong>Service</strong>s</strong><br />

118 Directory<br />

Enquiries<br />

Audio<br />

Conferencing<br />

Desktop Video<br />

Conferencing And<br />

Collaboration Tools<br />

Web Conferencing<br />

Managed<br />

Streaming<br />

Internet <strong>Service</strong><br />

Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

s<br />

s<br />

s<br />

s<br />

s<br />

s<br />

s<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye


)<br />

)<br />

)<br />

)<br />

)<br />

)<br />

)<br />

)<br />

o<br />

p<br />

q<br />

r<br />

s<br />

t<br />

u<br />

v<br />

195<br />

Co-Location And<br />

Hosting <strong><strong>Service</strong>s</strong><br />

On-Line Storage<br />

<strong><strong>Service</strong>s</strong><br />

Antivirus <strong><strong>Service</strong>s</strong><br />

Email Scanning<br />

And Filtering <strong><strong>Service</strong>s</strong><br />

Firewalls,<br />

Intrusion And Spyware<br />

Detection <strong><strong>Service</strong>s</strong><br />

Authentication<br />

And Access<br />

Management <strong><strong>Service</strong>s</strong><br />

Web And<br />

Application Sign On<br />

<strong><strong>Service</strong>s</strong><br />

Mail And<br />

Messaging <strong><strong>Service</strong>s</strong><br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

s<br />

s<br />

s<br />

s<br />

s<br />

s<br />

s<br />

s<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye


)<br />

)<br />

)<br />

)<br />

a)<br />

b)<br />

w<br />

x<br />

y<br />

z<br />

a<br />

b<br />

196<br />

Real Time<br />

Information <strong><strong>Service</strong>s</strong><br />

Desktop<br />

Messaging<br />

Messaging Via<br />

Email, SMS, Pager And<br />

Mobile Or Fixed Line<br />

Telephone<br />

Secure File<br />

Transfer<br />

Unified<br />

Communications<br />

Sustainability<br />

<strong><strong>Service</strong>s</strong><br />

Migration <strong><strong>Service</strong>s</strong><br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes Yes Yes Yes Yes<br />

Yes<br />

The Contractor offers a range of migration services that supports a client moving from one service<br />

model to a new service model. These include both Transition and Transformation <strong><strong>Service</strong>s</strong>.<br />

s<br />

s<br />

s<br />

s<br />

s<br />

Ye<br />

Ye<br />

Ye<br />

Ye<br />

Ye


197<br />

Transition <strong><strong>Service</strong>s</strong> – The take-on and operation by the Contractor of an existing<br />

service model. Typically either an in-house service model or one supplied by<br />

another operator. This would include:<br />

o Elements of Agency Management<br />

o Transfer of in scope staff (TUPE)<br />

o Knowledge Transfer<br />

o Processes and procedures(<strong>Service</strong>, commercial, finance)<br />

o Technical and Infrastructure<br />

o In-Flight Projects and <strong>Service</strong> take-on<br />

o Elements of a Managed Enterprise <strong>Service</strong> Model<br />

Transformation <strong><strong>Service</strong>s</strong> - The move from an in-house or other operators service<br />

model to a Contractor Managed Enterprise <strong>Service</strong> or Contractor Hosted <strong>Service</strong>.<br />

<strong>Service</strong> Management Capability<br />

An effective service management operation will provide the basis and the foundation that shall<br />

ensure that users are supported during the transition process to a Contractor supplied service and that<br />

they are migrated effectively into business usual service operation. The Contractor provides a range of<br />

<strong>Service</strong> Management options to address the needs of customers of varying scale and complexity. The<br />

Contractor is compliant with the framework principles of ISO20000 and aligned to ITIL v3 best practice.


198<br />

See Figure 14 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

The Contractor offers a service management capability to support its <strong>PSN</strong> services.<br />

Contract and <strong>Service</strong> Governance<br />

<strong>Service</strong> Desk<br />

<strong>Service</strong> Availability<br />

<strong>Service</strong> Transition and Transformation<br />

Management Information (MI)<br />

Contract and <strong>Service</strong> Governance<br />

The function of the Contract and <strong>Service</strong> Governance Team is to ensure services are delivered in<br />

accordance with our framework and call-off commitments. This would cover:<br />

Contract Assurance ensuring the service is delivered to the agreed terms<br />

Design Assurance ensuring the underlying platform Solution supports the agreed<br />

functional requirements and conforms to agreed standards<br />

Delivery Assurance ensuring the service is deployed in line with our committed<br />

delivery time-line<br />

<strong>Service</strong> Assurance ensuring the supplied operating model fulfils our service<br />

management commitments


199<br />

Security Assurance ensuring the service is compliant with all agreed security<br />

standards<br />

The Contractor has a global team of <strong>Service</strong> Managers that work on accounts where customers opt<br />

for a ‘managed service’. <strong>Service</strong> Managers manage the day-to-day relationship with our customers.<br />

They take overall responsibility for customer satisfaction, with responsibilities including:<br />

Monitoring service performance<br />

Major incident management and escalations<br />

<strong>Service</strong> development plans & other service documents<br />

Support for new business and change requests<br />

Continual development of customer experience<br />

The Contractor offers a range of Governance Options over and above that provided as standard. The<br />

range offered under this framework includes:<br />

Hosted <strong><strong>Service</strong>s</strong> The Contractors Central <strong>PSN</strong> Contract Team<br />

Agency Managed <strong><strong>Service</strong>s</strong> Shared Contract Team<br />

Bespoke Enterprise <strong><strong>Service</strong>s</strong> Shared or Dedicated Contract Team<br />

Managed Hosted Enterprise Shared or Dedicated Contract Team


<strong>Service</strong><br />

<strong>Service</strong> Desk<br />

The Contractors service desk is able to process both incidents and operational change across<br />

the range of contracting options. The key attributes of this capability are as follows:<br />

200<br />

Front-line capability – 1 st line staff with sufficient knowledge to resolve up to 90%<br />

of service issues and up to 100% of standard service changes.<br />

First line capability with access to, and in some cases co-located with, 2 nd and 3 rd<br />

line specialist skills – capable of dealing more complex incidents either within one<br />

service (2 nd line) or across a range of services (3 rd line).<br />

Shared <strong>Service</strong> Desks:<br />

o serving multiple customers over a narrow range of services – typically for<br />

Hosted <strong><strong>Service</strong>s</strong><br />

o serving a limited customer set over wide range of services – typically of<br />

Enterprise Bespoke or Agent Management services<br />

<strong>Service</strong> Desk access ranging from 8x5x250 to 24x365, depending upon the<br />

requirements of the customer<br />

Multi-channel interface for raising incidents and changes and receiving updates,<br />

including by telephone, fax and online.


201<br />

Escalation chains for customers to use if they are unhappy with the progress of<br />

their change or incident<br />

For Hosted services our service desk will have direct access to our <strong>Service</strong> Operations Centres (SOC)<br />

who provide a 24x365 platform monitoring capability and specialist technical support capability. The<br />

SOC will provide support to the <strong>Service</strong> Desk for the resolution of in depth incidents, and the pro-active<br />

monitoring and maintenance of the network<br />

The Contractors SOC will be responsible for the day to day management, administration and<br />

operation of our shared platforms that support our Hosted <strong><strong>Service</strong>s</strong>:<br />

monitoring of the performance and integrity of the systems to ensure the <strong>Service</strong><br />

Levels are being met<br />

proactively monitoring all Communication <strong><strong>Service</strong>s</strong> Equipment to ensure that it is<br />

in good working order including, but not limited to, the identification of any<br />

security, capacity and availability related incidents and problems<br />

investigating alarms raised and undertake remote diagnosis and corrective action<br />

platform Administration covering housekeeping and routine maintenance


The Contractors standard service levels are as set out in the table below. Bespoke arrangements<br />

can also be made to cater for customers who have different requirements or who require a dedicated<br />

service desk.<br />

<strong>PSN</strong><br />

<strong>Service</strong><br />

levels<br />

202<br />

Maintenance Respon<br />

Level 1 Business Premium<br />

Care<br />

se Target<br />

Fix<br />

Target<br />

2 Hours 5<br />

hours<br />

Level 2 Business Care 2 hours 8<br />

Hours<br />

Level 3 Standard Care 4 hours 18<br />

Addition<br />

al options<br />

available on<br />

request<br />

<strong>Service</strong> Availability<br />

hours<br />

Hours of Operation<br />

24x365<br />

Mon-Sun including<br />

Bank Holidays<br />

08:00-21:00<br />

Mon-Fri<br />

08:00-17:00


The Contractor offers a range of service performance measures and service credits to accommodate<br />

varying Customer requirements:<br />

Hosted <strong><strong>Service</strong>s</strong> are based on a mixture of<br />

availability and/or time to repair measures<br />

Agency Managed <strong><strong>Service</strong>s</strong> are as that agreed<br />

directly between the customer and supplier.<br />

Managed Hosted <strong><strong>Service</strong>s</strong> and Bespoke<br />

Enterprise <strong><strong>Service</strong>s</strong> are based on a mixture of<br />

availability measures (for Core <strong><strong>Service</strong>s</strong>) and repair<br />

time measures (for end-user services). These tend<br />

to be more varied than that for Hosted <strong><strong>Service</strong>s</strong><br />

Reporting<br />

203<br />

Typically availabilities of 99.75% to 99.9%<br />

measured over a 3 month cycle<br />

Target levels are agreed between the<br />

parties in an appropriate format.<br />

Typically availabilities of 99.5% to 99.99%<br />

measured over a 3 month cycle<br />

The Contractor offers a range of reporting options that can be accessed on-line or delivered<br />

periodically. Online delivery is via a portal that can also be used to view progress of incidents and<br />

changes.<br />

This reporting is able to address:<br />

<strong>Service</strong> Performance and Major Incidents<br />

Inventory of <strong><strong>Service</strong>s</strong>


Business Continuity<br />

204<br />

<strong>Service</strong> Usage<br />

<strong>Service</strong> Utilisation<br />

<strong>Service</strong> Charging<br />

The Contractor is aware that the physical, logical, and operational threats to businesses arise from<br />

three main sources:<br />

o Acts of nature - such as fire and floods<br />

o Accidents - such as plane crashes and system failures<br />

o Deliberate acts - such as terrorism, theft and industrial action<br />

Each business will have its own particular set of potential threats to continuous operation, but all of<br />

these issues have the potential to cause serious disruption, no matter the size of the organisation.<br />

The Contractor’s propositions<br />

The Contractors analysis of customer needs across all industry sectors indicates strongly that in<br />

order to thrive in the digital networked economy, every organisation has to have a strategy that will<br />

address security in three key areas of its business. These are:<br />

o Networks and IT infrastructure - Businesses today are highly dependent on their networked<br />

IT/ICT infrastructure to provide services to their customers, partners and suppliers, as well as to<br />

support their internal processes.<br />

o Applications and information - Businesses must ensure that information (and the applications<br />

that use it) is accessible and usable by authorised entities, on demand, and without undue<br />

delay.


o Compliance and governance - Governance, legal and regulatory pressures are compelling<br />

businesses to provide transparency and accountability.<br />

Making full use of the combined global resources, delivery capabilities and assets the Contractor has<br />

developed business focussed, repeatable propositions in each of these areas. These propositions are<br />

designed to help customers meet the challenges of securing their businesses and achieving compliance<br />

across the organisation, in a cost-effective and efficient manner.<br />

205<br />

See Figure 15 in ‘BT_<strong>PSN</strong>S_Appendix1_Award Questionnaire_SectionB_v2.0 graphics’<br />

In terms of Business Continuity, the Contractor offers networked solutions that help prevent<br />

downtime and serious disruption to mission-critical business processes. Our solutions help ensure that<br />

networked IT assets and infrastructure are available to authorised users at all times – on demand and in<br />

a cost effective, efficient manner. The Contractors approach to BCM is very much a consultative process,<br />

which works in line with the Business Continuity Management Lifecycle from the Business Continuity<br />

Institute Good Practice Guidelines.<br />

The Contractor provides operational resilience and risk management by addressing all the layers of<br />

a client’s business environment, including: critical processes, networks, platforms, data and applications,<br />

and crucially, the people involved at each layer. Our services are scalable, recoverable, secure, and<br />

designed to meet industry, governmental and global compliance requirements.<br />

The Contractor applies this methodology to the provision of its own products and services.


Suppliers and Partners<br />

The Contractor has relationships with existing Suppliers and Sub-Contractors who assist in the<br />

delivery of services throughout the response.<br />

These include:-<br />

Lot 1 - Technology &<br />

<strong>Service</strong> Partners<br />

206<br />

Typical Role<br />

Avaya (and Nortel) o Voice Equipment (IPT) Solutions and <strong><strong>Service</strong>s</strong><br />

o Network Equipment Solutions and <strong><strong>Service</strong>s</strong><br />

o Network Security Equipment Solutions and <strong><strong>Service</strong>s</strong><br />

Cisco o Voice Equipment (IPT) Solutions and <strong><strong>Service</strong>s</strong><br />

o Network Equipment Solutions and <strong><strong>Service</strong>s</strong><br />

o Network Security Equipment Solutions and <strong><strong>Service</strong>s</strong><br />

o Storage Area Network Equipment (IPT) Solutions and <strong><strong>Service</strong>s</strong><br />

o Unified Communications solutions<br />

o Desktop Conferencing Applications<br />

o Desktop video<br />

o Video Conferencing integrator range<br />

o Profile all-in-one Video Conferencing units<br />

o Telepresence immersive range


207<br />

o Infrastructure: bridges, gateways, management, firewall traversal<br />

Genband o Voice Equipment (IPT) Solutions and <strong><strong>Service</strong>s</strong><br />

Lifesize o Desktop Conferencing and Unified Communications solutions<br />

o Desktop video<br />

o Video Conferencing integrator range<br />

Microsoft o Unified Communications solutions<br />

Other Mobile<br />

Operators<br />

o Exchange Software<br />

o Operating System Software<br />

o Security Software<br />

o Web <strong><strong>Service</strong>s</strong> Software<br />

o Fixed-To-Mobile (FTM) Gateways<br />

Polycom o Desktop Conferencing and Unified Communications solutions<br />

o Desktop video<br />

o Video Conferencing integrator range<br />

o Media Centre all-in-one Video Conferencing units


208<br />

o Immersive range including OTX and RPX<br />

o Infrastructure : bridges, gateways, management, firewall traversal<br />

Siemens o Voice Equipment (IPT) Solutions and <strong><strong>Service</strong>s</strong><br />

o Network Equipment Solutions and <strong><strong>Service</strong>s</strong><br />

o Network Security Equipment Solutions and <strong><strong>Service</strong>s</strong><br />

Symantec o Internet Security Software, Solutions and <strong><strong>Service</strong>s</strong>


Cable&Wireless Worldwide<br />

The Contractor where required and agreed with the Customer in the Call Off Order shall<br />

provide the supply, installation, maintenance, technical architecture and system design, project<br />

management, and support for equipment, commodity and managed service of all the<br />

Communications services relevant to the scope of Lot 1 as described in the table below;<br />

The following table shows the Contractors service description relevant to the scope of<br />

services within the Communications service Lot 1.<br />

Scope<br />

209<br />

Lot 1 – Communication <strong><strong>Service</strong>s</strong><br />

IP based voice services, desktop<br />

messaging; messaging via email, SMS,<br />

pager and mobile or fixed line telephone<br />

The Contractors Corresponding<br />

<strong>Service</strong> Description<br />

CAAS)<br />

IP based voice services IP Trunk<br />

Voice call packages; voice minutes TDM Voice<br />

DDI, premium rate numbers; non-<br />

Managed Telephony (MIP PBX &<br />

geographic numbers Inbound Call Management<br />

Traditional TDM based voice services PBX Maintenance


210<br />

118 enquiries Directory Enquiries and Operator<br />

Audio conferencing, desktop video<br />

conferencing, web conferencing Audio & Web Conferencing<br />

E-Mail <strong><strong>Service</strong>s</strong>, messaging services Mailbox <strong>Service</strong><br />

Collaboration tools, desktop<br />

messaging; messaging via email, SMS,<br />

pager and mobile or fixed line telephone Collaboration<br />

Website services; co-location and<br />

hosting; on-line storage Hosting<br />

E-mail scanning and filtering Security - E-Mail Filtering<br />

Authentication and access<br />

management, web and application sign<br />

on services<br />

Firewalls; intrusion, antivirus and<br />

spyware detection<br />

<strong>Service</strong><br />

Security - Managed Authentication<br />

Security - Managed Security<br />

Infrastructure <strong>Service</strong><br />

Security services and antivirus Security - Protective Event<br />

Monitoring <strong>Service</strong>


211<br />

Security services Security Practice<br />

Internet services Internet<br />

Application acceleration APM<br />

Real time information services and<br />

messaging via email, SMS, pager and<br />

mobile or fixed line telephone STORM<br />

The Contractor can provide a number of <strong><strong>Service</strong>s</strong> described below. These <strong><strong>Service</strong>s</strong> can,<br />

where feasible and applicable for the <strong>Service</strong>, be offered at IL0, IL2, IL3 and IL4, where required<br />

and agreed with the Customer in the Call Off order.<br />

MANAGED TELEPHONY (MIP-PBX) SERVICE OVERVIEW<br />

This <strong>Service</strong> Description covers the Contractor’s Managed IP-PBX (MIP-PBX) service. MIP-<br />

PBX offers Customers their own dedicated platform(s), hosted on their own premises or in the<br />

Contractor’s data centre(s) according to particular needs, for example IL3+ security<br />

requirements. The Contractor’s MIP-PBX service extends to providing Unified Communications<br />

capabilities including telephony, voicemail, audio-conferencing and Instant Messaging &<br />

Presence services.<br />

The Contractor evaluates potential technology vendor partners on an on-going basis in<br />

order to be able to offer Customers innovative and best-of-breed solutions. The solution(s)<br />

offered to a Customer will therefore depend upon the Customer’s specific requirements and


the features offered by the Contractor’s technology vendor partner chosen at the time by the<br />

Contractor.<br />

The Contractor provides an ITIL-based framework of services necessary to capture and<br />

define the solution requirements, to design, install, monitor, maintain and manage the solution,<br />

and to provide the required end-user equipment such as telephones, soft clients and gateways.<br />

High-Level <strong>Service</strong> Offering<br />

Managed IP-PBX” (MIP-PBX): Fully managed enterprise-grade PBX and Unified<br />

Communications services for Customers on their own dedicated platform(s), hosted on their<br />

own premises or in the Contractor’s data centre(s).<br />

MIP-PBX <strong>Service</strong> Description<br />

MIP-PBX offers PBX and Unified Communications <strong><strong>Service</strong>s</strong> to Customers on a Capex basis<br />

with a monthly management charge. The services will run on a particular technology platform<br />

chosen by the Contactor as most suitable to meet the Customer’s requirements from a<br />

functionality and cost perspective.<br />

The platforms are either hosted on the Customer’s premises or in the Contractor’s data<br />

centre(s), according to particular needs, for example IL3+ security requirements. The platforms<br />

are fully maintained by the Contractor at the initially deployed software and hardware releases.<br />

The Customer has the option to request upgrades of hardware or software, or both, and the<br />

Contractor shall provide a quotation to undertake such work.<br />

212


The Contractor shall offer a range of End User devices including fixed IP-handsets, wireless<br />

IP handsets and soft-clients. Customers shall also have the option to use their own devices,<br />

subject to them being compatible with the <strong><strong>Service</strong>s</strong>.<br />

MIP-PBX is offered as a fully managed service, with the following options available<br />

213<br />

End-User Licences<br />

PBX Features<br />

Voicemail Options<br />

Audio Conferencing Options<br />

Operator Console Options<br />

Call Logging<br />

IM & Presence Options<br />

Video Telephony<br />

Connectivity Options<br />

PSTN trunks<br />

Handsets and Soft Clients<br />

Resiliency Options<br />

Professional <strong><strong>Service</strong>s</strong><br />

PBX Maintenance <strong><strong>Service</strong>s</strong><br />

End-User Licences<br />

The Customer shall purchase a Licence for each End User which shall define the services and<br />

capabilities the End User shall be entitled to use. The scope and content of the Licence shall<br />

depend upon the chosen technology vendor and shall cover the following features as a<br />

minimum:<br />

Telephony (PBX) Features


214<br />

Voicemail<br />

Instant Messaging & Presence (IM&P)<br />

Telephony (PBX) Options<br />

MIP-PBX shall support a comprehensive range of telephony features including Call Hold, Call<br />

Transfer, Call Pick Up, Group Working, Short Code Dialling, Manual Diversion, Memory<br />

Functions, Remote Call Logging, Audio Conferencing and Centralised Operator). There shall be<br />

further optional features to choose from including:<br />

Assistant/Manager<br />

Extension Mobility<br />

Click-to-Call<br />

Multi-Line Appearance<br />

Single Number Reach<br />

Desk & Mobile Pick Up<br />

Single Business Voicemail<br />

Voicemail Options<br />

Voicemail Box<br />

Voicemail Access<br />

Security features<br />

SpeechConnect and Auto Attendant<br />

Visual Voicemail (viewing voicemail messages like email on suitable IP Phone Displays)<br />

Message Waiting Indication<br />

Optional SpeechView (speech to text transcription)<br />

Optional Integrated Email and Voicemail with SMS notification<br />

Optional live recording of conversations.


Audio Conferencing<br />

The Contractor shall provide a fully featured Audio Conferencing <strong>Service</strong>, offering both<br />

Reservationless and Operator Attended conferencing capabilities and optional integrated web<br />

conferencing. This scalable solution shall be offered in a variety of commercial models to suit<br />

the needs of most organisations. The Contractor shall also offer dedicated hardware located on<br />

the Customer’s premises where Customer conferencing volumes deem such a solution to be<br />

more beneficial. These components shall be managed by the Contractor.<br />

Operator Console Options<br />

The option of one or multiple operator consoles shall be offered. The consoles can be<br />

distributed around the Customer’s estate to support local as well as centralised operator<br />

functionality.<br />

Call Logging Options<br />

The Contractor shall offer options for the Customer to have the capability to view, analyse<br />

and manipulate their call data which allows them to manage their user estate, check for<br />

fraudulent use and identify high cost areas.<br />

IM & Presence Options<br />

215<br />

Enterprise-grade Instant Messaging: Secure, rich-text IM, Group Chat, Subscriber<br />

History, Multi-device IM, Media Escalation, Persistent Chat Rooms.<br />

Rich Network Presence: Always-on telephony presence, always-on calendar presence,<br />

network-based presence aggregation from multiple sources and clients, third-party<br />

presence applications, network-enforced presence policy.<br />

Standard, Blocked, Do Not Disturb and custom presence notifications.<br />

Control who views presence information.<br />

Escalate to Group Chat.


216<br />

File transfer.<br />

Video Telephony<br />

End Users with a suitable soft client or video-enabled handset shall be able to make point-<br />

to-point video telephony calls to other End Users on the MIP-PBX network.<br />

Connectivity<br />

MIP-PBX <strong><strong>Service</strong>s</strong> require the presence of a suitable WAN to provide data links between the<br />

Customer sites and where applicable the Contractor’s data centres. The WAN must comply<br />

with prerequisites (in terms of bandwidth, jitter, delay, QoS, VLANs, etc.) necessary to support<br />

the CaaS real-time multimedia services.<br />

PSTN Network <strong><strong>Service</strong>s</strong><br />

Access to the PSTN shall be via centralised SIP Trunks offered as a separate service by the<br />

Contractor. TDM PSTN connectivity is also supported depending on the solution design.<br />

Handsets and Soft Clients<br />

The Contractor shall offer a selection of End User devices including Featurephones and soft<br />

clients to cater for End User needs ranging from basic telephony in public places through to<br />

executive devices, soft-clients and video-enabled endpoints.<br />

The Contractor shall offer a “Bring Your Own Device” option whereby the Customer sources<br />

their own IP Feature phones to use with the MIP-PBX service. These may be devices that are<br />

listed above or from other approved third party suppliers.


The Contractor shall offer the option of supporting the connection and the use of older<br />

analogue devices by means of gateways deployed at the Customer’s premises.<br />

Resiliency Options<br />

MIP-PBX offers the option of being deployed with a resilient architecture whereby end-<br />

points can be associated with two platforms operating in a load-sharing or main/standby mode.<br />

The Contractor shall also offer resiliency options to operate in the event that MIP-PBX<br />

becomes unavailable to End User sites (due to a failure of part or all of the WAN, for instance):<br />

217<br />

Local Site Survivability Mode – ability to support voice services between users on the<br />

local site.<br />

Inter-Site Survivability Mode – ability to support voice services between users within the<br />

Customer’s estate (subject to inter-site WAN being available).<br />

PSTN Break-Out Survivability – ability to call external users.<br />

PSTN Break-In and Out Survivability – ability to call and receive calls from external users.<br />

Professional <strong><strong>Service</strong>s</strong><br />

The Contractor shall offer Professional <strong><strong>Service</strong>s</strong> in respect of designing the Customer’s<br />

solution, project management and programme management of any element of the solution<br />

including the transition from their existing solution over to MIP-PBX. This shall include a range<br />

of training options for End Users.<br />

PBX Maintenance <strong><strong>Service</strong>s</strong><br />

The Contractor offers a PBX Maintenance service option that provides maintenance cover<br />

primarily for legacy TDM-based PBX networks. This service, delivered via a Sub-Contractor,


offers a useful complement to MIP-PBX in supporting the existing PBX network during the<br />

transition period over to MIP-PBX.<br />

<strong>Service</strong> Provision<br />

The Contractor shall provide:<br />

218<br />

<strong>Service</strong> Description<br />

Discovery Days<br />

Customer<br />

Experience &<br />

Solution Design<br />

Platform<br />

Deployment<br />

On-Site Transition<br />

Initial face-to-face discussions with Customer’s to<br />

determine overall business goals, understand the<br />

current infrastructure and business processes, and<br />

explore possible options, understanding where they<br />

want to get to in the short, medium and long term.<br />

Output from this process shall be a strategic<br />

document proposing an optimum service and a<br />

roadmap to the end state.<br />

Deeper analysis of the Customer’s existing structure<br />

and how it is to be transformed into the new solution.<br />

Specifically, this shall define the requirements, explain<br />

how it is to be developed, identify the connectivity<br />

options, and explain how it shall be delivered and<br />

what it shall include.<br />

� Procuring and deploying the platforms<br />

(hardware and software)<br />

� Arranging and configuring Contractor’s Data<br />

Centre accommodation – space, power,<br />

cooling, management and monitoring (for<br />

deployments within Contractor’s Data Centres)<br />

� Systems Configuration – enabling reporting,<br />

billing, etc.<br />

� Testing – testing the various elements of the<br />

MIP-PBX service for correct operation.<br />

� Deployment – activation of the environment for<br />

use.<br />

The deployment of MIP-PBX services shall require a<br />

level of activity at each Customer location. The<br />

activities vary based on the particular services<br />

required, however typically the following steps shall be


Project<br />

Management<br />

<strong>Service</strong> Management<br />

219<br />

undertaken for each on-site transition:<br />

� On-Site Survey – validating the On-Site Design<br />

and assessing installation practicalities for the<br />

deployment.<br />

� Readiness validation – confirming Connectivity<br />

(WAN and LAN) and that dependencies are in<br />

place prior to installation & deployment.<br />

� Shipping, deployment & testing of End User<br />

devices.<br />

� Installation – installation of any equipment<br />

needed on-site including End User devices.<br />

� Deployment – migration and activation of the<br />

site for use in the live environment.<br />

� <strong>Service</strong> Readiness Testing – validating<br />

operation and supportability of the location.<br />

When transitioning the existing estate, or even<br />

implementing a significant change to the existing<br />

services offered, the Contractor’s Project Managers<br />

shall help plan, organise, secure and manage the<br />

resources required to deliver this capability.<br />

Project Management services may extend beyond the<br />

Contractor’s direct organisation and include, where<br />

agreed, the management of nominated<br />

teams/resources within the Customer’s organisation<br />

as well as their existing third parties.<br />

The Contractor offers MIP-PBX as a fully managed service. Provision shall be made via<br />

Helpdesks and processes for Customers to request changes and to obtain assistance, support<br />

and advice in using their MIP-PBX services. The operations services shall ensure that any<br />

requirements shall be responded to and any issues with a Customer’s services shall be quickly<br />

identified and resolved.<br />

Key elements in the <strong>Service</strong> Management portfolio are:


220<br />

<strong>Service</strong> Desk – manned by the Contractor’s <strong>Service</strong> Desk Analysts who will support the<br />

Customer.<br />

Used to manage, track and update Incidents and Requests.<br />

Used to escalate Incidents and Requests where necessary.<br />

Used to manage orders, service changes and Moves, Adds and Changes.<br />

Used to request management reports.<br />

Available 24x7.<br />

<strong>Service</strong> Desk calls shall be answered in under 20 seconds 90% of the time.<br />

Emails shall be automatically acknowledged as received by return and then<br />

responded to within 24 hours.<br />

New account requests received on working day 1 shall be actioned and welcome<br />

email sent to End User by close of business on working day 3.<br />

Password and PIN changes shall be completed in less than four (4) hours.<br />

Account amends and deletions shall be completed in less than 24 hours.<br />

Incident Management Process – Will resolve service interruptions or degradations<br />

reported by a Customer. The Incident reporting process shall be the only available<br />

method of officially logging an Incident and SLA tracking. Incidents shall be reported via<br />

telephone and entered on the system by the Contractor on the Customer’s behalf. A<br />

unique incident ticket number shall be generated for the purpose of tracking, which will<br />

be sent to the user when the request is submitted. This receipt shall be timed and<br />

dated.<br />

The Contractor shall seek to resolve incidents at the first point of contact, namely<br />

the <strong>Service</strong> Desk. More complex incidents shall be escalated internally to second and if<br />

necessary third-line resources.<br />

Responses as per the SLA shall be communicated by phone or by email/SMS to the<br />

user as requested by the Customer. For clarity, the Customer ‘user’ might be an<br />

individual, the Administrator or the Customer’s internal IT Helpdesk. Although the latest<br />

information regarding an incident shall always be available on contact, any regular<br />

updates regarding the incident shall be made to the email address of the individual who<br />

raised the incident (or optionally using SMS).


221<br />

Incidents shall be classified by the Contractor at a ‘priority’ level which shall then<br />

determine the times for both responding to and resolving the fault.<br />

Moves, Adds, Changes & Deletions (MACD) <strong>Service</strong> – Will manage soft changes to the<br />

Customer’s estate and services. The MACD <strong>Service</strong> team shall integrate with the<br />

processes inside a Customer’s organisation for outsourcing the day-to-day MACD<br />

management of their Communications <strong><strong>Service</strong>s</strong>.<br />

Reporting – MIP-PBX offers a range of standard reports that enable Customers to review<br />

their usage of the services and the performance of their services. Standard reports can<br />

be scheduled to be produced and emailed to pre-defined Customer recipients. All<br />

reports can be requested via the <strong>Service</strong> Desk. A selection of example report<br />

requirements is given below:<br />

<strong>Service</strong> Monitoring<br />

Estate Inventory Reports<br />

Incident Reports<br />

Financial Management Reports<br />

Capacity & Performance Reports<br />

Order Reports<br />

<strong>Service</strong> Usage Reports<br />

.End User Helpdesk –optional service providing a contact point for the<br />

Customer’s End Users:<br />

Seeking assistance with using specific capabilities and End User devices.<br />

Confirming the services that the Customer is contracted to receive.<br />

Seeking support on any aspects of the service.<br />

Responding to “How do I …?” queries.<br />

Resetting account-access such as Voicemail PINs, Self-<strong>Service</strong> Logins, etc.<br />

(subject to the user confirming their identity).<br />

Availability: Standard from Monday to Friday 09:00 to 17:00, with options to<br />

extend to 6 days 09:00 to 17:00 or to 24/7.<br />

<strong>Service</strong> Desk calls shall be answered in under 20 seconds 90% of the time.<br />

Password and PIN changes shall be completed in real-time (subject to successful<br />

user validation).<br />

The Contractor shall proactively monitor platforms on a 24x7 basis. The Contractor shall<br />

take the necessary action to rectify any problems found as a result of any alarms generated or<br />

any detected performance degradation.


Use of Sub Contractors<br />

Contractor may use sub contractors in the supply of the MIP-PBX services, depending upon<br />

which technology partner is preferred. These will be either Mitel or Cisco for the provision of<br />

hardware.<br />

MANANAGED TELEPHONY (CAAS) SERVICE OVERVIEW<br />

This <strong>Service</strong> Description covers the Contractor’s “Comms-as-a-<strong>Service</strong>” (CaaS), Managed IP<br />

Telephony and Unified Communications <strong>Service</strong>. The CaaS model offers an on-demand,<br />

subscription-based pay-as-you-go service, running on carrier-grade platforms owned and<br />

hosted within two of the Contractor’s data centres to deliver high availability SLAs and<br />

continuously updated feature sets. The Contractor’s CaaS service extends to providing Unified<br />

Communications capabilities including telephony, voicemail, audio-conferencing and Instant<br />

Messaging & Presence services.<br />

The Contractor provides an ITIL-based framework of services necessary to capture and<br />

define the solution requirements, to design, install, monitor, maintain and manage the solution,<br />

and to provide the required end-user equipment such as telephones, soft clients and gateways.<br />

High-Level <strong>Service</strong> Offering<br />

Comms-as-a-<strong>Service</strong> (CaaS): Fully managed PBX and Unified Comms services offered on a<br />

flexible subscription basis from the Contractor’s platforms in their data centres.<br />

CAAS <strong>Service</strong> Description<br />

“Comms-as-a-<strong>Service</strong>” (CaaS) offers PBX and Unified Communications <strong><strong>Service</strong>s</strong> to Customers<br />

on a subscription-based pay-as-you-go basis. The commercial model is predominantly Opex<br />

222


ather than Capex – End Users subscribe to particular services and features they need on a per-<br />

user-per-month (PUPM) basis. Additionally up-front consultation, design and set-up charges<br />

will be applicable.<br />

The services run on the Contractor’s dual resilient platforms hosted within two (2) data<br />

centres. The platforms are fully maintained by the Contractor with the Contractor maintaining<br />

software and feature releases.<br />

The Contractor shall offer a range of End User devices including fixed IP-handsets, wireless<br />

IP handsets and soft-clients. Customers shall also have the option to use their own devices,<br />

subject to them being compatible with the <strong><strong>Service</strong>s</strong>.<br />

CaaS is offered as a fully managed service, with the following options available:<br />

223<br />

Feature Packs<br />

PBX Features<br />

Voicemail Options<br />

Audio Conferencing Options<br />

Operator Console Options<br />

Call Logging<br />

IM & Presence Options<br />

Video Telephony<br />

Connectivity Options<br />

PSTN trunks<br />

Handsets and Soft Clients<br />

Connector Options<br />

Resiliency Options<br />

Professional <strong><strong>Service</strong>s</strong>


224<br />

PBX Maintenance <strong><strong>Service</strong>s</strong>.<br />

Feature Packs<br />

The Customer shall purchase a subscription for each End User to one or more Feature Packs<br />

that define the services and capabilities the End User shall be able to use. The Feature Pack<br />

subscriptions can be purchased, adjusted or ceased during the contract period.<br />

Feature packs shall include options for the following:<br />

Telephony (PBX) Features<br />

Voicemail<br />

Instant Messaging & Presence (IM&P)<br />

Video Telephony.<br />

Additional Feature Pack options shall be made available where the CaaS service is extended<br />

to include other services such as Video Conferencing, Contact Centre and Managed Media<br />

Recording as the Customer requires.<br />

<strong><strong>Service</strong>s</strong> not offered directly by CaaS, such as Microsoft Lync, may be supported by means<br />

of a Connector (see Connector options below).<br />

Telephony (PBX) Features<br />

CaaS shall support a comprehensive range of telephony features, including those offered by<br />

the current MTS service (Call Hold, Call Transfer, Call Pick Up, Group Working, Short Code<br />

Dialling, Manual Diversion, Memory Functions, Remote Call Logging, Audio Conferencing and<br />

Centralised Operator). There shall be several Telephony (PBX) Feature Packs to choose from<br />

including:


225<br />

Basic Voice – all basic PBX Telephony features, supported on a limited range of basic IP<br />

fixed handsets or analogue handsets (via gateways).<br />

Standard Voice – as Basic Voice plus additional features (including Assistant/Manager,<br />

Extension Mobility, Click-to-Call, and Multi-Line Appearance) supported on the full range<br />

of End User devices<br />

Mobility Voice – as Standard Voice plus additional features including Single Number<br />

Reach, Desk & Mobile Pick Up and Single Business Voicemail.<br />

The Feature Packs include PSTN network access, and as such this does not have to be<br />

ordered separately.<br />

CaaS shall support several codec types including G.711, G.722 and G.729.<br />

Voicemail Features<br />

Voicemail Box<br />

Voicemail Access<br />

Security features<br />

SpeechConnect and Auto Attendant<br />

Visual Voicemail (viewing voicemail messages like email on suitable IP Phone Displays)<br />

Message Waiting Indication<br />

Optional SpeechView (speech to text transcription)<br />

Optional Integrated Email and Voicemail with SMS notification<br />

Optional live recording of conversations.<br />

Audio Conferencing<br />

The Contractor shall provide a fully featured Audio Conferencing <strong>Service</strong>, offering both<br />

Reservationless and Operator Attended conferencing capabilities and optional integrated web<br />

conferencing. This scalable solution shall be offered in a variety of commercial models to suit<br />

the needs of most organisations.


The Contractor shall also offer dedicated hardware located on the Customer’s premises<br />

where Customer conferencing volumes deem such a solution to be more beneficial. These<br />

components shall be managed by the Contractor.<br />

Operator Console Options<br />

The option of one or multiple (up to 100) operator consoles shall be offered, capable of<br />

supporting in excess of 30,000 End Users. The consoles can be distributed around the<br />

Customer’s estate to support local as well as centralised operator functionality. Supported<br />

features include:<br />

226<br />

A customised operator keyboard as standard for each operator position<br />

Each DDI, CLI or Queue can be set a priority – the organisation defines how important<br />

each call is.<br />

Emergency overflow and busy overflow.<br />

Out-of-hours queues.<br />

Call Parking with Recall timer – limitless number of calls parked.<br />

Call Hold.<br />

Camp-On – the facility to be able to “camp” a call on a busy extension for a given time.<br />

Timers for Transfer Recall, Camp-On Recall and Hold Recall.<br />

Queue Flagging – for Operator to identify incoming calls.<br />

Unlimited queues with queue colour Indicators.<br />

Multiple search facility, up to seven (7) fields searchable from a choice of 13 fields – all<br />

of which can be user defined, directory shrinking display – only valid names shown to<br />

operator when part of name typed.<br />

Keyboard or Mouse Operated.<br />

4,000-extension Busy Lamp Field (real-time monitoring of extensions).<br />

Speed Dials.<br />

Unlimited queues.<br />

Send calls to voice mail.


Call Logging<br />

227<br />

Unlimited calls on hold.<br />

The Contractor shall offer options for the Customer to have the capability to view, analyse<br />

and manipulate their call data which allows them to manage their user estate, check for<br />

fraudulent use and identify high cost areas.<br />

IM & Presence Features<br />

Enterprise-grade Instant Messaging: Secure, rich-text IM, Group Chat, Subscriber<br />

History, Multi-device IM, Media Escalation, Persistent Chat Rooms.<br />

Rich Network Presence: Always-on telephony presence, always-on calendar presence,<br />

network-based presence aggregation from multiple sources and clients, third-party<br />

presence applications, network-enforced presence policy.<br />

Standard, Blocked, Do Not Disturb and custom presence notifications.<br />

Control who views presence information.<br />

Escalate to Group Chat.<br />

File transfer.<br />

Video Telephony<br />

End Users with a suitable soft client or video-enabled handset shall be able to make point-<br />

to-point video telephony calls to other End Users on the CaaS network.<br />

Connectivity<br />

CaaS <strong><strong>Service</strong>s</strong> require the presence of a suitable WAN to provide data links between the<br />

Contractor’s data centres and the Customer sites (and also between the sites themselves). The<br />

WAN must comply with prerequisites (in terms of bandwidth, jitter, delay, QoS, VLANs, etc.)<br />

necessary to support the CaaS real-time multimedia services.<br />

PSTN Network <strong><strong>Service</strong>s</strong>


Access to the PSTN is included within the Voice Feature Packs and does not have to be<br />

ordered separately. Access to the PSTN shall be via the Contractor’s WAN and the Contractor’s<br />

platforms.<br />

Handsets and Soft Clients<br />

The Contractor shall offer a selection of End User devices including Featurephones and soft<br />

clients to cater for End User needs ranging from basic telephony in public places through to<br />

executive devices, soft-clients and video-enabled endpoints.<br />

IP Featurephones<br />

Cisco 3905<br />

Cisco 6901<br />

Cisco 6921<br />

Cisco 6941<br />

Cisco 6961<br />

Cisco 7911G<br />

Cisco 7931G<br />

Cisco 7942G<br />

Cisco 7945G<br />

Cisco 7965G<br />

Cisco 7975G<br />

Cisco 7985G<br />

Cisco 8961<br />

Wireless<br />

Cisco 7921G<br />

Cisco 7925G<br />

Video<br />

228<br />

Cisco 8945<br />

Cisco 9951 with video camera option<br />

Cisco 9971 with video camera option


Conference<br />

Cisco 7937G<br />

Soft Clients<br />

Cisco Unified Presence Client (required for video, IM&P and soft phone)<br />

CUCI-Lync (when used in conjunction with Microsoft Lync Connector)<br />

The Contractor shall offer a “Bring Your Own Device” option whereby the Customer sources<br />

their own IP Featurephones to use with the CaaS service. These may be devices that are listed<br />

above or from other approved third party suppliers.<br />

The Contractor shall offer the option of supporting the connection and the use of older<br />

analogue devices by means of gateways deployed at the Customer’s premises.<br />

Connector Options<br />

A connector is an interface that enables defined interactions between CaaS and an external<br />

system or component. Where the Customer deployment requires it the connector will include<br />

physical hardware or connectivity. The need to order one or more connectors from the<br />

connector library shall be identified by the Contractor during the initial consultation period, or<br />

after the service has gone live via an agreed change control process.<br />

The Connector library shall include:<br />

229<br />

PBX Connector: Used to provide inter-working between the Customer’s existing PBX<br />

network and CaaS during the service transition period. The connector interface shall be<br />

available in several options to support both TDM (as E1 circuits running Q.931, QSIG or<br />

DPNSS protocols) and IP (H.323 or SIP protocols).<br />

Microsoft Lync Connector: Used to provide inter-working of voice and collaboration<br />

services between the Customer’s CaaS network and a Microsoft LYNC network.


230<br />

Corporate Directory Connector: Used to enable the use of a Customer’s corporate<br />

directory system (e.g., using LDAP) as the source of contact data in the CaaS services.<br />

Third Party SIP Trunk Connector: Used to enable the use of SIP trunks from third parties<br />

such as carriers, mobile networks and conferencing service providers.<br />

Contact Centre Connectors: Used to enable CaaS inter-working with certain Contact<br />

Centre applications – including Genesys and Cisco Contact Centre Enterprise.<br />

Resiliency Options<br />

The Contractor shall offer resiliency options to operate in the event that CaaS becomes<br />

unavailable to End User sites (due to a failure of part or all of the WAN, for instance):<br />

Local Site Survivability Mode – ability to support voice services between users on the<br />

local site.<br />

Inter-Site Survivability Mode – ability to support voice services between users within the<br />

Customer’s estate (subject to inter-site WAN being available).<br />

PSTN Break-Out Survivability – ability to call external users.<br />

PSTN Break-In and Out Survivability – ability to call and receive calls from external users.<br />

Professional <strong><strong>Service</strong>s</strong><br />

The Contractor shall offer Professional <strong><strong>Service</strong>s</strong> in respect of designing the Customer’s<br />

solution, project management and programme management of any element of the solution<br />

including the transition from their existing solution over to CaaS. This shall include a range of<br />

training options for End Users.<br />

PBX Maintenance <strong><strong>Service</strong>s</strong><br />

The Contractor offers a PBX Maintenance service option that provides maintenance cover<br />

primarily for legacy TDM-based PBX networks. This service, delivered via a Sub-Contractor,<br />

offers a useful complement to CaaS in supporting the existing PBX network during the transition<br />

period over to CaaS.


<strong>Service</strong> Provision<br />

The Contractor shall provide:<br />

231<br />

<strong>Service</strong> Description<br />

Discovery Days<br />

Customer<br />

Experience &<br />

Solution Design<br />

CaaS Platform<br />

Configuration<br />

Connector<br />

Configuration<br />

Initial face-to-face discussions with Customers to<br />

determine overall business goals, understand the<br />

current infrastructure and business processes, and<br />

explore possible options, understanding where they<br />

want to get to in the short, medium and long term.<br />

Output from this process shall be a strategic<br />

document proposing an optimum service and a<br />

roadmap to the end state.<br />

Deeper analysis of the Customer’s existing structure<br />

and how it is to be transformed into the new solution.<br />

Specifically, this shall define the requirements, explain<br />

how it is to be developed, identify the connectivity<br />

options, and explain how it shall be delivered and<br />

what it shall include.<br />

� Network Configuration – building the<br />

technology instances to support the Customer<br />

estate (e.g., sites, dial-plan).<br />

� Systems Configuration – enabling reporting,<br />

billing, etc.<br />

� Feature Pack Configuration.<br />

� Testing – testing the various elements of the<br />

CaaS service for correct operation.<br />

� Deployment – activation of the environment for<br />

use.<br />

Note – many of these configuration activities shall be<br />

transparent to the Customer.<br />

Integration of the Customer estate with the CaaS<br />

environment shall require a joint effort between both<br />

parties. Deploying Connectors shall entail the<br />

following stages:<br />

� Connector Build – implementation required to<br />

support integration with the Customer estate.<br />

� Integration Testing – testing the Connectors<br />

with elements of the CaaS service for correct<br />

operation.


On-Site Transition<br />

Project<br />

Management<br />

232<br />

� User Acceptance Testing – working with a key<br />

representative in the Customer organisation to<br />

ensure that functionality matches the designed<br />

expectation.<br />

� Deployment – activation of the Connector for<br />

use in the live environment.<br />

� <strong>Service</strong> Readiness Testing – validating<br />

operation and supportability of the connector.<br />

The Detailed Connector Design(s) shall be a key input<br />

into this activity.<br />

The deployment of CaaS services shall require a level<br />

of activity at each Customer location. The activities<br />

vary based on the particular services required,<br />

however typically the following steps shall be<br />

undertaken for each on-site transition:<br />

� On-Site Survey – validating the On-Site Design<br />

and assessing installation practicalities for the<br />

deployment.<br />

� Readiness validation – confirming Connectivity<br />

(WAN and LAN) and that dependencies are in<br />

place prior to installation & deployment.<br />

� Shipping, deployment & testing of End User<br />

devices.<br />

� Installation – installation of any equipment<br />

needed on-site including End User devices.<br />

� Deployment – migration and activation of the<br />

site for use in the live environment.<br />

� <strong>Service</strong> Readiness Testing – validating<br />

operation and supportability of the location.<br />

When transitioning the existing estate, or even<br />

implementing a significant change to the existing<br />

services offered, the Contractor’s Project Managers<br />

shall help plan, organise, secure and manage the<br />

resources required to deliver this capability.<br />

Project Management services may extend beyond the<br />

Contractor’s direct organisation and include, where<br />

agreed, the management of nominated<br />

teams/resources within the Customer’s organisation<br />

as well as their existing third parties.


<strong>Service</strong> Management<br />

The Contractor offers CaaS as a fully managed service. Provision shall be made via<br />

Helpdesks and processes for Customers to request changes and to obtain assistance, support<br />

and advice in using their CaaS services. The operations services shall ensure that any<br />

requirements shall be responded to and any issues with a Customer’s services shall be<br />

identified and resolved.<br />

Key elements in the <strong>Service</strong> Management portfolio are:<br />

233<br />

<strong>Service</strong> Desk – manned by the Contractor’s <strong>Service</strong> Desk Analysts who will support the<br />

Customer.<br />

Used to manage, track and update Incidents and Requests.<br />

Used to escalate Incidents and Requests where necessary.<br />

Used to manage orders, service changes and Moves, Adds and Changes.<br />

Used to request management reports.<br />

Available 24x7.<br />

<strong>Service</strong> Desk calls shall be answered in under 20 seconds 90% of the time.<br />

Emails shall be automatically acknowledged as received by return and then<br />

responded to within 24 hours.<br />

New account requests received on working day 1 shall be actioned and welcome<br />

email sent to End User by close of business on working day 3.<br />

Password and PIN changes shall be completed in less than four (4) hours.<br />

Account amends and deletions shall be completed in less than 24 hours.<br />

Incident Management Process – Will resolve service interruptions or degradations<br />

reported by a Customer. The Incident reporting process shall be the only available<br />

method of officially logging an Incident and SLA tracking. Incidents shall be reported via<br />

telephone and entered on the system by the Contractor on the Customer’s behalf. A<br />

unique incident ticket number shall be generated for the purpose of tracking, which will<br />

be sent to the user when the request is submitted. This receipt shall be timed and<br />

dated.<br />

The Contractor shall seek to resolve incidents at the first point of contact, namely<br />

the <strong>Service</strong> Desk. More complex incidents shall be escalated internally to second and if<br />

necessary third-line resources.


234<br />

Responses as per the SLA shall be communicated by phone or by email/SMS to the<br />

user as requested by the Customer. For clarity, the Customer ‘user’ might be an<br />

individual, the Administrator or the Customer’s internal IT Helpdesk. Although the latest<br />

information regarding an incident shall always be available on contact, any regular<br />

updates regarding the incident shall be made to the email address of the individual who<br />

raised the incident (or optionally using SMS).<br />

Incidents shall be classified by the Contractor at a ‘priority’ level which shall then<br />

determine the times for both responding to and resolving the fault.<br />

Request Management – Will actively process and track fulfilment requests both for<br />

requests for a new site and for change requests to existing sites. Fulfilment requests<br />

received via the <strong>Service</strong> Desk shall be tracked and managed according to their respective<br />

SLAs. A list of possible requests shall be defined with pre-agreed pricing and an assured<br />

lead-time.<br />

Moves, Adds, Changes & Deletions (MACD) <strong>Service</strong> – Will manage soft changes to the<br />

Customer’s estate and services. The MACD <strong>Service</strong> team shall integrate with the<br />

processes inside a Customer’s organisation for outsourcing the day-to-day MACD<br />

management of their Communications <strong><strong>Service</strong>s</strong>.<br />

Reporting – CaaS offers a range of standard reports that enable Customers to review<br />

their usage of the services and the performance of their services. Standard reports can<br />

be scheduled to be produced and emailed to pre-defined Customer recipients. All<br />

reports can be requested via the <strong>Service</strong> Desk. A selection of example report<br />

requirements is given below:<br />

Estate Inventory Reports<br />

Incident Reports<br />

Financial Management Reports<br />

Capacity & Performance Reports<br />

Order Reports<br />

<strong>Service</strong> Usage Reports.<br />

End User Helpdesk –optional service providing a contact point for the<br />

Customer’s End Users:<br />

Seeking assistance with using specific capabilities and End User devices.<br />

Confirming the services that the Customer is contracted to receive.<br />

Seeking support on any aspects of the service.


<strong>Service</strong> Monitoring<br />

235<br />

Responding to “How do I …?” queries.<br />

Resetting account-access such as Voicemail PINs, Self-<strong>Service</strong> Logins, etc.<br />

(subject to the user confirming their identity).<br />

Availability: Standard from Monday to Friday 09:00 to 17:00, with options to<br />

extend to 6 days 09:00 to 17:00 or to 24/7.<br />

<strong>Service</strong> Desk calls shall be answered in under 20 seconds 90% of the time.<br />

Password and PIN changes shall be completed in real-time (subject to successful<br />

user validation).<br />

The Contractor shall proactively monitor and test the service platforms on a 24x7 basis. The<br />

Contractor shall take the necessary action to rectify any problems found as a result of the<br />

proactive testing, any alarms generated or any detected performance degradation.<br />

Capacity Management<br />

CaaS is built with scalability to meet individual Customer requirements. There shall be a<br />

standard 10% capacity contingency to allow Customers to flex their requirements without the<br />

need to wait for capacity upgrades. PSTN access is inclusive and automatically catered for in the<br />

volume of user subscriptions.<br />

Use of Sub Contractors<br />

There are no sub contractors in the supply of the CaaS services.<br />

IP TRUNK SERVICE OVERVIEW<br />

The IP-based Voice Public Switched Telephony <strong>Service</strong> provides IP voice connections from<br />

the Contractor’s Switched Network to the Customer premises’ IP PBX or IP Contact Centre<br />

Equipment.


The Contractor shall provide and manage all aspects of the <strong>Service</strong> and will be the single<br />

point of contact for all service queries.<br />

High Level <strong>Service</strong> Offering<br />

The <strong>Service</strong> will be made up of the following components.<br />

236<br />

Lines: IP Voice Virtual Trunks between the Customer’s data network and the<br />

Contractor’s data network and IP ‘softswitch’<br />

Minutes: Call charges<br />

Numbers: Geographic & non-geographic DDIs<br />

Number portability: Import and export<br />

Calling & network features: Call Barring, CLI Presentation<br />

Phonebooks and directory listings<br />

Web-based Cost Reporting and Management Tool: Call Management Network.<br />

<strong>Service</strong> Description (Applies for all service offerings)<br />

The IP Trunk <strong>Service</strong> shall enable Customers to place and receive inbound and outbound<br />

voice telephony calls.<br />

The Customer’s IP PBX or IP Contact Centre will integrate with the Contractor’s softswitches<br />

using the Customers WAN. The Contractor’s softswitches will be fully resilient and will be<br />

located in geographically diverse Contractor network sites. The softswitches connect to the<br />

Contractor’s PSTN and therefore with BT, other licensed operators (OLOs) in the UK, and<br />

carriers in more than 170 countries.<br />

The Infrastructure that supports the service is supported 24 hours per day, seven (7) days<br />

per week from dual UK Network Operations Centres.


The service will provide a number of service features including but not limited to:<br />

Feature Name Function / Benefit<br />

Changed Number Announcement Lets callers know you have changed<br />

Connected Line Identification<br />

Presentation<br />

Connected Line Identification<br />

Restriction<br />

237<br />

your number<br />

Shows the number you have<br />

connected to<br />

Blocks the number you have<br />

connected to<br />

Caller ID Presentation Shows your telephone number to the<br />

called party<br />

Caller ID Restriction Blocks your Telephone Number from<br />

Professional <strong><strong>Service</strong>s</strong><br />

the called party<br />

The Contractor shall, if requested, provide Professional <strong><strong>Service</strong>s</strong> to design and deliver the<br />

service.<br />

Technical Characteristics<br />

The <strong>Service</strong> shall support the following line types:<br />

Both-way lines


238<br />

Both-way lines with DDI.<br />

The <strong>Service</strong> shall support the following signalling protocols;<br />

H323<br />

SIP.<br />

The <strong>Service</strong> shall support the following voice codecs:<br />

G729<br />

G711.<br />

Access Method<br />

The Contractor shall supply the <strong>Service</strong> over the Customer’s WAN or via the <strong>PSN</strong><br />

Resiliency Options<br />

Single Trunk connected to Single Session Border Controller<br />

Dual Trunks connected to Single Session Border Controller<br />

Dual Trunks connected to Dual Session Border Controllers<br />

<strong>Service</strong> Approach<br />

The Contractor will provide:<br />

Configuration of the softswitch to interwork with the Contractor’s IP Voice<br />

infrastructure to the agreed solution design<br />

Configuration of the new or ported numbers or DDIs on the access circuits as requested<br />

by the Customer.<br />

All necessary wiring and equipment up to the <strong>Service</strong> Demarcation Point.<br />

Requests for new Customer IP-Trunk or Configuration Changes to an existing Customer IP-<br />

Trunk shall be processed and approved via the <strong>Service</strong> Change Request Procedure. Charges for<br />

such changes shall be made in accordance with an agreed Change Control Procedure.<br />

Agreed Delivery Date


Following the preparation of the Customer IP Voice estate by the Customer, the Contractor<br />

will implement the <strong>Service</strong> or a Configuration Change for the particular Customer IP Trunk (as<br />

applicable) by the Agreed Delivery Date.<br />

The Contractor shall only provide service to those IP Voice estate types it has tested and<br />

knows to be compatible with the <strong>Service</strong>.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

The Contractor shall, if requested, provide a monthly service platform report to the<br />

Customer, the content of which shall be agreed in advance between the Customer and the<br />

Contractor.<br />

The Contractor will support e-billing reports for non-geographic Inbound Call Management<br />

numbers.<br />

The Contractor will carry out fault management that will use reasonable endeavours to<br />

restore service operation to agreed service levels.<br />

The Contractor will provide fault support 24x7. The Customer will report any suspected<br />

faults in the service to the Contractor and provide the following details:<br />

239<br />

The name of the service affected<br />

Address details of the site(s) affected<br />

Telephone number(s) of the site(s) affected.<br />

The Contractor will log the fault and attempt to contact a nominated Customer<br />

representative to provide updates on progress until the fault is resolved. The Contractor will


carry out root cause analysis (where appropriate to the severity of the fault) and provide<br />

resolution details for individual faults, including details on the fix to the fault and its cause.<br />

Once this has been provided, the Contractor will agree with the Customer to formally ‘close’ a<br />

fault.<br />

Use of Sub Contractors<br />

There are no sub contractors involved in the supply of this service.<br />

TDM VOICE SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

A TDM-based Voice Public Switched Telephony service providing ISDN and Analogue PSTN<br />

line connections from the Contractor’s Switched Network to the Customer premises PBX or<br />

Contact Centre Equipment.<br />

The Contractor shall provide and manage all aspects of the service and be the single point of<br />

contact for all service queries.<br />

The service may be delivered either directly from the Contractor’s exchange using the<br />

Contractor’s Network, or via the BT local loop using Wholesale Line Rental and Carrier Pre-<br />

Selection.<br />

High-Level <strong>Service</strong> Offering<br />

Lines – ISDN and Analogue<br />

Minutes – Call Charges<br />

240


Numbers – Geographic and Non-Geographic, as well as Geographic DDIs<br />

Number Portability – Import and Export<br />

Calling and Network Features – Call Barring, CLI Presentation<br />

Short code ‘extension-to-extension’ dialing and reduced call charges between closed user<br />

group sites if the Voice VPN option is chosen<br />

Phonebooks and Directory Listings<br />

Web-based Cost Reporting and Management Tool – Call Management Network<br />

<strong>Service</strong> Description (Applies for all <strong>Service</strong> Offerings)<br />

The TDM Voice <strong>Service</strong> shall enable Customers to place and receive inbound and outbound<br />

voice telephony calls.<br />

The service will be provided on the Contractor’s switched voice network. The Contractor’s<br />

switched voice network is based on Time Division Multiplexing (TDM) supported by the<br />

Contractor’s SDH transmission. The network interconnects with BT, other UK OLO and carriers<br />

in more than 170 countries directly and is supported 24x7, 365 days a year from dual UK<br />

Network Operations Centres.<br />

The service will provide a number of service features including, but not limited to:<br />

Feature Name Function/Benefit<br />

241


Changed Number<br />

Announcement<br />

242<br />

Lets callers know you have changed your<br />

number<br />

Advice of Charge at end of Call Lets you know how much the call just cost<br />

Anonymous Call Rejection Lets you reject a call where CLI is withheld or<br />

not available<br />

3-Way Calling Joins three parties together for a simple<br />

conference call.<br />

Basic Divert Diverts calls to a main number or range to an<br />

alternative number or range<br />

Bypass Number Lets you override a call divert and reach the<br />

diverted number<br />

Call Barring Bars outgoing calls to national, international,<br />

premium rate and operator services<br />

Call Divert Divert calls to an alternative number<br />

Call Forwarding – Busy, No<br />

reply, Unconditional<br />

Forward calls on busy, no reply or all<br />

conditions<br />

Call Waiting Warning beep to let you know another caller


Connected Line Identification<br />

Presentation<br />

Connected Line Identification<br />

Restriction<br />

243<br />

is attempting to call<br />

Shows the number you have connected to<br />

Blocks the number you have connected to<br />

Caller ID Presentation Shows your telephone number to the called<br />

party<br />

Caller ID Restriction Blocks your telephone number to the called<br />

party<br />

Cost Centre Codes Tags each outbound call with a code so the<br />

cost can be cross-charged to a department or<br />

division of the business<br />

Divert on Circuit Failure or Busy Re-routes the call if line is busy or out of<br />

order<br />

Malicious Call ID Marks the call as malicious to aid tracing<br />

Presentation Number Presents a preferred number for your<br />

Customers to call you back on


Short Code Dialling Store numbers on the network for access via<br />

244<br />

a short code<br />

Last Number Announcement Displays identity of last caller<br />

Time and Date Date and time stamp of each call<br />

Professional <strong><strong>Service</strong>s</strong><br />

The Contractor shall, as an option, provide professional services to design and deliver the<br />

service.<br />

Technical Characteristics<br />

The <strong>Service</strong> shall support the following Line Types:<br />

Incoming only<br />

Incoming only with DDI<br />

Outgoing only<br />

Both-way<br />

Both-way with DDI<br />

Primary Rate and Basic Rate ISDN lines<br />

Single and Multi-line Analogue lines.<br />

The <strong>Service</strong> shall support the following ISDN Signalling Protocols:<br />

ISDNQ931<br />

ISDNQ931e<br />

ISDN DASS<br />

DPNSS.<br />

The <strong>Service</strong> shall support the following ISDN Circuit Presentation Types:


245<br />

G703 and G704 Framed or Unframed<br />

75ohm Balanced or Unbalanced<br />

RJ45 Connector or BNC type connector<br />

Channelised higher order bearers are also available subject to agreement.<br />

Access Method<br />

The Contractor will supply the <strong>Service</strong> using the most appropriate of the following delivery<br />

methods:<br />

Own fibre connection<br />

Own copper connection<br />

Own microwave radio link<br />

Third party fibre connection<br />

Third party copper connection<br />

Wholesale line rental<br />

Carrier pre-selection.<br />

Resiliency Options<br />

The Contractor will support the following <strong>Service</strong> resiliency options:<br />

Dual Parented – Two access circuits, hosted off two separate exchanges, delivered via<br />

two separate network access points. Both circuits run in load-sharing mode with all<br />

traffic picked up by the other exchange if either fails.<br />

Diverse Routing – Two network access connections with both routed via separate cables<br />

into separate building entry points.<br />

Disaster Recovery – Pre-defined Incoming call routing plans that are invoked to re-route<br />

calls to alternative destinations should one or more Customer sites become inaccessible<br />

due to a major emergency (for example: fire, flood, act of terrorism or civil unrest).<br />

Non-Resilient – A single access circuit connecting the Customer’s PBX to the Contractor’s<br />

Switched Network.<br />

<strong>Service</strong> Approach<br />

General;


246<br />

The Contractor will provide:<br />

(a) Access circuit(s) between the network access node and Customer premises<br />

(b) Line termination equipment at the Customer premises<br />

(c) Configuration of the access circuits on the switched network<br />

(d) Configuration of the new or ported numbers or DDIs on the access circuits<br />

as requested by the Customer<br />

(e) All necessary wiring and equipment up to the <strong>Service</strong> Demarcation Point.<br />

Requests for new Customer sites or Configuration Changes to an existing Customer site<br />

shall be processed and approved via the <strong>Service</strong> Change Request Procedure. Charges for<br />

such changes shall be made in accordance with an agreed Change Control Procedure.<br />

Agreed Delivery Date<br />

Following the preparation of the Customer Sites by the Customer, the Contractor will<br />

implement the <strong>Service</strong>, or a Configuration Change for the particular Customer site as<br />

Applicable, by the Agreed Delivery Date.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

The Contractor shall, if requested, provide a monthly service platform report, the content of<br />

which shall be agreed in advance between the Customer and Contractor.<br />

The Contractor will support e-billing reports for non-geographic Inbound Call Management<br />

numbers.<br />

The Contractor shall carry out fault management that will use reasonable endeavours to<br />

restore service operation to within agreed service levels.<br />

The Contractor will provide fault support 24x7. The Customer will report any suspected<br />

faults in the service to the Contractor and provide the following details:


247<br />

Name of the service affected<br />

Address of the site(s) affected<br />

Telephone number(s) of the site(s) affected.<br />

The Contractor will log the fault and attempt to contact a nominated Customer<br />

representative to provide updates on progress until the fault is resolved. The Contractor will<br />

carry out root cause analysis (where appropriate to the severity of the fault) and provide<br />

resolution details for individual faults, including details on fault fix and cause of fault. Once this<br />

has been provided the Contractor will agree with the Customer to formally ‘close’ a fault.<br />

Use of Sub Contractors<br />

There are no sub contractors in the supply of this service.<br />

INBOUND CALL MANAGEMENT SERVICE OVERVIEW<br />

Inbound Call Management is a service that enables callers to contact an organisation using a<br />

variety of geographic, non-geographic and premium rate numbers.<br />

High Level <strong>Service</strong> Offering<br />

The Contractor’s Inbound Call Management service offers:<br />

Premium rate<br />

Non-geographic numbers<br />

Porting.<br />

<strong>Service</strong> Description (Covering All High Level <strong>Service</strong> Offerings)<br />

The Contractor’s Inbound Call Management services will offer the following Inbound Call<br />

Management numbers:<br />

0800 / 0808, 01 and 02 (calls routed non-geographically),


248<br />

03<br />

0843 / 0844<br />

0845, 0870, 0871, 0872, 0873<br />

09<br />

International freephone. The international freephone service enables callers overseas to<br />

dial a local toll-free number to connect to a site in the UK.<br />

Inbound Call Management numbers will be capable of being delivered in a variety of ways.<br />

Calls will be routed by the Contractor’s Intelligent Network and will be delivered directly to a<br />

specified phone line or routed to variable destinations using criteria stored in a call plan routing<br />

script. Example call plans include routing by time of day or day of the week.<br />

The Contractor will deliver all calls either to a UK PSTN telephone number (which are<br />

numbers beginning with either 01 or 02), to mobile telephone numbers or, where regulation<br />

permits and the contractor agrees to do so, to international telephone numbers. Onward<br />

connection to mobile and international telephone numbers attracts a per minute call delivery<br />

charge.<br />

Calls to premium rate numbers are delivered to UK exchange lines directly connected to the<br />

Contractor’s network. This enables the Contractor to securely route the call directly to a circuit<br />

provided by the Contractor, eliminating the opportunity for a caller to dial a PSTN number and<br />

bypass the use of the premium rate number.<br />

Inbound Call Management numbers differ due to way in which the cost of the call is divided.<br />

The cost of calls made to 03, 0870, 01 and 02 numbers is shared between the Customer<br />

and the caller.


249<br />

The cost of calls to 0843, 0844 and 0845 numbers is shared between the Customer and<br />

the caller, but out-payment revenue share may be available depending on the volume of<br />

minutes and the charging point.<br />

The cost of calls made to 0871, 0872, 0873 and other premium rate numbers is paid for<br />

by the caller. The Contractor will support out-payment revenue share depending on the<br />

volume of minutes and the Customers charging point.<br />

The cost of calls made to UK and international freephone numbers is paid by the<br />

Customer.<br />

Depending on availability, the Contractor is able to provide memorable numbers (gold or<br />

silver), which are non-geographic numbers that are classified by the Contractor as being easy<br />

for callers to remember.<br />

Inbound Call Management numbers that have been allocated to the Customer by other<br />

network providers can be ported to the Contractor’s Intelligent Network. If the Customer<br />

moves to another provider and wishes to retain the number that the Contractor has allocated,<br />

the Contractor will port the number to another network provider on request.<br />

A call routing script controls the way that calls are delivered. This is a systematic and logical<br />

scheme for routing calls received by the Contractor’s Intelligent Network based on a variety of<br />

circumstances including time of day, day of the week, ratio of calls and area of origin.<br />

Optionally, the Contractor will provide the Customer with access to the Inbound Call<br />

Reporting tool, which is a web-based software tool that enables the Customer to view and<br />

analyse live and historic call statistics about the Customers Inbound Call Management service<br />

usage.<br />

<strong>Service</strong> Provision – Approach (Delivery inc where applicable Design and Build)


An Inbound Call Management number will be reserved for a period of six months – subject<br />

to that number not already being allocated or reserved by any other Customer – and is<br />

available for allocation by the Contractor. The number will revert to being generally available<br />

for all of the Contractor’s Customers if they do not subsequently order the reserved number to<br />

make it live on the Contractor’s network.<br />

Inbound Call Management services are ordered by completion of the appropriate order<br />

form and submission of this to the contractor.<br />

If there is no call plan, the Contractor will implement or reconfigure an existing non-<br />

geographic number within 24 hours of receipt by the Contractor of the request, subject to<br />

agreeing the request is a chargeable fast track order.<br />

Where a call plan is required or exists, implementation or reconfiguration will take up to 20<br />

working days from receipt of the order by the Contractor.<br />

The Contractor will set up agreed call plans and, if requested, will provide the Customer<br />

with a self service application to allow the Customer to download a current call plan, and<br />

amend and upload this. Any amended call plans will be automatically sent to the Intelligent<br />

Network for processing and implementation.<br />

The target lead time for international freephone is dependent on the carriers within the<br />

countries in which the Inbound Call Management services are being set up. As a guide only,<br />

services are provided within 30 days of receipt by the Contractor of an order.<br />

250


<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

The Contractor shall, if requested, provide a monthly service platform report to the<br />

Customer, the content of which shall be agreed in advance between the contractor and the<br />

Customer.<br />

The Contractor offers e-billing reports for non-geographic Inbound Call Management<br />

numbers.<br />

The Contractor shall carry out fault management that will use reasonable endeavours to<br />

restore service operation within agreed service levels.<br />

The Contractor will provide fault support 24 hours a day, 7 days a week.<br />

The Customer will report any suspected faults in the service. The Contractor will log such<br />

faults and attempt to contact the Customer’s representative to provide updates on progress<br />

until the fault is resolved. The Contractor will carry out root cause analysis (where appropriate<br />

to the severity of the fault) and provide resolution details for individual faults, including details<br />

on the fix and the original cause of fault. Once this has been provided the Contractor will agree<br />

with the Customer to formally ‘close’ a fault.<br />

Use of Sub-Contractors<br />

There are no sub contractors in the supply of this service.<br />

PBX MAINTENANCE SERVICE DESCRIPTION<br />

The Contractor’s PBX Maintenance provides the capability to delegate responsibility for<br />

maintaining existing PBXs and other telephony equipment to the Contractor charged on a per-<br />

251


port basis. It is available, as standard, as a break/fix service and a monitoring service. Backup<br />

battery support is also available.<br />

High-Level <strong>Service</strong> Offering<br />

252<br />

Break/Fix Maintenance service<br />

PBX Maintenance Plus service<br />

Battery care.<br />

<strong>Service</strong> Description<br />

Break/Fix Maintenance <strong>Service</strong><br />

The Break/Fix Maintenance service comprises the following basic elements, which can be<br />

combined in any way to deliver the service to the Contractor:<br />

Estate audit, where necessary (at an additional charge)<br />

New and replacement equipment procurement, installation and configuration<br />

Inventory management<br />

Single per-port charge<br />

Single point of contact<br />

Choice of four service levels<br />

Reactive fixing of faults resulting from daily use and normal wear and tear, remotely<br />

where possible, including fitting and testing of replacement equipment<br />

Engineer site visit if the fault cannot be fixed remotely<br />

Technology refreshes and software upgrades as required and contracted with<br />

manufacturers<br />

Moves, adds and changes<br />

Customised plan for migration to IP telephony.<br />

PBX Maintenance Plus <strong>Service</strong><br />

The PBX Maintenance Plus service provides, in addition to the options available in the<br />

Break/Fix maintenance service, a remote monitoring facility to monitor the Customer’s


equipment for alarms 24x7. The PBX Maintenance Plus service requires additional monitoring<br />

devices either fitted, or with access, to the Customer’s equipment.<br />

Types of Equipment Covered (both Break/Fix and PBX Maintenance Plus <strong><strong>Service</strong>s</strong>)<br />

The Contractor will investigate support options for the Customer’s estate at the pre-sales<br />

stage. Any PBX types or models that are outside the Contractor’s capability to support that<br />

equipment will be excluded from the PBX Maintenance <strong>Service</strong>.<br />

Handsets are specifically excluded from the service and are not normally considered as part<br />

of the maintained estate. A handset replacement service can be supplied, as an option, as an<br />

alternative to maintenance and repair.<br />

Equipment Ownership (both Break/Fix and PBX Maintenance Plus <strong><strong>Service</strong>s</strong>)<br />

Under the PBX Maintenance <strong>Service</strong>, the Contractor maintains the Customer equipment.<br />

The Customer will own the equipment and remain responsible for decommissioning and<br />

disposal of equipment, where necessary.<br />

The Contractor will, where requested, procure equipment on the Customer’s behalf and<br />

supply quotes for purchase, installation, configuration and testing.<br />

Access Lines and Port Cabling (both Break/Fix and PBX Maintenance Plus <strong><strong>Service</strong>s</strong>)<br />

Access to the PBX to and from the PSTN, and cabling between the PBX and the port<br />

telephone handset or device are not included in the PBX Maintenance <strong>Service</strong>.<br />

Battery Care<br />

253


The Contractor will supply, as an option, a Battery Care <strong>Service</strong>, under which the Contractor<br />

will carry out the following:<br />

254<br />

Check batteries for age, case distortion and electrolyte leakage<br />

Check the charger output voltage<br />

Perform discharge or temperature tests to check the condition of the batteries.<br />

Discharge tests will be chargeable<br />

Estimate remaining battery life<br />

Provide a report detailing the current condition of the batteries and their estimated<br />

remaining life.<br />

The Battery Care <strong>Service</strong> includes regular inspection of backup batteries, but does not<br />

include the cost of battery replacement. Where a battery is found to be losing electrolyte, or<br />

that the case is distorted, or if the battery has exceeded its estimated life, the Contractor will<br />

replace it in accordance with the manufacturer’s instructions.<br />

Technical Characteristics for all <strong>Service</strong> Offerings<br />

Standard Room Requirements<br />

The Contractor is responsible for providing a room that meets the following requirements:<br />

A minimum of three 13 amp mains power outlets, within two metres of the PBX system<br />

(each additional cabinet will need at least one additional socket)<br />

A dedicated switched and fused mains power supply ring.<br />

Telecoms earth (10mm2 and directly connected to CMET) within two metres of the PBX<br />

system and with one metre of spare coiled cable for termination<br />

Interfaces to existing cabling infrastructure, where applicable, within five metres of the<br />

PBX system<br />

A load-bearing wall, where applicable<br />

Network access – i.e. a network termination point (NTP) within five metres of the PBX<br />

system


255<br />

A directly connected analogue exchange line for remote maintenance, connected within<br />

five metres of the PBX system<br />

A direct analogue exchange line for call logging, if applicable, connected within five<br />

metres of the system.<br />

If the standard room requirements are not met, there will be an additional charge for<br />

delivery of services.<br />

<strong>Service</strong> Provision<br />

Estate Audit<br />

The Contractor will produce a bespoke quotation for each PBX Maintenance <strong>Service</strong>. To<br />

provide a quote, the Contractor will require details of the equipment to be maintained,<br />

including the PBX type, location, manufacturer, age, features, software releases and options<br />

required. Where the Customer is unable to provide sufficient detail for a quotation to be<br />

produced, the Contractor can arrange for an estate audit to be conducted. There will be an<br />

additional charge for this service.<br />

For the PBX Maintenance service, certified Category 5 wiring must be installed at the<br />

Customer’s site. The Contractor can also undertake an audit of the Customer’s existing cabling<br />

network to ascertain its capability to support IP Voice.<br />

Minimum Order Quantity<br />

The minimum order quantity for each site is 25 ports. The minimum order across all sites is<br />

250 ports.<br />

Project Management


If any of the following circumstances apply, additional project management support may be<br />

required:<br />

256<br />

Multiple sites<br />

One or more sites has more than 500 ports<br />

An interface with a third party supplier is required.<br />

The number of project management days assigned to the Customer will depend on the<br />

complexity of the requirements and will be quoted for separately.<br />

Out-of-Hours Installation<br />

All installations will be carried out within normal working hours; these are Monday to<br />

Friday, 0900 to 1700. If installation outside of normal working hours is required, there will be an<br />

additional one-off charge. The charge varies depending on the installation type. All charges will<br />

be fully detailed in the quote for the work.<br />

Ordering Additions to the service<br />

Once a PBX Maintenance service has been established, additions can be ordered at any time<br />

during the period of the contract. These will be quoted for separately, taking into account the<br />

nature of the additional equipment and the work involved.<br />

added.<br />

A Maintenance Acceptance Test (MAT) will be arranged and the additional equipment<br />

Additions to the original specification are at the discretion of the Contractor and, depending<br />

on the nature of the additional equipment required, it may be necessary for the Contractor to<br />

re-quote for the entire PBX Maintenance service and ask the Customer to sign a new contract.


If it is necessary for engineers to perform a site visit to install additional equipment, a site<br />

visit charge will apply.<br />

Moves, Adds and Changes (MACs)<br />

Soft MACs<br />

The Contractor will carry out all soft moves and changes associated with PBX maintenance.<br />

These might include:<br />

257<br />

Changing and moving extension numbers<br />

Changing voicemail boxes<br />

Altering the configuration of hunt and pickup groups.<br />

Soft MACs will be done remotely via the modem provided with the PBX, wherever possible.<br />

MAC requests will be submitted via email and will be completed by close of business on the<br />

following day. The Customer will be notified when the changes have been made.<br />

The Customer will buy soft MACs in bundles of 100, 200 or 500. When 90% of the purchased<br />

bundle has been used, the Contractor will advise of the need to buy a further bundle.<br />

A soft MAC is required per port. A soft MAC can comprise of up to five separate events on<br />

the same port.<br />

Hard MACs<br />

A hard MAC is defined as:<br />

The supply and installation of minor equipment (e.g. line cards or telephones)<br />

The connection of analogue or digital circuits<br />

Automatic Call Distribution (ACD) programming


258<br />

Network reconfiguration<br />

Powering the system down/up<br />

Application and peripheral reconfiguration.<br />

Hard MACs can be ordered via email on a template supplied. An engineer will be dispatched<br />

to the site to carry out the work. Lead times are subject to stock levels and the nature of the<br />

request. Hard MACs are not included in the bundled soft MACs purchased. Hard MACs will incur<br />

a one-off charge for the engineer’s visit and for the hours spent on the work. Costs for hard<br />

MACs will be quoted separately.<br />

Project Moves and Changes<br />

If a large number of moves and changes (more than 50 within a period of five working days)<br />

are required, a project MAC can be requested. This may involve both soft and hard MACs, and<br />

will be quoted for separately.<br />

Moving Site<br />

If the Customer moves site during the term of the PBX Maintenance contract, the<br />

Contractor will need to uninstall the PBX system and reinstall it at the new location. Both the<br />

uninstallation and reinstallation are chargeable.<br />

Fault Reporting and Resolution<br />

<strong>Service</strong> Level Options<br />

PBX Maintenance offers four levels of service for fault management:<br />

Level 1 – <strong>Service</strong> available five days a week, Monday to Friday (excluding public and<br />

bank holidays), between 0900 and 1700. There is no obligation to complete work<br />

outside normal working hours.


259<br />

Level 2 – <strong>Service</strong> available five days a week, Monday to Friday (excluding Public and<br />

Bank Holidays), between 0900 and 1700. There is no obligation to complete work<br />

outside normal working hours.<br />

Level 3 – <strong>Service</strong> available 24x7x365.<br />

Level 4 – <strong>Service</strong> available 24x7x365.<br />

Different service levels can be selected for different sites. An additional maintenance charge<br />

is payable if an engineer needs to visit the site outside the hours covered by the service level for<br />

that site.<br />

<strong>Service</strong> Level 1 is included in the standard monthly port rental for PBX Maintenance. All<br />

other options incur an extra monthly charge per port.<br />

A fault qualifying for PBX Maintenance is a fault on any of the Contractor-maintained<br />

equipment which prevents calls being made or received. It does not include faults with access<br />

lines, internal cabling or network faults.<br />

Fault Priority Levels<br />

Each fault is allocated a priority level as follows:<br />

Priority Level 1 — Loss of service: problems that severely affect business-critical services,<br />

leading to significant loss of business, which therefore require immediate corrective action.<br />

Priority Level 2 — Loss of quality: degradation of a system or service performance that<br />

impacts Customer service quality or impairs control or operational effectiveness.<br />

Priority Level 3 — Not service or performance-affecting: minor problems that do not<br />

significantly impair the functioning of the system or service to Customers. The problem is


tolerable during normal operations.<br />

Restoration SLAs by type of fault are as follows:<br />

<strong>Service</strong> Level<br />

Option<br />

260<br />

Fault<br />

Priority<br />

Target<br />

Response<br />

Time<br />

Target <strong>Service</strong><br />

Restoration Time<br />

<strong>Service</strong> Level 1 P1 4 hours 1 working day<br />

<strong>Service</strong> Level 2 P1 4 hours 4 working hours<br />

<strong>Service</strong> Level 3 P1 4 hours 8 hours<br />

<strong>Service</strong> Level 4 P1 4 hours 4 hours<br />

<strong>Service</strong> Level 1 P2 4 hours 2 working days<br />

<strong>Service</strong> Level 2 P2 4 hours 4 working hours<br />

<strong>Service</strong> Level 3 P2 4 hours 8 hours<br />

<strong>Service</strong> Level 4 P2 4 hours 4 hours<br />

<strong>Service</strong> Level 1 P3 4 hours 3 working days<br />

<strong>Service</strong> Level 2 P3 4 hours 3 working days<br />

<strong>Service</strong> Level 3 P3 4 hours 3 working days<br />

<strong>Service</strong> Level 4 P3 4 hours 3 working days<br />

Remote Access for Fault Identification and Resolution<br />

Fault identification and resolution via remote access to the PBX is a standard part of the PBX<br />

Maintenance <strong>Service</strong>. The Customer will need to supply, at its expense, the appropriate access<br />

lines for the PBX and remote access codes for the Contractor. The access line can be either an<br />

indirect analogue line or a direct connection. The Contractor can supply new lines if they do not<br />

currently exist. Any PBX that either cannot or does not have an appropriate access line that


allows remote access for fault identification and resolution will incur additional charges to<br />

support.<br />

Engineering Support Outside Contracted Hours<br />

Where a PBX is supported with either <strong>Service</strong> Level 1 or 2 and an engineer is required<br />

outside the hours covered, this service is available, subject to availability. There will incur an<br />

additional charge.<br />

Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

261<br />

Maintel - To provide PBX maintenance.<br />

Mitel Networks Ltd - Provision of hardware and PBX services<br />

DIRECTORY ENQUIRES SERVICE OVERVIEW<br />

The Contractor’s Operator <strong>Service</strong> portfolio provides capability for callers to access a<br />

number of services for either information or assistance purposes, using either dedicated<br />

support agents, and/or an Interactive Voice Response (IVR) system.<br />

The Contractor provides the call handling service using dedicated support agents based at<br />

two (2) UK locations. This provides service continuity in the event of the any single site failure.<br />

High Level <strong>Service</strong> Offering<br />

This service provides assistance to callers for the following numbers:<br />

100 – Operator Assistance<br />

101 – Single Non-Emergency Numbers<br />

111 – NHS Non-Emergency Number


262<br />

118*** – Directory Enquiries<br />

999 / 112 – Emergency <strong><strong>Service</strong>s</strong>.<br />

<strong>Service</strong> Description<br />

A further breakdown of each of the above services is provided below for clarity<br />

100 – Operator Assistance<br />

In this service, calls made from the Customer are put through to a live agent for handling.<br />

These can then be onward connected if possible, as required by the Customer.<br />

101 – Single Non-Emergency Number<br />

All calls to this number are delivered to the Contractor’s platform. The caller’s location is<br />

determined and an option provided through an IVR application for the caller either to be<br />

connect to their local authority as designated by the number the call has originated from; or to<br />

fallback to a live agent in the event that the caller’s location cannot be determined.<br />

111 – NHS Non-Emergency Number<br />

All calls to this number are delivered to the Contractor’s platform and automatically routed<br />

through to the appropriate NHS Direct authority.<br />

118*** – Directory Enquiries.<br />

Calls to 118*** numbers provided by the Contractor are delivered to our call handling<br />

agents who provide the required information and offer a number of options, including optional


SMS, onward call connect and multiple call enquiries. These calls can be charged on a per call<br />

and/or per minute basis as designated by the Customer.<br />

The Contractor’s own branded Directory Enquiries number is 118 099<br />

999 / 112<br />

Calls to these numbers are delivered directly to one of the Contractor’s call agents.<br />

Supporting systems within the OSDQ operation enable the agent to determine the caller’s<br />

location by either the address (for a fixed line service), or Cell ID (for a mobile service). These<br />

calls are then routed through to the appropriate emergency authority with the call handler<br />

staying on the call for a short period to ensure that this is picked up and that there are no<br />

subsequent issues or enquiries raised by the emergency authority.<br />

Technical Characteristics<br />

<strong><strong>Service</strong>s</strong> are managed by a number of platforms, as detailed below.<br />

101/111<br />

The integrated Voice Response technology automatically identify the caller’s location and<br />

provide the functionality to either route the call accordingly or refer this to one of the<br />

Contractor’s live agents. The capability is provided in conjunction with the Sub-Contractor<br />

SciSys with SLAs ensure the Contractors service levels are met.<br />

100, 118*** and Emergency <strong><strong>Service</strong>s</strong><br />

263


This is supported by dedicated agents located at two (2) call centres (Birmingham and<br />

Glasgow). All agents are fully trained and operate on a 24/7 basis. Capability exists for either<br />

site to continue as a standalone operation in the event of failure of the other site.<br />

The emergency services platform utilises the OASIS platform. This platform identifies the<br />

caller’s location and passes the call through to the appropriate emergency service authority<br />

together with the required location information.<br />

In order to identify the caller’s location, the Contractor requires mobile 999/112 calls to be<br />

delivered in an agreed format to enable the cell ID to be identified. Where Customers use the<br />

Contractor’s 999 service from a fixed line, details of their address must be entered onto a<br />

Contractor-managed database at the time the service is provided and updated in the case of<br />

any change of location.<br />

For the 118*** service, the Contractor accesses a number of third party databases in order<br />

to provide callers with the required information. These databases provide numbers for both UK<br />

and overseas Customers. In addition to providing the number information requested, the<br />

Contractor also enables Customers to choose other options such as onward call connect,<br />

multiple enquiries and SMS confirmation.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

Monthly performance statistics are available for the 100, 101, 111, Directory Enquiries and<br />

Emergency Call services, which provide information regarding call numbers, average handling<br />

times, performance against SLA etc.<br />

264


Use of Sub-Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

265<br />

Scisys - Provide IVR capability for our 101 service.<br />

Capita - Provision, training and allocation of call agents at our DQ/999.<br />

AUDIO AND WEB CONFERENCING SERVICE DESCRIPTION<br />

The Contractor offers a range of Audio and Web Conferencing services including self-<br />

launched, operator and Web-based sharing applications. The services are provided through the<br />

Contractor’s global conferencing infrastructure. The platform shall be accessed by via<br />

Freephone and geographical dial-in numbers from both UK and global locations, and any<br />

Internet-connected PC/Laptop in the case of Web Conferencing.<br />

High-Level <strong>Service</strong> Offering<br />

Reservationless Audio Conferencing<br />

Reservationless Web Conferencing<br />

Cisco WebEx, which includes:<br />

Cisco WebEx Meeting Centre<br />

Cisco WebEx Event Centre<br />

Cisco WebEx Training Centre<br />

Cisco WebEx Support Centre<br />

Operator-Assisted Audio Conferencing<br />

Operator-Assisted Web Conferencing.<br />

<strong><strong>Service</strong>s</strong> Description<br />

Reservationless Audio Conferencing<br />

Reservationless Audio Conferencing is an automated, user-managed Audio Conferencing<br />

service which requires no reservation. The Reservationless Audio Conferencing platform


supports up to 125 connections on a single call and is accessible via a range of global dial-in<br />

numbers.<br />

Reservationless Audio Conferencing offers an array of features and functionality that shall<br />

be controlled using telephone keypad commands. Select features shall be controlled via the<br />

Online Reservationless Call Manager interface. Call Leaders shall be capable of customising one<br />

or all calls based on the features they need.<br />

Reservationless Audio Conferencing shall offer a variety of vertical integration options.<br />

Vertical integration capabilities provide the ability to integrate Reservationless Audio<br />

Conferencing with the Contactor’s and any third party’s applications, including:<br />

266<br />

Cisco WebEx Web Conferencing<br />

Microsoft Office Live Meeting<br />

Adobe Connect<br />

IBM LotusLive Meetings<br />

Calendar and contacts through Microsoft Outlook<br />

Microsoft Office Communicator Server<br />

Microsoft Lync Online.<br />

The Contractor will confirm support for additional applications on request.<br />

User accounts are set up on a named-user basis. Each account holder (Leader) will receive a<br />

unique Conference Code and secure Leader PIN. Each Leader is provided with one or more<br />

telephone dial-in numbers, depending on requirement, which they give to Participants to<br />

access the conference.


To initiate/join a conference call, the Leader (account holder) and Participants dial into the<br />

Reservationless conferencing platform via telephone. Each caller is required to enter a<br />

Conference Code. The Leader will enter a further code unique to the Leader. Additional<br />

complementary services to which the Leader has subscribed will also be available to the Leader.<br />

Reservationless Audio Features<br />

267<br />

Feature Description<br />

Auto-Continuation Allows Participants to stay on the conference call<br />

without Moderator attendance.<br />

Change Leader Allows the Moderator to change their PIN using DTMF<br />

PIN via DTMF tones.<br />

Conference Prevent conference calls that have not been<br />

Breakdown disconnected properly from continuing indefinitely by<br />

ending the conference once it has reached a set<br />

duration and number of Participants limit.<br />

Custom/Branded Record a custom welcome message that is played to all<br />

Greetings<br />

Participants who join the conference.<br />

Custom Entry Turn specified prompts off that are played after users<br />

enter the conference code or Leader PIN in order to<br />

quickly enter a conference.<br />

Dial-Out During a live conference, users are able to dial-out to<br />

domestic Participants and bring them into the call, or<br />

users are able to contact the operator to dial-out to<br />

international Participants.<br />

Dual Call Flow Owners shall have a primary and secondary language<br />

Language Prompts choice for the call flow.<br />

Entry<br />

Reduce the number of entry tones played when a<br />

Announcement conference call has started. Quick Start must be<br />

Limit<br />

disabled and more than five to ten Participants are on<br />

music hold.<br />

Entry/Exit Options Decide how conference Participants are announced<br />

when they join or leave the conference call. Choose<br />

from the following options: tone, name announce, name<br />

and tone, or silence.<br />

Force Disconnect Clear the conference by disconnecting all Participants<br />

from the call while the Moderator stays connected. This<br />

feature is useful when the Moderator has scheduled


ack-to-back meetings.<br />

Group<br />

Silence all Participants’ lines by pressing a keypad<br />

Mute/Unmute command on the telephone. Group mute/unmute helps<br />

reduce background noise and limits interruptions during<br />

the conference.<br />

International The Contractor will supply five methods to connect<br />

Dialling<br />

international Participants to a conference call, including<br />

links through the Contractor’s international call centres,<br />

toll and toll-free access numbers, a dial-out option, or a<br />

permanent dial-in number.<br />

Language Prompts The Contractor will supply multiple language prompts<br />

for the welcome message/greeting and bridge prompts<br />

heard when dialling into and participating in a<br />

conference.<br />

Leader Express Start the conference by consecutively entering your<br />

Entry<br />

conference code followed by * and your Leader PIN<br />

followed by #.<br />

Leave and Join a Participants can leave the conference they are<br />

Conference attending and join a new conference without hanging up<br />

and redialling the same dial-in number.<br />

Lecture Mode Mute all Participants during the conference to reduce<br />

background noise. Participants will not have the<br />

capability to unmute their lines.<br />

Lock/Unlock Lock the conference call to prevent additional<br />

Participants from joining.<br />

Mobile Assistant Control and access the conference call from mobile<br />

phones.<br />

Multiple Leaders The ability to have multiple Leaders on the conference<br />

call, with access to all Leader controls.<br />

Online<br />

Manage the call online at www.cw.com, by scheduling,<br />

Management starting, presenting and archiving the conference on the<br />

web.<br />

Operator<br />

Create, edit and schedule meetings with pre-<br />

Assistance determined conferencing information from an Outlook<br />

toolbar.<br />

Phone Commands Control the conference with touch tones on the<br />

telephone keypad. Moderators have the ability to mute<br />

lines, lock the conference, request operator assistance<br />

Post-Conference Create an attendance roster of the Participants with an<br />

Emails<br />

email record of which Participants were on the phone<br />

and/or web. Record the total conferencing minutes to<br />

anticipate call budgets.<br />

Private Participant Privately announces the number of Participants on the<br />

Count<br />

conference call at any Participant’s request.<br />

Project Accounting Charge back for billable hours by using PAC Codes.<br />

268


269<br />

Codes (PAC) The Contractor shall capture the expense centre,<br />

department or location, and the information will appear<br />

on the Customer’s monthly invoice.<br />

Quick Start Begin the conference call by allowing Participants to<br />

enter the conference before the Moderator starts<br />

Record and<br />

Playback<br />

speaking and before the call officially begins.<br />

Digitally record Reservationless Audio calls for<br />

Participants who were unable to attend or for<br />

Participants who would like to listen to the conference<br />

call again. For 24/7 availability, the recording shall be<br />

accessed on the internet or by dialling a toll-free<br />

number. Users may also purchase a CD, a<br />

downloadable link and/or a transcription of the<br />

recording.<br />

Record<br />

Pause call recording in progress and then resume the<br />

Pause/Resume recording when the Moderator is ready to continue.<br />

Roll Call Prompt Participants to record their name as they join<br />

the conference call. Any time during the conference,<br />

names shall be replayed privately to any conference<br />

Participant.<br />

Security Passcode The Moderator can select and distribute the security<br />

passcode for every conference they host. For security<br />

reasons, a security passcode shall not match the<br />

Leader’s Conference Code or Leader PIN.<br />

Self-Mute/Unmute Allow Participants to silence their own lines by pressing<br />

a keypad command on their telephones. Self<br />

mute/unmute reduces background noise from, for<br />

example but not limited to: cell phones and speaker<br />

phones.<br />

Sub-conference Pre-selected guests can join a private discussion during<br />

the conference call. Sub-conferencing allows<br />

discussion of side issues and other non-public<br />

Third Party<br />

Conference Start<br />

information.<br />

Participants can bypass the hold music and start the<br />

conference as the Leader if the Leader is running late<br />

or unable to host the call at the last minute.<br />

Waiting Room Participants can be placed on music hold until the<br />

Moderator is ready for them to join the conference call.<br />

Reservationless Web Conferencing<br />

Reservationless Web Conferencing is a multimedia upgrade for Reservationless Audio that<br />

combines Audio and Web Conferencing features. This service allows Moderators to manage all


aspects of a meeting via the web, deliver PowerPoint® presentations virtually, share any<br />

document or applications in real-time, take Participants on guided Web tours, conduct real-<br />

time surveys, quizzes and votes for immediate feedback, and record the voice and web<br />

elements of a meeting for playback later.<br />

Reservationless Web Conferencing is an automated, user-managed service which requires<br />

no reservation. It is comprised of two components: Voice and Web Conferencing service with<br />

connection via the Internet and telephone; the web portion supports any major browser.<br />

Moderator functionality is supported on the Windows operating system. For Participants,<br />

browsers from Windows or MAC-based devices are supported.<br />

Each Owner/named account holder will be provided a Conference Code (meeting room<br />

number) and confidential Leader PIN code which allows the Leader to securely open and close<br />

the web and/or voice portions of a meeting to the Participants. A single meeting supports up to<br />

125 voice connections and 125 web connections.<br />

Meeting invitations sent from within Outlook and Lotus Notes are supported. Meeting<br />

invitations will automatically populate with the meeting access details and are available in<br />

multiple languages.<br />

270<br />

Feature Description<br />

Reservationless<br />

Meeting Room<br />

Integration with<br />

Reservationless<br />

Audio<br />

All Moderators receive their own meeting room. Users<br />

host remote meetings without making reservations.<br />

Use Reservationless Audio to automatically dial out to<br />

user


271<br />

Conferencing<br />

Active Speaker Moderators and Participants can view who is currently<br />

speaking in conference via the active speaker icon, or<br />

determine background noise coming from the specific<br />

Microsoft Outlook<br />

and Lotus Notes<br />

Integration<br />

Quick Invite via<br />

Instant Messenger<br />

Easy Participant<br />

Access<br />

Mobile Access with<br />

iPhone<br />

Customisable<br />

Meeting Interface<br />

Participant audio line.<br />

Send Participants invitations from Outlook or Lotus<br />

Notes Calendar.<br />

Invite Participants to an in-progress meeting using one<br />

of the following Instant Messenger applications:<br />

MSN/Windows Live Messenger<br />

Lotus SameTime Instant Messenger<br />

Microsoft Office Communicator Instant<br />

Messenger<br />

Participants can join from all major browsers and<br />

operating systems. For presenter capabilities and<br />

desktop video, Participants must download the<br />

Reservationless Web application prior to joining the<br />

meeting.<br />

Moderators and Participants can join the audio<br />

conference from the iPhone. Moderators have onetouch<br />

controls to manage audio Participants (dial<br />

me/out, mute/unmute), chat with meeting attendees and<br />

open/close meeting room doors.<br />

Configurable meeting interface options.<br />

Reservationless Web stores the panel display for each<br />

subsequent meeting.<br />

Participant List View the voice and web connectivity status of<br />

Participants via the Participant panel in an online web<br />

meeting interface.<br />

Audio<br />

Participants can listen to the audio conference using<br />

Broadcasting their computer speakers.<br />

Desktop VoIP Users can join audio via Voice over IP. The integrated<br />

Connection duplex VoIP connection ‘softphone’ is accessed from<br />

within the web user interface. Users listen and speak in<br />

conference via computer speakers and<br />

microphone/headset.<br />

Full Screen Mode Set Participants to Full Screen<br />

Recording Record the audio and/or web portion of a meeting for<br />

later playback.<br />

Show PowerPoint Uploaded PowerPoint presentations can be shown via<br />

Presentations Presentation mode; thumbnails of slides can be viewed<br />

via the slide preview bar. The presentation slide<br />

transitions and animations are preserved.


272<br />

Application<br />

Sharing<br />

Allows sharing of application or desktop from a<br />

computer. Moderators can grant control to authorised<br />

Participants to edit shared documents while in the<br />

meeting.<br />

Web Tour Web tours can be conducted in a meeting which allows<br />

Participants to navigate and click on the live website.<br />

Desktop Video Moderators and Participants can view and broadcast<br />

live video in a meeting using a standard desktop video<br />

webcam. Participants can control whose video to view,<br />

or Moderators can control the video broadcast view.<br />

Full Screen Mode Set Participants’ view to Full Screen so the presentation<br />

or application that’s being shared fits their entire<br />

screen.<br />

Chat Send instant messages to an individual or a group<br />

without interrupting the meeting.<br />

Survey/Quiz/Poll Gain feedback from Participants using polling questions<br />

and publish results in the meeting. Gather feedback<br />

and test the Participants’ knowledge by creating<br />

surveys and quizzes that can be displayed in the<br />

meeting or upon meeting exit/entry. Use reports to track<br />

survey and quiz responses in Conference Manager.<br />

Emoticons Participants can provide instant feedback to the<br />

Moderator via a variety of emoticons included in the<br />

meeting interface.<br />

SSL Encryption Enhanced meeting security is provided via 128-bit SSL<br />

encryption.<br />

Security<br />

Add an additional layer of security with Moderator-<br />

Passcodes created security codes unique to each meeting.<br />

Close Meeting Prevent unauthorised access to conferences and limit<br />

Room Door disruptions by closing the door in the meeting interface.<br />

Stored Documents Upload and access PowerPoint Presentations, surveys,<br />

quizzes, polls, images, web tours and files that can be<br />

used in meetings.<br />

Online Reporting View detailed reports from meetings with information on<br />

duration of the meeting, number of Participants,<br />

Participant name and survey/quiz results.<br />

Archived<br />

After the meeting Moderators can access and playback<br />

Recordings hosted or zip archives. Moderators can send<br />

Participants archive email links and choose to<br />

password protect them. Detailed reports show who has<br />

accessed the recorded conference and how long it was<br />

viewed.<br />

Cisco WebEx


Cisco WebEx Web Conferencing, provided by the Contractor will provide a suite of solutions<br />

available either individually or combined, delivering web collaboration and online remote<br />

meeting capability.<br />

Solution options include:<br />

273<br />

Cisco WebEx Meeting Centre<br />

Cisco WebEx Event Centre.<br />

Cisco WebEx Training Centre<br />

Cisco WebEx Support Centre.<br />

The Contractor will also support, as an option, the integration of its audio solutions with<br />

Cisco WebEx Meeting Centre, Event Centre and Training Centre.<br />

Audio integration will enable users to send meeting invites with audio details automatically<br />

included, and to control the audio portion of the meeting from within the Cisco WebEx<br />

interface, including:<br />

Schedule and send invitations that automatically populate with the user’s<br />

Reservationless Audio Dial-In information<br />

Start instant meetings with the Reservationless Audio information included<br />

‘Call-in’ or ’call-back’ options for attendees<br />

View attendee connections, status and type (phone and web)<br />

Mute/unmute any/all connections; mute attendees upon entry<br />

Active Talker to see who is speaking.<br />

Cisco WebEx Meeting Centre<br />

Cisco WebEx Meeting Centre share a PowerPoint presentation, demonstrate software,<br />

show web site navigation and transfer files.


Core WebEx Meeting Centre functionality will provide:<br />

274<br />

Integration with Reservationless Audio Conferencing<br />

Documents, applications, desktop sharing<br />

On-demand record, edit and playback<br />

Anyone can Share<br />

Microsoft PowerPoint with transitions and animations<br />

Chat, polls, notes, annotation tools<br />

Multimedia content sharing<br />

Whiteboarding<br />

Power Panels, floating icon tray<br />

File transfer<br />

Multipoint video<br />

Automatic configuration<br />

High capacity<br />

Display of flexibility Integrated audio options; Active Talker<br />

Integrated scheduling with Outlook, Lotus Notes<br />

Available in ten languages<br />

24x7x365 live End-User support.<br />

Cisco WebEx Event Centre<br />

Cisco WebEx Event Centre provides an online auditorium for up to 3,000 attendees.<br />

In addition to WebEx Core features listed above, WebEx Event Centre includes:<br />

Advanced custom registration<br />

Multiple panellists<br />

Polling, threaded Q&A<br />

Attention indicator<br />

Custom enrolment<br />

Custom email templates


275<br />

Audio broadcast<br />

Lead scoring and reporting<br />

Lead track ID management<br />

Flash-based attendee interface<br />

Lead score and prioritised questions.<br />

Cisco WebEx Training Centre<br />

Cisco WebEx Training Centre delivers live, interactive training sessions allowing the user to<br />

share presentations, software and websites, test and poll Participants, and hold breakout<br />

sessions.<br />

In addition to WebEx Core features listed above under the WebEx Meeting Centre<br />

description, WebEx Training Centre includes:<br />

Advanced custom registration<br />

Multiple panellists<br />

Polling, threaded Q&A<br />

Attention indicator<br />

Instant feedback indicators<br />

Hands-on labs<br />

Testing and grading<br />

Breakout rooms<br />

Predefined breakout sessions.<br />

Cisco WebEx Support Centre<br />

Cisco WebEx Support Centre provides operational staff capabilities to view, diagnose and<br />

solve problems online in real-time. The <strong>Service</strong> will provide the capability to transfer End User<br />

files for off-line analysis and, with end user permission, the capability for the operational staff


member to run the End User’s desktop and download patches or updates to the End User’s<br />

computer.<br />

Core Functionality:<br />

276<br />

Web Automatic Call Distribution (ACD)<br />

Click To Connect<br />

System info<br />

Reboot/reconnect<br />

Advanced file transfer<br />

Log on as an administrator.<br />

Operator Assisted Audio Conferencing<br />

Operator Assisted Audio Conferencing is an operator-assisted, reservations-based service.<br />

The Customer will be required to pre-book such calls by contacting the Contractor’s<br />

reservations desk. Operator Assisted audio services are available as:<br />

Operator Assisted<br />

Provides a reservations-based Audio Conferencing service where the operator greets<br />

Participants as they dial in and place them into the meeting. Call size is restricted to 25<br />

Participants. Standard operator-assisted features include: Direct Entry, Email/Fax Confirmation,<br />

Entry/Exit Tone, Leader First, Leader Last, Name Announce, Music Entry, Password, Roll Call,<br />

and Dial In and Dial Out options.<br />

Direct Entry<br />

Provides a reservations-based Audio Conferencing service with operator assistance.<br />

Participants dial in and are placed straight into a meeting on hold with music. Speakers dial in


via a different number and are greeted by an Operator. The Operator is available to assist with<br />

Participant control if required. Call size is three to over 10,000 Participants.<br />

Direct Event<br />

Provides a reservations-based Audio Conferencing service with operator assistance and<br />

Participant pre-registration via the Internet. Accepted registrants receive the event call access<br />

details via email, including a unique registrant ID required to access the call. Participants dial in<br />

and are placed straight into the meeting or on hold with music. Speakers dial in on a different<br />

number and are greeted by an Operator. Call size is 25 to 1,800 Participants.<br />

Premium Event<br />

Provides a reservations-based Audio Conferencing service with operator meet and greet. .<br />

Participants dial in and will be greeted by an Operator who places them into the meeting. Call<br />

size is three to over 10,000 Participants.<br />

The features available to add to Operator-Assisted call types are listed below:<br />

Premium and Value-Added Features<br />

277<br />

Online Reservations – Provides the facility to reserve a conference online.<br />

Toll-free Reservations – Provides the facility to reserve a conference over the<br />

phone via a Freephone number.<br />

Event <strong><strong>Service</strong>s</strong> – Provides specialist event service packages. This Option<br />

includes enhanced registration, full event management and use of branding.<br />

Event Registration <strong><strong>Service</strong>s</strong> – Provides the facility to track Participant<br />

attendance, with options for Participant information gathered at time of registration,<br />

email reminders and custom-scripted messages.<br />

Recurring Call Scheduling – Provides the facility to schedule recurring events.<br />

Project Accounting Codes (PAC Codes) – Provides information on conferencing<br />

use.


Email Confirmation – Provides confirmation of the conference details by fax or<br />

email.<br />

Text Reminders – Provides the facility to send Participants event reminders by<br />

SMS.<br />

Streaming – The option to stream a conference via the Internet and to archive the<br />

conference for later playback.<br />

Encore – The option to digitally record the call for post-conference playback. The<br />

user will access recording by dialling a toll, toll-free or International Toll-Free<br />

(ITFS) number.<br />

CD/Taping – The option to capture the recorded event on a CD, cassette,<br />

microcassette or DAT.<br />

278<br />

Digital Recording (WAV) – The option to record the call as a WAV file.<br />

Transcription – The option to receive a written record of the audio content in<br />

email or hard copy format.<br />

Translation – The option to translate calls into other languages, presented in a<br />

written document.<br />

International – The option to allow entry to international Participants.<br />

Dial Out – The option for an operator to dial out to conference Participants.<br />

Lecture Mode – Provides the facility to mute all Participants’ lines during the<br />

presentation.<br />

Music Entry – The option for music on-hold until the conference begins.<br />

Entry/Exit Tones – The option to play a tone when a Participant enters or exits<br />

the conference.<br />

Roll Call – The Facility to announce all Participants who have joined the call.<br />

Leader First/Last – The option where the Leader joins the call first or last.<br />

Sub-Conference – The facility to allow speakers and coordinators to join a private<br />

meeting room before the conference begins.<br />

Communication Line – The facility to allow a Moderator to speak with an operator<br />

outside of the main conference.<br />

Promotional Tape – The option for organiser-specific content to be played to<br />

Participants whilst on hold.<br />

Interpretation – The option for either consecutive or simultaneous interpretation<br />

Custom Script – Option for an organiser-specific message to be read by an<br />

operator before, during or after the conference.<br />

Group Mute/Unmute - The option to allow groups to silence telephone lines.


Self-Mute/Unmute – The option to allow Participants to silence their own<br />

telephone lines.<br />

Leader View – Provides a web-based interface to show a real-time view of the<br />

Participants on the call.<br />

Polling – Provides the facility for questions to be asked and for Participants to<br />

respond using telephone keypads.<br />

Question and Answer Session – The facility to allow Participants to speak to all<br />

on the conference. This facility is coordinated by the operator.<br />

Participant Report – Provides Participant details, ’on-the-line’ times, phone<br />

numbers and up to four additional pieces of information.<br />

Operator-Assisted Web <strong><strong>Service</strong>s</strong><br />

The Contractor’s Operator-Assisted Web <strong><strong>Service</strong>s</strong> will provide an extra service available in<br />

addition to Operator-Assisted Audio. The Contractor’s Event Managers will be the point of<br />

contact for all streaming event and web requirements. Event <strong><strong>Service</strong>s</strong> are available in three<br />

core packages and offer service support before, during and after the event. These include:<br />

279<br />

Consultation<br />

Coordination<br />

Training<br />

Rehearsals<br />

Live event moderation<br />

Report delivery.<br />

Event service packages are available as follows:<br />

Operator-Assisted Web Premium Package<br />

Pre-Event Support<br />

Event planning and preparation, scheduling, best practices and tips (checklists by request),<br />

content management (for example: uploading presentations, polling questions), Registration<br />

support, Custom event scripting, presenter training and event walk-through.


Event Rehearsals<br />

Live event support, event moderation, speaker introductions and transitions (based on<br />

Customer request), presenter and attendee technical support, Q&A/chat management,<br />

optional recording assistance.<br />

Post-Event Support<br />

Conduct post-event speaker debrief, report compilation and delivery, optional file creation and<br />

editing services.<br />

Operator-Assisted Web Express Package<br />

Pre-Event Support<br />

Event coordination – initial needs assessment and plan, scheduling (audio/web, public or<br />

private), invitation/announcement assistance, upload content (for example: presentations,<br />

question sets), conduct event run-through with presenter(s) (one hour).<br />

Live Event Support<br />

Provide event monitoring and support (two hours), record and/or broadcast live event.<br />

Post-Event Support<br />

Post-event report package, recorded event management.<br />

Operator-Assisted Web-Ready Package<br />

Pre-Event Support<br />

Event coordination – initial needs assessment and plan, scheduling.<br />

280


Live Event Support<br />

Event moderation, speaker introductions and transitions (based on Customer request),<br />

presenter and attendee technical support.<br />

Post-Event Support<br />

Report compilation and delivery.<br />

Technical Characteristics<br />

<strong>Service</strong> Provision<br />

All accounts will be established on a named-user basis. Each account holder (Leader)<br />

receives a unique Conference Code and secure Leader PIN. The Leader is provided with a range<br />

of telephone dial-in numbers which they give to Participants to access the conference.<br />

Live Event Support<br />

Provide event monitoring and support (two hours), record and/or broadcast live event.<br />

Post-Event Support<br />

Post-event report package, recorded event management.<br />

<strong>Service</strong> Management<br />

Call Support Team<br />

The Contractor’s Audio and Web Conferencing support desk will be available via phone,<br />

Internet and e-ail 24x7x365.<br />

281


The Contractor will assign an operator for all operator-assisted call. The operator will<br />

contact the call host/presenter at least 24 hours prior to the call to confirm call requirements<br />

and features.<br />

Call Support Team Members<br />

Reservationists – The Contractor will supply a dedicated 24x7 reservation line.<br />

Event <strong>Service</strong> Operators – The Contractor will supply, as an additional option, a call event<br />

operator.<br />

Reservations<br />

The Contractor’s reservations desk is accessed 24x7x365 by telephone or email.<br />

Support Hours<br />

The Contractor’s Event <strong><strong>Service</strong>s</strong> group supports events and event-related professional<br />

sessions during in-region business hours: EMEA team, between 0745 and 2000 GMT.<br />

Events and/or professional sessions which occur outside support hours will be subject to an<br />

additional charge.<br />

Reporting<br />

Reservationless Reporting<br />

The Contractor will supply an online account management portal allowing the Customer to<br />

manage accounts, access online reports and/or make reservations.<br />

282


The online portal will support two levels of access: End User/Owner and Administrator.<br />

Operator Assisted Reporting<br />

The Contractor will provide an online reporting feature for post-event analysis. This will<br />

include:<br />

283<br />

Identity information<br />

Access to webcast modules<br />

Content<br />

Poll responses<br />

Questions (in a live environment)<br />

System details<br />

Access times as they pertain to webcast delivery.<br />

Reports can also be generated for email reads, click-throughs and email forwards.<br />

Reporting requirements will be determined with the Customer, with data collection and<br />

analytics requirements for the project defined, and the ability to deliver assessed, at the time of<br />

request.<br />

Reporting details are available for viewing via the online portal and are downloadable in<br />

CSV file format.<br />

More Reporting<br />

Through the online portal, Customer administrators will have the facility to run reports and<br />

view invoices online. Reports include:


284<br />

Audio and Web Usage Activity (for the last four months: Participant count, charges and<br />

features)<br />

Greatest Attributes Report (top 50 owners with highest number of conferences, costs,<br />

etc.)<br />

Stewardship Report (comprehensive report on all products: usage, costs, conferences<br />

held for current calendar year)<br />

Minute Report (available at company, account or owner level; calls up most recent four<br />

months of activity)<br />

Billing information will be updated monthly following an invoice.<br />

The Customer will be able to select online reports and download in HTML or CSV file format.<br />

Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

Intercall (Genesys) – To provide audio and web conferencing.<br />

MAILBOX SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contractor shall provide an enterprise class Mailbox <strong>Service</strong> based on Microsoft<br />

Exchange 2010 which shall include:<br />

Inbox<br />

Calendar<br />

Contacts<br />

Tasks<br />

Folders<br />

Mobile Access.


The Contractor’s Mailbox <strong>Service</strong>, offers a unified platform for all End Users with the<br />

appropriate controls to separate Customers. The system is an adaptation of Exchange,<br />

providing web portal administration and enabling Customers to retain control of End User<br />

management. Portal controls shall be managed using role-based access, with administrators<br />

controlling aspects such as the creation of new End Users and the editing or deletion of<br />

accounts. This common service shall enable a single, unified security policy to be applied to all<br />

users across multiple governmental departments.<br />

High Level <strong>Service</strong> Offering<br />

285<br />

Mailbox<br />

<strong>Service</strong> Description<br />

Base service<br />

The Mailbox <strong>Service</strong> shall deliver email functionality to End Users by providing mail storage,<br />

transport services, hygiene services and journal services as well as a user administration portal<br />

providing user management functionality.<br />

Mail storage shall be provided using a quota system; the solution can support different<br />

quota options<br />

Transport services shall provide the capability for End Users to send and receive email<br />

messages within the Mailbox <strong>Service</strong> and also to and from external users<br />

Hygiene services shall provide protection from viruses or malware in email messages<br />

and where possible clean or remove infected message parts<br />

Mailboxes shall be provided to store both IL2 and IL3 data with clear separation<br />

between the hardware used for the different Impact Levels.<br />

Enhanced service


End Users shall have access to additional functionality. This shall be subject to charges in<br />

addition to the base Mailbox <strong>Service</strong> call-off. The additional functionality available shall include:<br />

286<br />

A 90 day deleted item retention period, allowing for the recovery of deleted items and<br />

discovery of items for up to 90 days following their deletion. The solution shall also be<br />

configured to support longer retention periods if required by the Customer.<br />

Definition of custom retention policies.<br />

Access to the Mailbox <strong>Service</strong> shall be made available over the <strong>PSN</strong> network for client and<br />

web access, and via the Internet for mobile access (BlackBerry/ActiveSync). Device encryption<br />

shall be required on mobile devices used to access the Mailbox <strong>Service</strong>. In addition, mobile<br />

devices used to access IL2 and IL3 mailboxes shall be limited to those approved by CESG.<br />

Mailboxes shall be protected using Exchange 2010 data replication to provide four copies of<br />

each mailbox database to protect for local server failure as well as complete site failure.<br />

A delegated administration portal is provided to allow Customer administrators of the<br />

Mailbox <strong>Service</strong> to manage their End Users’ accounts without requiring access to Exchange<br />

management tools or having any experience of using them. The web-based portal shall provide<br />

role-based access to allow distribution of End User management tasks, including:<br />

Create user account<br />

Set user permissions<br />

Reset password<br />

Suspend or reinstate account<br />

Unlock account<br />

Verify End User identity.<br />

Technical Solution


Infrastructure of the Mailbox <strong>Service</strong><br />

The Mailbox <strong>Service</strong> shall be deployed into a shared hosting environment supporting other<br />

secure application services. Infrastructures for IL2 and IL3 are completely separate. A Disaster<br />

Recovery (DR) environment shall also be provided at a second geographically separate data<br />

centre. The DR site shall be deployed based on a single line of kit (N resiliency).<br />

Performance Metrics<br />

End Users shall have access to their mailbox data via the out-of-the-box Exchange access<br />

protocols: primarily Outlook Web App and Microsoft Outlook for desktop access, and Microsoft<br />

ActiveSync for mobile access (IL2 only). Additionally, BlackBerry access shall be provided for<br />

access to IL2 and IL3 mailboxes if required. The service for each access method shall be<br />

delivered using the standard out-of-the-box functionality with no customisation or bespoke<br />

coding.<br />

The client access methods shall all provide access to the mailbox and global address list, and<br />

shall be differentiated in use:<br />

287<br />

Microsoft Outlook is the End User client installed on End User desktops. It provides<br />

access to the user’s own mailbox, calendar, tasks, contacts, address books and notes, as<br />

well as access to other users’ data that has been shared with them.<br />

Outlook Web App (OWA) is a browser-based email client that provides an email and<br />

calendar functionality. Sharing with other users is limited to the calendar functionality.<br />

Embedded in OWA is the Exchange Control Panel (ECP) which provides administration<br />

facilities for both users and administrators. Subject to the correct permissions, ECP<br />

allows for:<br />

o User updates of contact information (address, telephone etc.)


288<br />

o Application to join a distribution group<br />

o Creation of distribution groups<br />

o Setup of mail rules<br />

o Changing preferences for spelling, calendar display, message format etc.<br />

o Configuration of block and allow lists<br />

o Searching for email across multiple mailboxes<br />

o Creation of external contacts<br />

o Management of other user information.<br />

BlackBerry is the brand name of a range of email devices from Research In Motion (RIM)<br />

that provides the End User with a copy of their email and calendar, as well as access to<br />

contact information via searching in the global address book (GAL).<br />

Exchange ActiveSync (EAS) is Microsoft’s synchronisation protocol primarily used with<br />

Windows Mobile devices and other vendors smartphones via license. Depending on the<br />

vendor’s implementation it allows synchronisation of the user’s mailbox (including subfolders),<br />

calendar, contacts, tasks and the ability to search the GAL.<br />

Resilience and <strong>Service</strong> Level Targets<br />

The Mailbox <strong>Service</strong> shall be delivered from two geographically separate data centres<br />

initially, with one being the primary (active) site and one being the DR (passive) site. All data<br />

shall be replicated between the two sites providing data availability following a site disaster.<br />

The primary site shall include additional redundancy to limit the requirement for activation of<br />

the DR site. The Mailbox <strong>Service</strong> shall have an Availability <strong>Service</strong> Level Target of 99.99% during<br />

each <strong>Service</strong> Measurement Period<br />

Technical Interface and Standards<br />

The Mailbox <strong>Service</strong> shall be accessible using:<br />

Outlook 2007 and later versions<br />

Internet Explorer


289<br />

Mozilla Firefox.<br />

The browser versions supported are n and n-1, where n is the latest version released six<br />

months ago. The service may work on other browsers however the Contractor has not<br />

conducted testing on browsers other than those listed above<br />

details<br />

Interface Information<br />

Customer Via Outlook Web Apps (HTTPS), Outlook thick client using<br />

Interface physical<br />

Interface protocol<br />

standards<br />

Source Platforms<br />

Supported for Migration<br />

Outlook Anywhere or via the Contractor’s <strong>Service</strong> Desk (telephone<br />

or email)<br />

N/A<br />

HTTPS<br />

Microsoft Exchange 2003, Exchange 2007, Exchange 2010,<br />

GroupWise 8 and Mirapoint.<br />

review.<br />

Additional source platforms may be supported but would need


Customer Interface Requirements<br />

Customer hardware<br />

required<br />

Customer software<br />

required<br />

290<br />

PC or equivalent for required Customer software<br />

Web browser to access service interface.<br />

Other client software as appropriate to Customer requirements<br />

and <strong>Service</strong> capabilities (e.g. Outlook Client).


Technical Standards<br />

Industry standards ISO/IEC 15408 (Common Criteria).<br />

291<br />

The Contractor’s internal lockdown and build standards (based<br />

on industry best practice). The administration portal is developed<br />

using the following World Wide Web Consortium (W3C)<br />

standards: XHTML 1.*, CSS 2.1 and JavaScript 1.6.<br />

The custom code is Microsoft ASP.Net Ajax which generates<br />

XHTML 1.0 (Transitional) compliant code.<br />

Protocol standards HTTP, HTTPS, IP (RFC 791), SMTP (STD 0010 and RFC 2821),<br />

Proven<br />

compatibility with<br />

Internet Mail (RFC 2822)<br />

Standards-compliant SMTP Relay Software: Exim, Sendmail,<br />

Microsoft Exchange, Lotus Notes (with any required SMTP<br />

modules installed and configured)<br />

The Mailbox <strong>Service</strong> shall be based on Microsoft Exchange which is designed to provide<br />

accessibility for people with disabilities. The custom portal shall be developed using the W3C<br />

Web Accessibility guidelines, aiming for AA compliance. The Contractor shall ensure that the<br />

Mailbox <strong>Service</strong> is accessible by the Customer through a range of methods, including standards-<br />

compliant Internet browsers, client-based email software and mobile devices. The Mailbox<br />

<strong>Service</strong> shall be accessible from both thick and thin clients with no loss of functionality.


Migration Delivery Mitigation<br />

The Contractor shall provide tools, documentation and support services to enable End Users<br />

to migrate email documents (including email messages, contacts, tasks and calendar entries)<br />

from common industry email platforms into the Mailbox <strong>Service</strong>. This process requires careful<br />

planning and support to ensure it is achieved in a robust and secure way. The Contractor does<br />

not recommend providing End Users with the tools to perform migrations themselves and<br />

suggests that this is done in conjunction with the Contractor.<br />

End User migrations shall be managed as projects using PRINCE2 methodology. In order to<br />

support large-scale email migrations the Contractor shall have a migration team and shall use a<br />

suite of supporting documentation and scripts. This team shall work closely with the Customer<br />

to prepare it for a migration including how to deal with access to local .pst files and applications<br />

that are integrated with their local mail exchange.<br />

The Contractor shall use a tool from Transend to support migrations of Customers to a<br />

common target platform. Advantages of this tool include:<br />

292<br />

No requirement for Active Directory trusts between source and target platforms<br />

No modification of source mailboxes by the migration process (read only access)<br />

No source ‘admin’ permissions required for Exchange migrations.<br />

The tool the Contractor uses shall ensure that replies to migrated emails do not result in a<br />

non-delivery report (NDR). This is known as replyability.


If End Users carry out their own migrations they do not have the benefit of address re-<br />

writing. When the Contractor migrates End Users the email addresses in their mail and calendar<br />

are updated for their migrated colleagues allowing users to reply seamlessly and so integrity of<br />

attendee information for meetings is also maintained.<br />

The main factors used in calculating the cost of migrations include:<br />

293<br />

Number of source domains<br />

Number of End Users<br />

Whether the source is a common mail service<br />

Bandwidth between the source and destination.<br />

The Contractor’s migration communication strategy ensures all parties are aware of the<br />

schedule, processes, risks and issues. The Contractor can tailor reporting outputs to meet the<br />

Customer’s requirements. The Contractor shall confirm the scope and costs associated with any<br />

migration from common email platforms to the Mailbox <strong>Service</strong> with the Customer prior to<br />

signature of the Call-Off Form.<br />

The Contractor shall provide support services to enable End Users to migrate email<br />

documents (including email messages, contacts, tasks and calendar entries) into the Mailbox<br />

<strong>Service</strong>. The portal shall provide access to training material and the Contractor shall provide<br />

“train the trainer” sessions where necessary.<br />

The Contractor shall confirm the scope and costs associated with any migration from<br />

uncommon email platforms to the Mailbox <strong>Service</strong> with the Customer prior to signature of the<br />

Call-Off Contract.


Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

294<br />

Microsoft – for provision of software and licensing.<br />

COLLABORATION SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contractor’s Collaboration <strong>Service</strong> shall provide End User productivity tools at both IL2<br />

and IL3. This accredited service shall provide an integrated knowledge management and<br />

communication solution for users across and within <strong>Government</strong> bodies.<br />

The service shall provide secure community workspaces, with document management,<br />

storage, forums, wikis, skills profiles, instant messaging, and presence awareness along with<br />

voice and video options. The service shall enable:<br />

Customers to build and search an accessible knowledge pool<br />

Multiple communication options, including instant messaging with presence awareness<br />

and online meeting spaces<br />

A ‘pay as you go’ model to provide visible and predictable costs without the need for<br />

capital investment<br />

Secure information sharing.<br />

High Level <strong>Service</strong> Offering<br />

The Secure Collaboration <strong>Service</strong> comprises three core service offerings:<br />

Collaboration: Profiles, Skills & Connections<br />

Collaboration: Secure Communities<br />

Unified Communications: Microsoft Lync<br />

<strong>Service</strong> Description


The service allows users to find and share information securely through appropriate role-<br />

based access controls. The solution shall deliver an End User-centric service through use of<br />

tagging, rating, activity flows and contacts, thereby improving the ability to find appropriate<br />

information. Components of each service offering is summarised below:<br />

295<br />

Collaboration: Profiles, Skills & Connections<br />

o Connect with other users<br />

o Find users based on profile/skills<br />

o See contacts’ activity<br />

o Search and view public content.<br />

Collaboration: Secure Communities<br />

o Public and private communities<br />

o Document management<br />

o Wikis, blogs, forums, polls<br />

o Intuitive and customisable.<br />

Unified Communications: Microsoft Lync<br />

o Instant messaging<br />

o Presence awareness<br />

o Requires thick client<br />

o On-net voice and video.<br />

If required by the Customer, the Contractor shall provide the secure collaboration <strong>Service</strong><br />

on a pay per End User per month basis, with no upfront cost.<br />

Basic Secure Collaboration Space<br />

The Contractor’s secure collaboration service shall provide an integrated knowledge<br />

management and enhanced communication solution for users, both across and within<br />

Customers


The Contractor shall provide access for Customers to register their End Users. The<br />

Collaboration <strong>Service</strong> shall link colleagues, allowing them to access information and share<br />

profiles and experience if they choose to.<br />

End Users shall be able to work across and within Customer boundaries, using, for example<br />

document sharing, managing projects online and connecting with people.<br />

Collaboration Technical Solution<br />

The collaboration platform comprises a number of components as outlined below:<br />

Collaboration: Profiles, Skills, Connections & Secure Communities<br />

296<br />

Telligent Evolution Enterprise<br />

Microsoft SharePoint.<br />

Advanced Unified Communications<br />

Microsoft Lync.<br />

Delegated Administration<br />

A custom web portal for administration and enhanced control.<br />

Users will be allocated an average 250MB storage limit, although this average can be shared<br />

across each Customer’s user base. Options are also available to procure additional storage.<br />

Access to the Collaboration <strong>Service</strong> shall be made available via web browser.<br />

A delegated administration portal is provided to allow Customer administrators of the<br />

Collaboration <strong>Service</strong> to manage their End Users’ accounts without requiring access to back-end


management tools. The web-based portal shall provide role-based access to allow distribution<br />

of End User management tasks, which shall include:<br />

297<br />

Creation of user account<br />

Setting of permissions<br />

Resetting of passwords<br />

Suspension/reinstatement of user account<br />

Unlocking of user account<br />

Verification of End User identity.<br />

Infrastructure of the Collaboration <strong>Service</strong><br />

The Collaboration <strong>Service</strong> shall be deployed into a shared hosting environment supporting<br />

other secure application services. To ensure complete separation between the security levels<br />

there are separate infrastructures for IL2 and IL3. A Disaster Recovery (DR) environment shall<br />

also be provided at a second geographically-separate data centre. The DR site shall be deployed<br />

based on a single line of kit (N resiliency).<br />

Resilience and <strong>Service</strong> Level Targets<br />

The Collaboration <strong>Service</strong> shall be delivered from two geographically-separate data centres<br />

with one being the primary (active) site and one being the DR (passive) site. All data shall be<br />

replicated between the two sites, providing data availability following a site disaster.<br />

Additionally, high availability architectures have been used in the primary site to limit the<br />

potential for requiring the DR site to be activated. This design enables the Collaboration <strong>Service</strong><br />

to meet the Availability <strong>Service</strong> Level Target of 99.99% during each <strong>Service</strong> Measurement<br />

Period.


Technical Interfaces and Standards<br />

The Collaboration <strong>Service</strong> shall be accessible using:<br />

298<br />

Internet Explorer;<br />

Mozilla Firefox.<br />

The browser versions supported are n and n-1, where n is the latest version released six<br />

months ago. The service may work on other browsers however the Contractor has not<br />

conducted testing on browsers other than those listed above<br />

Details<br />

Interface Information<br />

Customer Via browser (HTTPS), Lync thick client or via the Contractor’s<br />

Interface Physical<br />

Interface Protocol<br />

Standards<br />

<strong>Service</strong> Desk (telephone or email).<br />

Also, to receive service alerts and other communications, a<br />

<strong>Government</strong>-secure email account<br />

N/A<br />

HTTPS


Customer Interface Needs<br />

Customer Hardware<br />

Required<br />

Customer Software<br />

Required<br />

299<br />

PC or equivalent for required Customer software.<br />

Web browser to access service interface.<br />

Lync thick client to access the Lync service.<br />

Technical Standards (without prejudice to Schedule 11 (Standards) of the Framework<br />

Agreement)<br />

Industry Standards ISO/IEC 15408 (Common Criteria).<br />

The Contractor’s internal lockdown and build standards (based<br />

on industry best practice). The administration portal is developed<br />

using the following World Wide Web Consortium (W3C)<br />

standards: XHTML 1.*, CSS 2.1 and JavaScript 1.6.<br />

The custom code is Microsoft ASP.Net Ajax which generates<br />

XHTML 1.0 (Transitional) compliant code.<br />

Protocol Standards HTTP, HTTPS, IP (RFC791), SMTP (STD0010 and RFC2821),<br />

Customer Configurables<br />

Internet Mail (RFC2822).


The delegated administration functions shall provide the following Customer configurables<br />

for approved End Users:<br />

300<br />

Creation of user account<br />

Setting of user permissions<br />

Resetting of passwords<br />

Suspension/reinstatement of account<br />

Unlocking of account.<br />

Collaboration <strong>Service</strong> Approach<br />

The Contractor shall manage the Collaboration <strong>Service</strong> through the use of best practice<br />

operating model that is aligned with ITIL v3. The operating model shall combine dedicated and<br />

aligned shared functions to deliver the Collaboration <strong>Service</strong>, technical and account<br />

management requirements.<br />

Collaboration <strong>Service</strong> – Stakeholder Roles and Responsibilities<br />

The roles and responsibilities for each of the key Collaboration <strong>Service</strong> stakeholders are<br />

outlined below:<br />

Role<br />

Contractor<br />

Provisioning and management of the Collaboration <strong>Service</strong><br />

Overall management of the engagement process from start to finish<br />

Incident, problem and change management<br />

Reduce the occurrences of repeatable incidents by effective investigation<br />

and resolution of root causes<br />

Manage and plan service capacity to meet current and predicted<br />

performance requirements and agreed <strong>Service</strong> Level targets<br />

Provision of service meeting the agreed security requirements<br />

Upgrades and patching for Contractor-managed devices<br />

<strong>Service</strong> reporting<br />

Communication of change and outage windows<br />

Code of Connection input


Role<br />

Customer<br />

301<br />

Full management of the Contractor-delivered services and devices<br />

Production of a Customer information pack detailing the interfaces and<br />

any Customer configuration required<br />

Publication of standard interface options and mechanisms for <strong>PSN</strong><br />

Provide Managed Security <strong><strong>Service</strong>s</strong> to HMG standards (e.g. GPG13).<br />

Provide any additional security required between <strong>PSN</strong> and the Customer’s<br />

environment<br />

Change approval (Customer changes)<br />

Respond to requests for approval, authority to proceed or assistance in a<br />

prompt and timely manner<br />

Acceptance of any change or outage windows<br />

Code of Connection completion<br />

Code of Connection adherence<br />

Provide the Contractor with access to appropriate members of the<br />

Customer’s staff<br />

Provide such documentation, data and/or other information that the<br />

Contractor reasonably requests, provided that such documentation, data<br />

and/or information shall be available to the Customer and shall be<br />

authorised for release by the Customer<br />

Provide access and use of the Customer’s premises, facilities, including<br />

relevant IT systems as shall be reasonably required by the Contractor<br />

Filling roles, where defined, in the governance structures and participating<br />

in the associated meetings and reviews relating to the Collaboration<br />

<strong><strong>Service</strong>s</strong><br />

Defining rules where business rules, or changes to business rules, require<br />

implementation and testing by the Contractor and defining such rules in a<br />

format as agreed between the Contractor and the Customer<br />

Ensure that End Users and other integrated service providers are made<br />

aware of their obligations to adhere to the necessary operating<br />

procedures and practices that the Contractor provides and such other<br />

obligations that may be required for the purposes of data security and<br />

data protection.<br />

Information Governance<br />

Use reasonable endeavours to ensure that the Customer’s staff do not<br />

knowingly introduce viruses or use illegal software that might adversely


Framework<br />

Authority Role<br />

Use of Sub Contractors<br />

302<br />

affect the Collaboration <strong><strong>Service</strong>s</strong>.<br />

Change approval (framework or community-wide changes)<br />

Code of Connection authoring<br />

Code of Connection approval<br />

Provision of Accreditor resource<br />

Accreditation of the Collaboration <strong>Service</strong>.<br />

Testing<br />

Supporting the Contractor’s test team with user acceptance testing as<br />

appropriate.<br />

Information Governance<br />

Cooperating with the Contractor on the production of the security policy.<br />

Standards<br />

Communicating to the Contractor, in a timely manner, all changes to any<br />

of the standards that the Contractor shall be obliged to adhere to in the<br />

delivery of its <strong><strong>Service</strong>s</strong>.<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

Microsoft – for provision of software and licensing.<br />

HOSTING SERVICE DESCRIPTION<br />

General Description<br />

The Contractor shall provide a range of hosting services, allowing Customers to outsource<br />

some or all of their hosting requirements.


The Contractor’s Hosting <strong>Service</strong> includes a portfolio of computing, security, storage and<br />

infrastructure components that can be integrated to provide a secure and managed<br />

environment from which to deliver a wide variety of web-based and other applications.<br />

Customers can choose to take either dedicated services, where the computing, infrastructure,<br />

storage and security resources are wholly provided to meet the requirements of an individual<br />

Customer, or equally they can consider the use of shared or cloud-based services, where the<br />

resources are shared between different Customers.<br />

The Contractor supports a number of technologies within the Hosting <strong><strong>Service</strong>s</strong> portfolio,<br />

including Virtualisation, which enables Customers to share physical computing platforms and to<br />

obtain optimum utilisation of hardware.<br />

The Hosting <strong>Service</strong> shall provide one or more locations in the UK with a physical<br />

environment that Customers or their authorised agents can utilise. The Contractor operates<br />

sites are categorised as Critical National Infrastructure, meet or exceed Tier III and will offer up<br />

to 99.99% availability with respect to power and environmental controls.<br />

High Level <strong>Service</strong> Offering<br />

The Contractor’s Hosting <strong>Service</strong> shall include the following sub-categories of service:<br />

303<br />

Collocation<br />

Secure Managed Hosting<br />

Website services<br />

Infrastructure-as-a-<strong>Service</strong><br />

Flexible Computing.


Detailed Description<br />

Collocation<br />

The Contractor’s Collocation <strong>Service</strong> provides data centre facilities. Three locations are<br />

capable of supporting the Hosting <strong>Service</strong> up to IL4 (Impact Level 4 – 4 – 4 for Confidentiality,<br />

Integrity and Availability). The Contractor shall support a range of options including dedicated<br />

rooms, caged areas and shared hosting suites.<br />

The Collocation <strong>Service</strong> includes the following elements:<br />

304<br />

Provision of secure building space<br />

The choice of multiple secure data centre facilities as described above<br />

The provision of environmental services appropriate to support and run Customer<br />

equipment.<br />

Standard power and cooling densities per rack are up to 2.4KW. Dedicated power and<br />

cooling solutions are also available subject to Customer requirement.<br />

Secure Managed Hosting<br />

The Contractor’s Secure Managed Hosting <strong>Service</strong> includes a portfolio of computing,<br />

security, storage, backup and infrastructure components that can be integrated to provide<br />

bespoke Customer solutions.<br />

The Contractor shall work with the Customer to identify and design an appropriate hosting<br />

solution, based on the Platform <strong>Service</strong> components, to support the Customer’s requirements.<br />

This will also include considerations such as resilience and disaster recovery. The Contractor


provides all its Hosting <strong><strong>Service</strong>s</strong> in a range of resilience options including single site,<br />

geographically separate site, and active and passive standby provisions.<br />

The following sections provide more detail on the elements of the <strong>Service</strong>:<br />

Internet Access<br />

Connectivity between the Customer’s Hosting Infrastructure and the Internet.<br />

Infrastructure <strong><strong>Service</strong>s</strong><br />

The provision, installation, maintenance and management of network equipment. Specific<br />

<strong>Service</strong> options include:<br />

305<br />

Switching management<br />

Routing management<br />

Load balancing management.<br />

Computing Platform <strong><strong>Service</strong>s</strong><br />

The provision, installation, maintenance and management of computing hardware<br />

platforms. The following platforms are supported under the <strong>Service</strong>:<br />

HP DL and BL ranges<br />

Sun T-series<br />

Cisco UCS.<br />

Additional platforms will be considered on a case-by-case basis.<br />

Operating System <strong><strong>Service</strong>s</strong>


The provision, installation, management and administration of Operating Systems on<br />

Contractor-managed hardware including Clustering Management. The following Operating<br />

Systems are supported under the service:<br />

306<br />

Windows<br />

Solaris<br />

Red Hat Linux<br />

VMWare.<br />

The Contractor will provide secure, hardened builds for the Operating System environments<br />

according to the Impact Level of the <strong>Service</strong>.<br />

Monitoring and Reporting <strong><strong>Service</strong>s</strong><br />

The service includes:<br />

Non-Agent-based monitoring of Hosting Equipment, Operating Systems and Applications<br />

Agent-based monitoring services offer in-depth monitoring of a Customer’s Hosting<br />

Solution<br />

Operating System monitoring<br />

SNMP collection.<br />

Security <strong><strong>Service</strong>s</strong><br />

The provision, installation, maintenance and management of security devices and services.<br />

The service encompasses:<br />

Managed firewalls<br />

Managed intrusion detection<br />

Managed proxy servers<br />

Managed IDS appliances.


Backup and Restore <strong><strong>Service</strong>s</strong><br />

The Contractor’s Backup and Restore <strong>Service</strong> offers a fully-managed service based on either<br />

a shared or Customer-dedicated infrastructure. The <strong>Service</strong> includes backup to either Tape or<br />

Virtual Tape library and is offered on a per-Gigabyte backup per-month basis.<br />

Storage <strong><strong>Service</strong>s</strong><br />

The Contractor offers both dedicated and shared storage solutions. The <strong>Service</strong> involves the<br />

provision, installation, maintenance and management of the storage, which is presented to the<br />

Customer’s hosting architecture as a LUN of a given size and RAID configuration. The shared<br />

service is offered based on a per-Gigabyte per-month basis.<br />

Anti-Virus Protection<br />

All servers shall be installed with Sophos Anti-Virus software which shall be automatically<br />

updated from a secure source.<br />

Website <strong><strong>Service</strong>s</strong><br />

The Contractor’s Managed Web Application and Platform <strong>Service</strong> is specifically designed to<br />

host Customer web-based applications that can be accessed and used by multiple public sector<br />

Customers. The Managed Application <strong>Service</strong> is based on the following principles:<br />

307<br />

The provision of a shared and accredited hosting platform suitable to support a range of<br />

applications that can be accessed via the <strong>PSN</strong> and the Internet.<br />

The <strong>Service</strong> shall include physical infrastructure support, Active Monitoring and support<br />

of the environment and infrastructure 24/7.


308<br />

Management of security – including scanning for viruses, damage repair and updating<br />

virus checking software – backup of applications, and taking calls from the Customer<br />

and occasionally End Users.<br />

The platform shall be accredited to support protectively marked data up to RESTRICTED.<br />

The platform shall be provided along the lines of a hybrid Infrastructure-as-a-<strong>Service</strong><br />

(IAAS) and Software-as-a-<strong>Service</strong> (SAAS) model, in that it will provide both the<br />

infrastructure – including computing resources – and the underlying application<br />

technologies to support a range of custom-written applications.<br />

The platform shall include both production and pre-production environments to allow<br />

applications to be tested before full deployment.<br />

The platform shall allow Customers to securely run pilot applications subject to<br />

application accreditation or to support fully-fledged applications which may have<br />

previously been hosted by the Customer.<br />

The Contractor shall work with the Customer to assess pre-existing applications for<br />

compliance with the Contractor’s Platform and shall assist Customers during the<br />

deployment and acceptance testing of applications on the managed <strong>Service</strong>.<br />

All applications shall be deployed in the Contractor’s pre-production environment<br />

before being deployed in the production environment. The Contractor shall work with<br />

the Customer to define an operational acceptance testing strategy and to create scripts<br />

to verify new application stability and coexistence with other applications in the hosted<br />

environment.<br />

The service includes all the necessary ancillary applications required to develop, deploy,<br />

deliver and manage a wide range of web-based applications. Our current Managed Application<br />

platform is based on the following ancillary applications, but has been designed to support all<br />

well-known technologies, including:<br />

Lotus Domino<br />

WebSphere<br />

MySQL<br />

IIS.<br />

The Contractor currently uses the following development and deployment tools:<br />

Bugzilla


309<br />

Compuware OptimalJ<br />

Eclipse<br />

Enterprise Architect<br />

Mercury Quality Centre<br />

SVN<br />

Visual Source Safe.<br />

The Contractor’s Managed Application service shall include the registration of appropriate<br />

addresses (publicly accessible or internally accessible) necessary to enable applications to be<br />

accessed from the appropriate domains. This will include addresses of services and applications<br />

provided by other Contractors.<br />

Flexible Computing<br />

The Contractor’s Flexible Computing <strong>Service</strong> allows Customers to purchase cloud-based<br />

compute capacity, in addition to or separately from traditional Contractor provided hosting<br />

services.<br />

Specifically, Customers are able to order virtual machines (known as Flexible Instances)<br />

through a self-service ordering portal.<br />

The <strong>Service</strong> is physically provided on a virtualised multi-tenant compute infrastructure<br />

which has been pre-built across two geographically diverse data centres.<br />

Isolation is achieved using a combination of VLANs (Virtual LANs) and isolated ‘partitions’ or<br />

‘contexts’ in the various devices that make up the core architecture – specifically the firewalls,<br />

load balancers, server and storage platforms. The primary technologies used in the compute<br />

layer are Cisco UCS blade servers running VMware vSphere. This is supplemented operationally


y VMware vMotion (Virtual Machine mobility), HA (High Availability) and DRS (Distributed<br />

Resource Scheduling).<br />

The <strong>Service</strong> shall provide the Customer with Virtual Machine template options called<br />

Flexible Instances. The Contractor will offer one of nine Flexible Instance options from a 2Ghz,<br />

single vCPU with 2GB of vRAM to a 2Ghz, eight vCPUs option with 32GB of vRAM.<br />

The <strong>Service</strong> shall offer the following choice of Operating Systems:<br />

310<br />

Red Hat Enterprise Linux (32 & 64 bit editions)<br />

Windows 2003 R2<br />

Windows 2008 R1.<br />

The <strong>Service</strong> shall offer the following support options:<br />

Premium<br />

Standard<br />

Distributed Protection.<br />

The Premium Flexible Instance shall be monitored 24/7/365 by the Contractor up to the<br />

Operating System. The Premium Flexible Instance also includes additional services such as<br />

Antivirus, Patch Management and an option for Data Backup and Archiving.<br />

For Standard Flexible Instances, the Customer shall be responsible for the management and<br />

support of the Operating System. There is no Antivirus or Patch Management with this<br />

unmanaged option, and Backup services cannot be requested for Standard Flexible Instances.


Distributed Protection provides dual site resilience. Intelligent DNS network devices, which<br />

monitor server availability and response times, allow requests to be distributed across both<br />

data centres to the most appropriate Flexible Instances or site.<br />

The Contractor’s Flexible Computing <strong>Service</strong> is based on the Cisco UCS (Unified Computing<br />

Systems) compute product line, integrated with new, dedicated networking and storage<br />

environments into both Swindon and Leeds data centres.<br />

All traffic into and out of the Flexible Computing platform shall traverse the perimeter<br />

firewall context.<br />

<strong>Service</strong> Provision – Approach (Design and Build)<br />

Collocation, Secure Managed Hosting, Website <strong><strong>Service</strong>s</strong><br />

The Contractor shall work with the Customer on a pre-sales basis to capture and identify<br />

their requirements in a Solution Design Document. The Solution Design Document shall capture<br />

the following details:<br />

311<br />

Customer requirements, including performance and availability requirements<br />

Protective marking requirements<br />

Data centre space requirements including rack elevations<br />

Proposed device or devices (managed hosting & Website <strong><strong>Service</strong>s</strong> only)<br />

High level architecture (managed hosting & Website <strong><strong>Service</strong>s</strong> only)<br />

Solution or component level availability guarantees<br />

Proposed Customer acceptance test criteria for the service.


The Customer is required to sign the Solutions Design Document which shall be referenced<br />

in the Contractor’s contract.<br />

Once the Customer’s requirements are documented, detailed investigation of the<br />

requirement and solution shall be performed to confirm viability. At this stage, where<br />

applicable, a Detailed Designer will complete a Detailed Design Document, which shall be used<br />

by the Contractor’s engineers to build or provision the service.<br />

The <strong>Service</strong> shall be provisioned as defined in the Solution Design Document. The<br />

Contractor shall advise the Customer of an Agreed Ready for <strong>Service</strong> Date (“ARFS Date”) in the<br />

Solution Design Document, by which time the Contractor will use reasonable endeavours to<br />

Provision the <strong>Service</strong>.<br />

When the Customer Acceptance Test, as defined in the Solution Design Document, has been<br />

completed successfully, the Contractor shall report the results of the testing and send a<br />

Customer Acceptance Form to the Customer.<br />

Flexible Computing<br />

As part of the on-boarding process, the Contractor through consultation with the<br />

Customer’s assigned representative(s) shall agree the network design and configuration options<br />

for the Customer’s environment within the Flexible Computing platform, and the connection to<br />

it. On-boarding shall commence following the agreement of the design and contract<br />

completion. The Contractor’s implementation staff shall complete the build activities required<br />

312


to connect the Customer to the platform, including the creation of an administration account<br />

on the portal.<br />

The Customer shall provide details and input to the process, including allocation of IP<br />

address ranges, and the email address of an allocated individual who shall be the administrator<br />

on the Flexible Computing platform (further user accounts can be added by this administrator<br />

after on-boarding).<br />

During the consultation phase the Customer’s requirements and connectivity options shall<br />

identify whether connections into both of the Flexible Computing sites, or only one, are<br />

required. If the Customer only requires connection into one site then the distributed protection<br />

(cross-site load balancing service) service will not be available. The Customer shall also be asked<br />

to describe any PVLANs that need to be set up initially on the platform (further can be added<br />

later, up to a maximum of nine).<br />

Once the design has been agreed, an order will be required and this shall be submitted to<br />

the Contractor’s teams who will manage the creation of the Customer’s dedicated virtual<br />

environment within the Flexible Computing platform. Once the order has been processed the<br />

Contractor shall advise the Customer of an Agreed Ready for <strong>Service</strong> Date (“ARFS Date”) by<br />

which time the Contractor shall use reasonable endeavours to Provision the <strong>Service</strong>.<br />

The configuration required to connect the service to the Customer’s WAN, via either a<br />

private WAN or the <strong>PSN</strong>, shall be completed as part of this activity.<br />

313


As part of the on-boarding activity the Customer shall assist with the testing of connectivity<br />

to ensure that access to the dedicated environment on the platform is available from the<br />

Customer’s sites, via the WAN.<br />

When ready for operation the Customer will be set up with a single administrator account<br />

for the Flexible Computing portal and the password and user guides shall be supplied to the<br />

allocated individual.<br />

Security<br />

The following sections detail the security elements of the Hosting <strong>Service</strong>.<br />

Data Centre Qualification for ISO 27001<br />

The certificate covers the Information Security Management System (ISMS) relating to the<br />

provision of Secure Hosting <strong><strong>Service</strong>s</strong> and covers the Contractor’s Brentford, Leeds, Swindon,<br />

Park Royal and Watford Data Centres.<br />

The Contractor has designed the ISMS, security policies and procedures to align directly<br />

with the ISO 17799:2005 structure.<br />

The Contractor’s ISMS implements the Denning Cycle of continuous improvement (PLAN ><br />

DO > CHECK > ACT). The Contractor conducts regular internal audits of policy, process, people<br />

and physical security and at least one day every six months undergoes external audit by BSI.<br />

314


All non-conformities/observations are entered into the Contractor’s National Audit<br />

Database which instigates automatic escalation within the business when actions are not<br />

carried out within the timescales stated.<br />

To monitor actions and maintain focus the Contractor operates a monthly Information<br />

Security Management Forum, chaired by our Head of HMG Security, which covers:<br />

315<br />

Overdue and due audit actions<br />

Audits and assessments (review and plan)<br />

Risk and threat management<br />

Review of security incidents<br />

New threat updates<br />

Document review/update/issue.<br />

Facility Security<br />

The Contractor’s physical security measures of its data centres as a critical priority. include<br />

physical security measures include the following:<br />

Provision of 24-hour on-site security personnel<br />

Local and remote CCTV monitoring and recording<br />

Enforcement of single entry and exit point policy at each site<br />

Turnstile access control points at entry points into data centre areas (prevents tailgating<br />

and removal of equipment)<br />

Proximity card access control system (with audit and role-based access control<br />

capabilities).<br />

Strict escorted access policy for non-Contractor personnel whilst with sites (also<br />

required to fulfil health and safety requirements).<br />

The processes and physical measures in place to ensure the security of the Contractor’s<br />

data centres have been subject to a successful audit for compliance with BS7799, the standard


that formed the basis of ISO 17799, the international standard for information security<br />

management.<br />

Within the computer rooms, where additional security is required, caged or walled areas<br />

can be provided if requested as part of the implementation.<br />

A multi-level electronic swipe card system is in place at door and cage level, and audits<br />

users’ movements through a building. Individual computer cabinets are locked to prevent<br />

access.<br />

All network management and administrative systems are contained within secure rooms,<br />

over and above the security in place for access to buildings. Access to these rooms is strictly<br />

controlled.<br />

Access to the physical network components is also controlled. All equipment is located<br />

within a secure location with the doors locked when not in use. These locations are fitted with<br />

remote alarm systems. Any access requires the issue of a key by a nominated key holder and<br />

verification of identity by the Network Operations centre (NOC).<br />

Regular risk assessments and audits of security measures are also completed.<br />

Vetting of Data Centre Staff<br />

All staff in the UK are required to complete a basic security check. In addition, the<br />

Contractor’s existing colleagues in the UK, and new recruits to roles with significant access to<br />

personal or other sensitive data, systems or network equipment are required to complete<br />

316


either a Counter Terrorist Check or to obtain Security Clearance via the <strong>Government</strong> vetting<br />

agency. Outside the UK the Contractor conducts other forms of security vetting.<br />

All new starters are required to complete data protection and security awareness<br />

computer-based training courses (with knowledge check assessment) as key areas, and these<br />

courses have recently been rolled out as mandatory for all the Contractor’s staff. This maintains<br />

staff awareness of the importance of processing personal data correctly, keeping it secure, and<br />

in particular, that any disclosures of personal data outside authorised business processes are<br />

strictly prohibited and constitute a criminal offence.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

Collocation, Secure Managed Hosting, Website <strong><strong>Service</strong>s</strong>.<br />

The Contractor’s <strong>Service</strong> Desk shall be the primary service interface for the hosted services<br />

and shall provide the coordination of service management activities including:<br />

317<br />

Incident management<br />

Security incidents (physical and logical security breaches)<br />

Problem management<br />

Change management<br />

Configuration management<br />

<strong>Service</strong> level management<br />

Billing and provision queries<br />

Escalations<br />

Complaints.<br />

Interfaces between Customer and Contractor <strong>Service</strong> Desks


The Contractor’s Desk operates twenty-four hours a day, seven days a week, every day of<br />

the year for Incident Management.<br />

<strong>Service</strong> change Management<br />

The Contractor shall operate a change management process to support the <strong>Service</strong>.<br />

Changes shall be requested by submitting a Request for Change (RFC) form to the<br />

Contractor’s <strong>Service</strong> Desk. The Contractor’s Change management process is responsible for<br />

managing the effectiveness of change, and providing the mechanism for assessing, controlling<br />

and managing requests. It also incorporates release and configuration management processes.<br />

Changes shall be processed using formal change management procedures.<br />

The Contractor shall ensure that the process protects the Customer and optimises the<br />

Contractor’s effectiveness in managing the service. The change process comprises the following<br />

activities:<br />

318<br />

Raising and recording changes<br />

Assessing the impact, cost/benefit, and risk<br />

Business justification and approval<br />

Managing and co-ordinating implementation<br />

Reporting and monitoring implementation<br />

Reviewing requests<br />

Assessing and approving change requests.<br />

Monthly <strong>Service</strong> Level Reporting


The <strong>Service</strong> includes regular reporting with respect to service levels. The format and content<br />

of the reports shall be agreed at the commencement of the <strong>Service</strong>. Reports shall be amended<br />

during the course of the contract by mutual agreement.<br />

Capacity Management<br />

The Customer shall be provided with an optional capacity management service that delivers<br />

the following:<br />

319<br />

Regular reviews of solution capacity and performance statistics to ensure the<br />

optimisation of performance across the solution<br />

Regular reviews of service continuity plans and performance to validate resilience built<br />

into the solution<br />

Collaborative review of solution infrastructure, making recommendations to improve<br />

the solution.<br />

Flexible Computing<br />

The Contractor’s Flexible Computing service is primarily managed in-life via the Flexible<br />

Computing self-service portal. This capability, in addition to the management support and<br />

billing services, includes:<br />

In-life ordering – the Customer shall be able to order and delete virtual servers (Flexible<br />

Instances), scale the resources available to these servers, add or remove storage and<br />

request changes to the network and security configuration.<br />

Incidents – the Customer shall raise faults via the portal or (if the portal is not available),<br />

via a help desk number. The Contractor shall pro-actively monitor all Premium Flexible<br />

Instances and all platform components, and any alarms will be investigated through an<br />

incident management and escalation process.<br />

Change management – the Customer shall request changes via the portal. Change<br />

requests raised via the portal are deemed as approved changes by the Customer and<br />

shall be acted upon without further authorisation. Changes that are deemed to be


320<br />

complex changes are requested via the portal and shall be subject to the Contractor’s<br />

change management policies.<br />

Billing – usage elements are billed monthly in arrears and the bill shall list the service<br />

charges individually, with references that link to the <strong>Service</strong> (hostname of the Flexible<br />

Instance, if applicable, and order reference from the portal). The Contractor will<br />

proactively monitor all Premium Flexible Instances and any alarms will be investigated<br />

through an incident management and escalation process.<br />

Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

Cisco - Provision of routers and switch hardware and support services<br />

Scisys – Web Page and application development.<br />

EMC – Storage solutions<br />

SECURITY – EMAIL FILTERING SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contractor’s Email Filtering <strong>Service</strong> provides protection from malicious and unsolicited<br />

email, and includes anti-spam protection, anti-virus protection, content control and email<br />

image control. Email is filtered between Customers’ communities and all other trusted and<br />

untrusted external domains, including the Internet.<br />

An online administration portal allows Customers to individually tailor controls in<br />

accordance with local acceptable usage policies for anti-spam, content control and image<br />

control.<br />

High-Level <strong>Service</strong> Offering


E-Mail filtering<br />

<strong>Service</strong> Description<br />

The Email Filtering <strong>Service</strong> provides the following features:<br />

321<br />

Multi-layered anti-virus protection – 100% protection against known and unknown<br />

email viruses with no more than 0.0001% false positives.<br />

Anti-spam protection – 99% detection rate with no more than 0.0003% false positives.<br />

Email inspection and cleansing of malware and other inappropriate content according to<br />

an agreed set of rules.<br />

100% email delivery with average email scanning time within 60 seconds.<br />

100% service uptime for anti-virus and 99.75% for anti-spam.<br />

Online administration portal – Customers can individually tailor controls in accordance<br />

with local acceptable usage policies for anti-spam, content control (e.g. blocking of<br />

passage of terms such as ‘RESTRICTED’) and image control.<br />

Dashboards and reporting.<br />

Dual UK-based data centres with geographical diversity.<br />

Provided at each Impact Level<br />

ISO/IEC 15408 industry-standard compliance.<br />

Proven compatibility with standards-compliant SMTP Relay software (Exim, Sendmail,<br />

Microsoft Exchange, Lotus Notes (with any required SMTP modules installed and<br />

configured).<br />

The Email Filtering <strong>Service</strong> shall be based on MessageLabs technology which is the<br />

Contractor’s partner for this service. The <strong>Service</strong> shall operate within the network and with<br />

appropriate assurance levels to enable the scanning of traffic between Customers in the same<br />

community and between all other boundaries.<br />

The Email Filtering <strong>Service</strong> shall be based on the principle of deploying multiple<br />

MessageLabs ‘towers’ at multiple geographic locations per Impact Level. Each tower shall


include all the processing power and equipment necessary to deliver MessageLabs’ multi-<br />

staged filtering architecture, including the proprietary Skeptic heuristic engine.<br />

The Email Filtering <strong>Service</strong> shall ensure that the deployment of the MessageLabs service<br />

within the <strong>PSN</strong> network enables the provision of additional services which may be requested by<br />

Customers, including the ability to validate email addresses to reduce spam, TLS-to-community<br />

security with the third sector and industry on the Internet, and data loss prevention (e.g. to<br />

block Internet-bound email containing ‘RESTRICTED’ content). The Email Filtering <strong>Service</strong> has<br />

been designed as an in-network service so that it can be adopted within the <strong>PSN</strong> as a generic<br />

filtering service.<br />

The Email Filtering <strong>Service</strong> shall employ a multi-layered approach to email filtering, which<br />

shall be reinforced by MessageLabs’ proprietary Skeptic heuristic technology. The scanning<br />

process follows three steps:<br />

322<br />

Traffic and connection management identify, slow and reject infected or suspected<br />

virus-bearing email.<br />

Multiple commercial scanners detect known and identified viruses.<br />

Skeptic predictive technology incorporates thousands of heuristics rules, smart<br />

signatures, fuzzy fingerprinting and dynamic header analysis to identify unknown and<br />

new viruses.<br />

Technical Characteristics<br />

The Email Filtering <strong>Service</strong> shall be provided from two geographically-diverse data centres in<br />

the UK. Global Server Load Balancing (GSLB) and Local Server Load Balancing (LSLB) shall be<br />

used to present a Virtual IP address (VIP) for the AV service at each data centre. The VIP shall be


withdrawn by the GSLB service in the event of a failure of the site or of the multiple AV relay<br />

servers within the site. The Email Filtering <strong>Service</strong> shall be accessed externally (via the Internet)<br />

based on the resolution of weighted MX records; one record shall point to one data centre and<br />

one record shall point to the other.<br />

The Email Filtering <strong>Service</strong> is based on a tower architecture, where a tower includes all the<br />

processing capability, load balancing and management architecture required to provide the full<br />

service. For resilience and performance, the Email Filtering <strong>Service</strong> shall be replicated (N+N)<br />

between the two data centres.<br />

The Email Filtering <strong>Service</strong> will scale in line with Customer demand and is underpinned by<br />

load-balancing technology which enables the load to be distributed over a number of<br />

computing platforms, the scaling of which is invisible to the Customer.<br />

<strong>Service</strong> Provision - Approach (Delivery inc where applicable Design and Build)<br />

In receipt of a fully completed and accepted order, the Contractor will enable Email Filtering<br />

for the Customer. For some functions the Contractor will enable the capability for the<br />

Customer to apply that capability via the portal facility<br />

The Contractor shall, to the extent practicable, provide a consistent and uniform approach<br />

to service management.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

323


In the event of service failure, the Customer will report the incident to the Contractors<br />

service desk. The Contractor’s service desk representative will open a record of the incident<br />

and record the time when it is notified. The Contractor will investigate and, if incident found,<br />

resolve the incident to the SLA agreed between the Contractor and the Customer<br />

The Contractor shall operate a comprehensive change management process to support the<br />

Email Filtering <strong>Service</strong>. Changes shall be requested by submitting a <strong>Service</strong> Request to the<br />

Contractor’s Frameworks Change team via the Contractor’s <strong>Service</strong> Desk. This role also<br />

incorporates release and configuration management processes.<br />

Changes, which will be processed using formal change management procedures, shall be<br />

agreed and aligned with the Customer’s requirements. The Contractor shall ensure that the<br />

process protects the Customer and optimises the Contractor’s effectiveness in managing the<br />

Email Filtering <strong>Service</strong>. The change process shall comprise the following activities:<br />

324<br />

Raising and recording changes<br />

Assessing the impact, cost/benefit, and risk<br />

Business justification and approval<br />

Managing and coordinating implementation<br />

Reporting and monitoring implementation<br />

Reviewing <strong>Service</strong> Request<br />

Assessing and approving <strong>Service</strong> Requests.<br />

The Contractor shall monitor and document any changes made to the configuration of<br />

network elements under management. With the assistance of the Customer’s staff, the


Contractor shall produce network schematics, using the Customer’s existing schematics as a<br />

baseline.<br />

The Contractor’s change management process shall be controlled by a coordinator who<br />

shall be responsible for the overall management of the change.<br />

The Contractor will supply a service reporting capability. Dashboard, summary, detailed<br />

and scheduled reporting options shall be included and configurable to provide visibility.<br />

Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

325<br />

Symantec (Messagelabs) - Provision of filtering and scanning services<br />

SECRUITY – MANAGED AUTHENTICATION SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contactor’s Managed Authentication <strong>Service</strong> provides user authentication and reduces<br />

the risk of fraudulent access. The Managed Authentication <strong>Service</strong> is based on two-factor<br />

authentication: something you know (username/password) and something you have (a token).<br />

High-Level <strong>Service</strong> Offering<br />

Managed Authentication <strong>Service</strong><br />

<strong>Service</strong> Description


The Managed Authentication <strong>Service</strong> provides the Customer with an authentication system<br />

configured to their requirements to provide control of access. The features of the Managed<br />

Authentication <strong>Service</strong> are listed below:<br />

326<br />

Fully Integrated Solution: Designed to be integrated into existing contractor or third<br />

party security solutions.<br />

Control: Designed to authenticate users prior to allowing access to protected resources.<br />

Back-up: Schedule back-ups of User databases to facilitate service restore in the event<br />

of system failure.<br />

Management: The Contractor provides, configures and maintains the hardware and<br />

maintains software installation. Change management procedures are utilised to ensure<br />

any changes to the solution are properly managed<br />

Flexible deployment options: The service is offered with bespoke rules configured to<br />

meet the Customer’s operational requirements<br />

Security Expertise: The Contractor uses qualified staff to provide the appropriate<br />

support level<br />

Resilience: The Contactor’s Managed Authentication <strong>Service</strong> offers a range of resilience<br />

options. This shall enable Customers to achieve their required level of availability and<br />

fault tolerance for mission-critical applications<br />

Direct User administration: The Customer is provided with administrator account(s) that<br />

will allow User account management<br />

Reporting: The service offers reporting functionality to enable the Customer to<br />

effectively manage user accounts and gain a better understanding of user activity.<br />

The Managed Authentication <strong>Service</strong> is based around using the Cisco Access Control Server<br />

(ACS) Solution Engine. This appliance provides a RADIUS and TACACS+ platform for AAA<br />

(Authentication, Authorisation and Accounting).<br />

The AAA appliance shall be hosted by the Contractor in a dedicated Customer-firewalled<br />

area. It will be configured with a list of authorised authentication clients and a list of trusted<br />

User databases. The AAA appliance also supports an internal user database.


Whenever an authentication client receives an access request from a User, it will forward<br />

the User’s details to the AAA appliance. The appliance will then validate the User and its right to<br />

access the system it has attempted to connect to. This in turn triggers further look-ups using<br />

external databases such as RADIUS or Active Directory. Once complete, the user will then be<br />

either granted or denied access to the resource they have attempted to connect to.<br />

The Managed Authentication <strong>Service</strong> uses token-based authentication to provide the<br />

Customer with a strong authentication option and additional AAA servers or firewalls for<br />

increased resilience.<br />

A DMZ will allow the Contractor’s operations team to gain access to the appliance for<br />

backing up and monitoring. A link into the Customer network will provide a connection into the<br />

Customer’s infrastructure to gain access to their username and password store (Active<br />

Directory, NDS).<br />

<strong>Service</strong> Provision – Approach (Delivery inc where applicable Design and Build)<br />

The Contractor shall design and provision a Managed Authentication <strong>Service</strong> using Cisco ACS<br />

solution engine to meet the Customer’s specific requirement.<br />

The Managed Authentication <strong>Service</strong> shall be provisioned based on the details captured in<br />

the high-level design (HLD) document. The HLD shall capture the following details:<br />

327<br />

Customer requirements, including performance and availability requirements<br />

High-level rule-base<br />

<strong>Service</strong> Levels targets


328<br />

Proposed acceptance test criteria.<br />

When the Customer’s acceptance tests as defined in the HLD have been completed<br />

successfully, the Contractor shall report the results of the testing and send a Customer<br />

acceptance form to the Customer.<br />

The ACS Solution engine used as part of the Managed Authentication <strong>Service</strong> shall be set up<br />

to service AAA requests from a variety of different access devices including firewalls, VPNs and<br />

routers.<br />

The ACS software shall have several components set up:<br />

The first component is to configure a list of all authorised clients to the ACS system. To<br />

facilitate secure authentication, only authorised clients will have their authentication<br />

requests processed. Addition of clients will require the submission of a client IP address<br />

and a shared secret to be used in securing communication between the ACS and the<br />

authentication client.<br />

The second component is the provision of authorised administrators’ usernames and<br />

passwords.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

All physical access to managed service components is undertaken by authorised<br />

representatives of the Contractor’s operational team. The Customer is not provided with access<br />

to any part of the Managed Authentication Solution. The Contractor will provide the Customer<br />

with a number of defined ‘administrator accounts’ that will enable the Customer to perform<br />

basic user management such as adding, editing or deleting User accounts on the ACS Server.<br />

The Contractor shall perform the following duties:


329<br />

Initial consultancy, design and installation<br />

Policy development and configuration<br />

24x7 maintenance, including full replacement of hardware<br />

Detailed monitoring and testing<br />

Customer support, including change control<br />

Regular updating of signature requirements<br />

Cross-Customer learning and correlation<br />

Back-up and restore management.<br />

Use Of Sub Contractors<br />

Sub-contractors are not used to deliver this service.<br />

MANAGED SECURITY INFRASTRUCTURE SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contractor shall provide a Managed Security Infrastructure <strong>Service</strong> that shall<br />

encompass the provision of security devices including firewalls, proxies, intrusion detection<br />

products and application gateways.<br />

High-Level <strong>Service</strong> Offering<br />

Firewall<br />

Proxy server (encompassing Anti Virus and Web Filtering)<br />

Intrusion Detection <strong>Service</strong>.<br />

<strong>Service</strong> Description<br />

The Managed Security Infrastructure can be provided either at the Customer’s site or<br />

hosted within the Contractor’s data centres, depending on the most appropriate location for


the control. The Managed Security Infrastructure service includes a range of devices and<br />

services that can be supplied individually or combined together dependent on the Customer<br />

need.<br />

Within each service category, the Contractor shall provide a range of devices offering a<br />

variety of performance characteristics, features and availability options.<br />

Firewall<br />

The Firewall <strong>Service</strong> provides a passive defence mechanism based on a set of defined<br />

Firewall rules. Firewall policies are defined using the principle of everything that is not explicitly<br />

allowed is denied. These policies can be defined using a combination of Source IP address (or<br />

network), destination IP address (or network) & service port, e.g. HTTP, HTTPS, FTP etc<br />

The Firewall <strong>Service</strong> includes equipment that has been evaluated using the Common Criteria<br />

for Information Technology Security Evaluation international standard (ISO/IEC 15408)<br />

Events generated by each Firewall are collected and stored centrally and made available to<br />

Customers via the Contractor’s portal.<br />

Proxy server<br />

The Contractor shall provide a range of dedicated proxy appliances, which can be hosted in<br />

the Contractor’s data centre alongside their border or in-network firewalls and delivered into<br />

the Customer’s network via a dedicated transit network.<br />

330


The Contractor’s proxy service can be configured either as a simple proxy capability or as<br />

part of a more complicated web security solution including anti-virus and web content filtering.<br />

AV key features:<br />

331<br />

Real-time scanning of Internet traffic to delete viruses, worms, Trojans and other<br />

malicious programs.<br />

Flexible scanning rules.<br />

Ability to scan archived files (supports more than 260 file type formats).<br />

Detection of potentially harmful programs such as spyware.<br />

Web Content Filtering key features:<br />

Forward and reverse caching capability with transparent-mode available.<br />

Blocks malware, Web threats, fake software updates, fake AV offers, phishing offers and<br />

botnets or key-loggers calling home<br />

Provides Web 2.0 filtering for mashed-up or customised web portals, blocking panels<br />

and dynamic content per policy settings.<br />

Provides reputation ratings so policy controls can opt for inline threat analysis, or<br />

blocking downloads such as drive-by installers and executables from these sites.<br />

Web security solutions are typically bespoke services based on the Hosting <strong>Service</strong> and<br />

managed firewall portfolios, and require detailed design and planning. The Contractor can<br />

provide this as a Professional <strong>Service</strong>.<br />

The Contractor subscribe to engine and signature updates to ensure that the latest threats<br />

can be detected (where applicable). The volume of traffic that can be inspected by a single<br />

appliance depends upon a number of conditions.<br />

Intrusion Detection <strong>Service</strong>


The Contractor shall provide intrusion detection services based on the deployment of<br />

dedicated hardware. The intrusion detection service provides the following features:<br />

332<br />

Attack detection and anti-hacking protection capabilities that include ‘exploits’, ‘denials<br />

of service’, ‘reconnaissance’ and ‘misuse’.<br />

Transparent operation, designed not to impact network performance. The service is<br />

completely transparent to End Users.<br />

Scalable sensing performance.<br />

Analysis and correlation to identify real threats and tune out false positives.<br />

Active response for those alerts where this action is appropriate – the Customer’s<br />

nominated contact shall be alerted following an initial risk assessment.<br />

IDS tuning. The service includes the ongoing tuning of alerts.<br />

Technical Characteristics<br />

The Contractors Gateway <strong><strong>Service</strong>s</strong> operations and field engineering department are 24x7.<br />

The Contractor employs both SC and DV service operation and field engineering staff. Where<br />

appropriate for the Impact Level the Contractor will utilise only its DV staff operating from the<br />

Contractors dedicated DV only operations centres<br />

<strong>Service</strong> Provision – Approach (Delivery inc where applicable Design and Build)<br />

For the Firewall <strong>Service</strong>, Proxy Server <strong>Service</strong> and Intrusion Detection <strong>Service</strong>, the<br />

Contractor shall work with the Customer to define all requirements and complete a solution<br />

design document. The Customer Firewall <strong>Service</strong> shall be provisioned based on the details<br />

captured in the high-level design (HLD) document. The HLD shall capture the following details:<br />

Customer requirements, including performance and availability requirements<br />

Protective marking requirements


333<br />

High-level rule-base<br />

Proposed device or devices<br />

<strong>Service</strong> Levels targets<br />

Proposed acceptance test criteria for the Customer Firewall <strong>Service</strong>.<br />

When the Customer’s acceptance tests as defined in the HLD have been completed<br />

successfully, the Contractor shall report the results of the testing and send a Customer<br />

acceptance form to the Customer.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

<strong>Service</strong> management shall include:<br />

Continually monitoring and reporting in order to provide an indication as to the quality<br />

of the Managed Security Infrastructure service being measured.<br />

Monitoring service performance against the <strong>Service</strong> Level targets and reporting within<br />

the defined periods on service performance achieved and any <strong>Service</strong> Credits to be paid.<br />

Defining, agreeing, documenting and managing operational level agreements (OLAs)<br />

with other vendors.<br />

The primary service interface supporting the Managed Security Infrastructure service shall<br />

be the Contractor’s <strong>Service</strong> Desk, providing coordination of service management activities:<br />

Incident management<br />

Problem management<br />

Change management<br />

Release management<br />

Configuration management<br />

Capacity management<br />

Availability management<br />

<strong>Service</strong> level management<br />

Billing and provision queries


334<br />

Escalations<br />

Complaints<br />

The activities of third parties, including the security briefing (e.g. access procedures) of<br />

Sub-Contractors attending sites.<br />

The Contractor’s <strong>Service</strong> Desk shall operate 24 hours a day, seven (7) days a week, 365 days<br />

a year. The Customer shall be able to contact the Contractor’s <strong>Service</strong> Desk to raise and track<br />

service Incidents using the Customer Portal, telephone or email. Each Customer shall have<br />

access to a service management helpline (UK Freephone 0800 number) that shall enable them<br />

to contact incident management, service management and account management functions.<br />

The Contractor shall utilise existing HM <strong>Government</strong> service desks, infrastructure and<br />

processes to deliver a secure and compliant service. The core aspects of the Customer Firewall<br />

<strong>Service</strong> shall include:<br />

<strong>Service</strong> management functions aligned to ITIL.<br />

Proactive service monitoring.<br />

Management information delivered from multiple sources.<br />

Resilient UK secure customer service centres<br />

UK and global network operation centres (NOCs) in support of the Customer Firewall<br />

<strong><strong>Service</strong>s</strong>.<br />

Use of SC and DV-cleared engineering support teams.<br />

The Contractor shall provide a helpdesk function that shall assist in the resolution of<br />

Customer Firewall <strong>Service</strong> technical issues. This shall include troubleshooting and, where<br />

necessary, log file analysis. The Contractor shall create a customer service handbook to provide<br />

Customers with further information and guidance on both how to engage with the Contractor<br />

and how the Managed Security Infrastructure service shall be operated.


Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

335<br />

Bluecoat- Provision of proxy hardware and support services<br />

Checkpoint - Provision of firewall hardware and support services<br />

Cisco - Provision of firewall and switch hardware and support services<br />

ZScaler - Provision of web filtering and support services<br />

Symantec (Messagelabs) - Provision of filtering and scanning services<br />

SECURITY – PROTECTIVE EVENT MONITORING SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Protective Monitoring <strong>Service</strong> is designed to help the Customer to meet the<br />

requirements of Good Practice Guide 13 (GPG13) in relation to monitoring IT estate for<br />

potential security breaches. As well as supplying regular reports detailing malicious activity, the<br />

service includes real-time alerting and 24x7 Incident Response in line with published GPG13<br />

guidance.<br />

The <strong>Service</strong> has been specifically designed to align with the DETER segmentation of GPG13,<br />

and as such, is broadly suitable for monitoring IT solutions up to IL3 RESTRICTED.<br />

The service provides log storage and collection, as well as an analysis and correlation<br />

service. Any critical incidents identified will be analysed and assessed by QinetiQ against known<br />

threats, known Change Control activities and the general architecture of the service. After<br />

analysis the incident will be categorised and escalated to the Contractor’s Real-Time Operations


Centre (RTOC) for further investigation. Upon completion of the investigation, the Security<br />

Operations Centre (SOC) will provide a detailed explanation of the vulnerability or incident and<br />

make recommendations on how the issue should be addressed, e.g. patching, further logging or<br />

disconnection.<br />

High-Level <strong>Service</strong> Offering<br />

336<br />

Event Collection<br />

Event Monitoring and analysis service in support of compliance to GPG13<br />

Overarching <strong>Service</strong> Accreditation<br />

<strong>Service</strong> Description<br />

A high level summary of each component is provided below<br />

Event Collection<br />

Generation and collection of events from standard sources (where applicable)<br />

Retention of logs for further analysis as per GPG13 guidelines<br />

Hashing of event time-stamps to ensure integrity.<br />

Event Monitoring and Analysis <strong>Service</strong> in Support of Compliance To GPG13<br />

24x7 Security Operations Centre (SOC)<br />

Formalised set of Alert Actions in response to the analysis of Event Sources<br />

Integrated Incident Management function<br />

Automated Weekly Management Reports structured around GPG13<br />

Annotated Monthly Management Reports structured around GPG13<br />

Representation of Events and Reports in the context of system security risks.<br />

Overarching <strong>Service</strong> Accreditation


337<br />

<strong>Service</strong> RMADS and service accreditation/re-accreditation<br />

<strong>Service</strong> separation between Customers to simplify assessment of risks<br />

<strong>Service</strong> delivered from List X sites<br />

<strong>Service</strong> operated by SC-cleared staff.<br />

The Protective Monitoring <strong>Service</strong> provides a 24x7 SOC which processes all the events<br />

generated by the GPG13 <strong>Service</strong> provided to the Customer. The technology is dedicated to each<br />

individual Customer solution, with analyst resource provided from the pool of SOC staff on each<br />

shift.<br />

A dedicated Event Processing engine will continually poll the Customer Logger Appliance<br />

and pull events back for real-time processing within the SOC. The key functions of Analysis,<br />

Reporting and Alerting are:<br />

Pull Events in real-time from the Customer Logger Appliance<br />

Generate incident tickets on the Contractor ticket systems if log path failure detected<br />

Real-time correlation of events as defined<br />

Generate alarms when events meet defined rules/triggers<br />

Trend analysis of event data to detect suspicious activity<br />

GPG13 Customer Management Report production<br />

Initial Investigation of alarms prior to escalation or closure<br />

Escalation of all alarms to the RTOC that require further investigation (Qualified<br />

Incidents)<br />

Maintain records of all incident response activity (from creation to closure) for all alarms<br />

raised (regardless of whether they are qualified or not).<br />

Incident Response (RTOC)<br />

The Contractor RTOC will act as First Responder in relation to any incidents raised to it by<br />

the SOC (Qualified Alarms). The SOC has no access to any of the systems being protected by the


service (except limited read-only access to IDS sensors). Incident Response is a joint function<br />

between the SOC and RTOC. The SOC tracks all incidents from creation to closure and the full<br />

Incident Response process is detailed in the standard service RMADS. Key functions of Incident<br />

Response are:<br />

338<br />

Investigation of Incidents that are escalated by the SOC for further investigation<br />

Provide updates to all incident tickets<br />

Preserve any logs (as requested by the Customer) to support a formal Forensic<br />

Investigation<br />

Implement any changes (as per the change control process) to the collection platform or<br />

the monitored service (if managed by the Contractor) that are recommended by the<br />

SOC as the result of any Incident Investigation<br />

Incident Escalation (as detailed in the Incident Response Process).<br />

Event/Log File Retention<br />

Log data collected and processed by the SOC will not be retained by the SOC longer than is<br />

required to carry out trend analysis and monthly reporting.<br />

Each dedicated Logger appliance will store all logs received (both CEF and Raw format) for a<br />

period of three months. Log data beyond this age will be removed from the appliance. The<br />

appliances are backed up daily and the archived backups maintained for a period of 12 months.<br />

The Contractor is able to offer offline archiving for longer periods than those stated. This is<br />

subject to additional charges.<br />

In the event of an incident (whether detected by the service or not) that the Customer<br />

deems serious enough to warrant further investigation by the Customer (or their appointed<br />

Forensic Investigators or Law Enforcement), the Customer may request read access to the log


data held on the Logger appliance to facilitate the investigation. The Contractor will provide<br />

assistance where reasonably requested to support any formal investigation.<br />

The Contractor will make archived log data available to the Customer upon written request<br />

(provided the data is within the contracted archive period). The method of making this data<br />

available to the Customer will be agreed at the time of request.<br />

Technical Characteristics<br />

<strong>Service</strong> Provision - Approach<br />

Installation<br />

The service will include equipment, licences, design and physical implementation of the Log<br />

Collection solution:<br />

339<br />

List X data centre<br />

Design consultancy<br />

Hardware Logging Appliance(s)<br />

SmartConnector Agents<br />

Rack space (with suitable power and cooling)<br />

Implementation<br />

Configuration of all components in line with GPG13 requirements<br />

24x7 hardware and software support<br />

24x7 monitoring of log feeds to ensure all agents are operational<br />

24x7 Security Operations Centre<br />

24x7 Incident Investigation (as defined in the GPG13 specification)<br />

Secure Connectivity from the Log solution to the SOC<br />

Dedicated Event Processing Appliances


340<br />

Backup<br />

Log collection and retention<br />

Critical security upgrades<br />

Reporting (as defined in the GPG13 specification).<br />

Testing<br />

Upon completion of the build phase, the Contractor will perform a standard set of tests to<br />

confirm that all of the components are working correctly and events are flowing from the<br />

monitored devices to the SOC as expected. When all tests have been performed successfully,<br />

the solution will be considered live.<br />

<strong>Service</strong> Baselining<br />

To work efficiently, the GPG13 Protective Monitoring <strong>Service</strong> requires a period of baselining<br />

to allow analysts to fine tune and map log collection, event rules and triggers accurately to the<br />

solution being monitored. The period of baseline activity can vary from solution to solution, but<br />

usually takes around one calendar month.<br />

Logger, Connector, SmartConnector agents and other Licenses<br />

The equipment and licences below are supplied as part of the service implementation:<br />

Logging equipment<br />

Agent Connector appliance<br />

SmartConnector agents.<br />

<strong>Service</strong> Management/Reporting/<strong>Service</strong> Operations (In-Life)<br />

The service includes regular reporting to meet GPG13 requirements. This will take the form<br />

of an automated weekly report and a monthly report annotated by one of the SOC analysts.


341<br />

The Weekly Incident Report will be published within 24 hours of the final date to which<br />

the report relates.<br />

The Monthly Incident Report will be published within six working days of the final date<br />

to which the report relates.<br />

A custom report that details any events that triggered applied custom signatures will be<br />

published at the Customer’s request (subject to agreement).<br />

Weekly Report<br />

The Weekly Management Report will provide data for the previous weekly reporting period,<br />

comprising:<br />

Summary details of all Alerts raised within the period<br />

Details of any <strong>Service</strong> Issues.<br />

Monthly Report<br />

The Monthly Management Report will be based on the same underlying data as the weekly<br />

report, but will take a longer-term analysis of the collected data. This enables the SOC to<br />

provide historical and trending information about the Protective Monitoring Controls.<br />

Additionally, the Protective Monitoring Analyst will provide commentary on the data,<br />

attempting to explain patterns and anomalous behaviours. The report will be split into two<br />

sections: a management summary and more detailed technical content. This will present the<br />

data and will comprise:<br />

High-level breakdown against Protective Monitoring Controls<br />

Summary details of all Alerts raised within the period<br />

Summary of Event Tuning status for the period<br />

Change management.<br />

Details of any <strong>Service</strong> Issues


342<br />

<strong>Service</strong> performance details<br />

Written summary of each relevant Protective Monitoring Control, with graphical and<br />

tabular analysis.<br />

The Contractor shall operate a comprehensive change management process to support the<br />

GPG13 Protective Monitoring <strong>Service</strong>. Changes shall be requested by submitting a <strong>Service</strong><br />

Request to the Contractor’s frameworks change team via the Contractor’s <strong>Service</strong> Desk.<br />

The Contractor’s change management process shall be responsible for managing the<br />

change, providing the mechanism for assessing, controlling and managing requests. This role<br />

also incorporates release and configuration management processes.<br />

Changes, which will be processed using formal change management procedures, shall be<br />

agreed and aligned with the Customer’s requirements. The change process shall comprise the<br />

following activities:<br />

Raising and recording changes<br />

Assessing the impact, cost/benefit, and risk<br />

Business justification and approval<br />

Managing and coordinating implementation<br />

Reporting and monitoring implementation<br />

Reviewing <strong>Service</strong> Request<br />

Assessing and approving <strong>Service</strong> Requests.<br />

The Contractor shall monitor and document any changes made to the configuration of<br />

network elements under management. With the assistance of the Customer’s staff, the<br />

Contractor shall produce network schematics, using the Customer’s existing schematics as a<br />

baseline.


The Contractor’s change management process shall be controlled by a coordinator who<br />

shall be responsible for the overall management of the change.<br />

Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

343<br />

QinetiQ - Provision of security services<br />

SECURITY PRACTICE SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contractors Security Practice shall provide ongoing advice, support and design work<br />

including an option for use of CLAS consultants. The consultant shall work with the Customer’s<br />

IT security team so they can achieve the required level of accreditation subject to the<br />

Customer’s accreditation budget<br />

High Level <strong>Service</strong> Offering<br />

Security Professional <strong><strong>Service</strong>s</strong><br />

<strong>Service</strong> Description<br />

The Contractor’s security specialists have expertise covering:<br />

<strong>Service</strong> Group Overview of <strong>Service</strong><br />

<strong>Service</strong> Name


Vulnerability<br />

Detection<br />

Risk Metrics and<br />

Reporting<br />

Project<br />

Consultancy<br />

344<br />

A number of services<br />

targeted at identification of<br />

technical security vulnerabilities<br />

across key system components.<br />

By identifying security<br />

weaknesses we can reduce risk<br />

levels and attain compliance to<br />

key policies and standards for<br />

Customers.<br />

A series of management<br />

reports providing insight into<br />

particular risk levels within IT<br />

and Operational Environments<br />

including infrastructure security<br />

vulnerabilities and patching<br />

levels.<br />

A consultancy service - to<br />

interact with major business<br />

� Perimeter Penetration<br />

Testing.<br />

� Self <strong>Service</strong> Penetration<br />

Testing.<br />

� Operating System Security<br />

Scans.<br />

� Remote Network Security<br />

Scans.<br />

� Application Security Scans.<br />

� Wireless Network<br />

Detection.<br />

� Information Leakage<br />

Impact Assessment<br />

� Monthly Reporting.<br />

� Anti-Virus Index.<br />

� Vulnerability Index.<br />

� Infrastructure Change<br />

Consultancy.<br />

� New Technology Reviews.<br />

� Application Change<br />

Consultancy.


Security<br />

Standards<br />

Risk Awareness<br />

345<br />

projects in order to provide<br />

advice on good practice to help<br />

ensure that new systems go live<br />

without introducing additional<br />

security risks.<br />

A set of security standards<br />

aimed at establishing a minimum<br />

baseline of controls that<br />

significantly contribute towards<br />

Customers meeting the IT<br />

security expectations of their<br />

Customers, Regulators and<br />

Auditors.<br />

A service to alert relevant<br />

staff of critical vulnerabilities<br />

and risks as they arise so that<br />

the risks can be mitigated in a<br />

timely manner.<br />

Draws on notifications<br />

received from third parties on<br />

� Security Certification<br />

� IT Security Health Check<br />

� Security Gap Analysis<br />

� ISO27001 Gap Analysis<br />

� ISO27001 Compliance and<br />

Certification<br />

� Criticality Assessment.<br />

� Risk Logging.<br />

� Risk Assessment (CRAMM)<br />

� Technical Risk Assessment<br />

� Vulnerability Alert<br />

Notifications.<br />

� Real World Event<br />

Notifications.<br />

� Industry Security Trends.


346<br />

emerging threats.<br />

� Investigations � A series of investigation<br />

based services targeted at<br />

potential misuse of assets,<br />

theft of data, social<br />

engineering attempts and<br />

other incidents.<br />

� Incident<br />

� Response<br />

� Training and<br />

� Awareness<br />

� Audit and<br />

� Regulatory<br />

� Support<br />

� Change<br />

Review<br />

� and Approval<br />

� A service to respond to<br />

various incidents that may<br />

have a security or<br />

information risk angle, such<br />

as a virus outbreak, denial<br />

of service attack or theft of<br />

assets.<br />

� A service targeted at raising<br />

the awareness of<br />

information risk throughout<br />

our customers business.<br />

Combination of staff wide<br />

messages combined with<br />

specific training targeted at<br />

key staff.<br />

� A support service to IT to<br />

help them through internal,<br />

external or regulatory audits<br />

or investigations.<br />

� We help to answer<br />

questions related to security<br />

and explain key controls.<br />

� A service to review and<br />

approve various changes<br />

that may impact on<br />

informational risk. These<br />

include new connections,<br />

firewall rule changes and<br />

new infrastructure standard<br />

builds.<br />

� Incident Management<br />

Process<br />

� Computer Forensics<br />

Investigations.<br />

� Phishing Attempt<br />

Investigations.<br />

� General Investigations.<br />

� Malicious Code Response.<br />

� Virus Response.<br />

� Denial of <strong>Service</strong><br />

Response.<br />

� External Complaint<br />

Response.<br />

� Target Technology<br />

Training.<br />

� Security Administrator<br />

Training.<br />

� New Joiner Induction.<br />

� Communications and<br />

Awareness.<br />

� Instructor-Led Courses<br />

� Pre-Audit Health Check for<br />

IT.<br />

� Advice & Guidance During<br />

Audit.<br />

� Regulatory Interaction.<br />

� Change / <strong>Service</strong> Request<br />

review / Approval.<br />

� New Connection Request<br />

review / Approval.<br />

� New Infrastructure Build<br />

Standard Sign Off.


� Application<br />

� Security<br />

Technical<br />

Assurance<br />

(Public Sector)<br />

PCI-DSS<br />

Compliance<br />

347<br />

� Application Security reviews � Oracle Security Review.<br />

� Application Security Health<br />

Check<br />

� Operating Systems<br />

Security Scan (Win Unix)<br />

Architecture and operational<br />

service review to ensure that<br />

application, server and network<br />

architecture meets with HM<br />

<strong>Government</strong> and other highly<br />

regulated vertical sectors such as<br />

finance, utilities and<br />

pharmaceuticals.<br />

<strong><strong>Service</strong>s</strong> to provide<br />

assurance to en-clients of their<br />

compliance to PCI-DSS.<br />

� Technical Assurance Audit.<br />

� IT Health Check<br />

� Infrastructure Security<br />

Improvement Programme<br />

� GSi Network Accreditation<br />

� ISO27001 Technical<br />

Operations Readiness<br />

� Assessment<br />

� PCI-DSS Compliance Card<br />

Data Flow Review<br />

� PCI-DSS Compliance Gap<br />

Analysis and risk ass<br />

� PCI-DSS Compliance Policy<br />

& Process Review<br />

� PCI-DSS Compliance<br />

Network Security Review<br />

� PCI-DSS Compliance<br />

Remediation Plan<br />

� PCI-DSS Remediation Plan<br />

implementation<br />

� PCI-DSS Certification Audit


Outsourcing<br />

Security<br />

Management<br />

Business<br />

Continuity<br />

Disaster<br />

Recovery<br />

Identity and<br />

Access<br />

Management<br />

348<br />

Transition services that will<br />

review client security and service<br />

management environments in<br />

readiness for security take-on of<br />

services.<br />

Technical Characteristics<br />

<strong><strong>Service</strong>s</strong> that will utilise<br />

Business Continuity standard<br />

BS25999 part 1 and part 2<br />

To analyse business<br />

continuity processes.<br />

Architecture and operational<br />

service review to ensure that<br />

application, server and network<br />

architecture meets with HM<br />

<strong>Government</strong><br />

Delivery of Professional <strong><strong>Service</strong>s</strong> to the Customer<br />

� Outsourced Security<br />

Management Gap Analysis<br />

� Contractual Security<br />

<strong>Service</strong> Review<br />

� Security <strong>Service</strong><br />

Management Review<br />

� Others???<br />

� Business Continuity Gap<br />

Analysis (BS25999)<br />

� Technical Assurance Audit.<br />

� IT Health Check<br />

� Infrastructure Security<br />

Improvement Programme


Professional <strong><strong>Service</strong>s</strong> can be delivered in many different ways. The Contractor has outlined<br />

two approaches that Customers use most often: defined deliverable (fixed price) and day rate<br />

(time and materials).<br />

Defined Deliverable (Fixed Price)<br />

Prior to signature of the Call-Off Form, the scope of delivery, timescales and price shall be<br />

agreed by the Customer and Contractor in accordance with the Call-Off Terms. The Contractor<br />

shall then ensure suitable resources are applied to deliver the agreed scope within timescales<br />

for the agreed price. The methodology used for developing solutions shall take into account the<br />

full spectrum of requirements and not solely the functional aspects. Key risk areas for work<br />

packages delivered to the Customer include accuracy associated with following:<br />

349<br />

Scope;<br />

Assumptions (technical and commercial);<br />

Exclusions;<br />

Dependencies (internal and external); and<br />

Effort (both the Contractor’s and the Customer’s).<br />

The Contractor shall produce a scope of works document to define and explain the scope,<br />

assumptions, exclusions and effort (amongst other critical information) to allow the Customer<br />

to make an informed decision. The Contractor shall produce a fixed price based upon the<br />

production of one of the following documents:<br />

Day Rate (Time and Materials)<br />

The Customer may require professional resources to attend meetings and work with their<br />

teams to achieve specific objectives where the professional services requirement cannot be


fully scoped up front due to unknown variables. In such cases Customers can chose to adopt a<br />

day rate charging mechanism.<br />

All deliverables will be fully scoped and priced and will be subject to change control.<br />

Use of Subcontractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

350<br />

QinetiQ - Provision of security services<br />

INTERNET SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

This service description describes the Internet Access <strong>Service</strong>, its standard and optional<br />

features, and technical, service and support information.<br />

The Contractor’s Internet Access <strong>Service</strong> connects the Customer’s site directly to the<br />

Contractor’s Global IP Backbone (AS1273) via a dedicated access circuit provided at a range of<br />

fixed and burstable bandwidths from 2Mbps to 1Gbps.<br />

The Contractor’s Internet Access <strong>Service</strong> supports IPv4 and IPv6 internet addressing.<br />

The Contractor shall provide:<br />

Access Circuit(s) – connecting the Customer’s site to the multi-service platform and<br />

onwards to an Internet Edge Router on the Contractor’s IP Backbone.<br />

<strong>Service</strong>/Port Bandwidth – Internet service bandwidth is provisioned over the Access<br />

Circuit. The Contractor will provide options of:


351<br />

o Throttled bandwidth<br />

o Committed bandwidth plus burstable.(i.e. bandwidth above the committed)<br />

The Contractor shall provide as additional options:<br />

Customer Site Routers – where ordered, the Contractor shall install, configure, manage<br />

(remotely for changes where possible) and maintain a router located at the Customer<br />

site<br />

Internet features – where ordered, these include:<br />

o Managed Domain Name <strong><strong>Service</strong>s</strong><br />

o IP Addresses<br />

o ASN Numbers<br />

o Performance Reporting.<br />

Security features – where ordered, these include:<br />

o DDOS protection<br />

o Internet proxy services<br />

o Email security<br />

o Managed firewalls<br />

o Resilience services.<br />

<strong>Service</strong> support including:<br />

o Proactive monitoring of the Internet service up to the service demarcation point<br />

for hard down, alarms and events which map to severity 0-2 faults<br />

o 24/7 incident management support all year round<br />

o <strong>Service</strong> change requests<br />

o Online ‘MYCW’ portal.<br />

High Level <strong>Service</strong> Offering<br />

Internet Access.<br />

<strong>Service</strong> Description


Internet Access is provided over the Contractor’s Global IP Backbone known as AS1273*.<br />

The Contractor’s Global IP Backbone is engineered to 99.999% availability. In the event of a<br />

failure, the backbone will automatically deploy the most appropriate protection path, restoring<br />

traffic across the network in milliseconds using the RSVP fast reroute protocol.<br />

*Regional aggregation in the UK may be provided via the Contractor’s backbone known as<br />

AS2529, that is connected upstream to AS1273.<br />

Feature Summary Table<br />

Feature Sub-Feature Standard Optional<br />

Access<br />

Circuit<br />

<strong>Service</strong>/Port<br />

BW<br />

Customer<br />

Site<br />

Routers<br />

Internet<br />

Features<br />

352<br />

2, 4, 6, 8, 10, 100, 1000Mbps symmetric<br />

bandwidths. 10Gbps available subject to technical<br />

feasibility investigation.<br />

Committed bandwidth options from 2Mbps to<br />

1000Mbps<br />

Committed bandwidth plus burst options from<br />

2Mbps burst to 4Mbps, to 500Mbps burst to<br />

1000Mbps<br />

Range of Cisco ISRG2 routers, fully installed and<br />

configured with remote change management and<br />

maintenance<br />

Domain Name <strong><strong>Service</strong>s</strong>: transfers/registrations,<br />

authoritative DNS, DNS caching, SMTP mail<br />

IP Address Blocks: portable and non-transferable<br />

IPv4 & IPv6 addresses<br />

Autonomous System Network numbers: registration<br />

and routing<br />

�<br />

�<br />

�<br />

�<br />

�<br />

�<br />


Security<br />

Features<br />

<strong>Service</strong><br />

Support<br />

Technical<br />

Features<br />

353<br />

Performance Reporting: standard performance<br />

reporting or Application Performance Management<br />

DDOS Protection: reactive and proactive options<br />

using shared or dedicated cleaning zones<br />

Internet Proxy <strong>Service</strong><br />

Managed Firewall<br />

E-Mail Security: sold per mail box<br />

Dual Homing & Resilient <strong><strong>Service</strong>s</strong><br />

Proactive monitoring for unavailability & 24/7<br />

incident management<br />

MYCW Self <strong>Service</strong> Portal �<br />

Standard change management services �<br />

Range of professional services: capacity and<br />

performance management, security, project<br />

management<br />

Routing: static, BGP with default route, BGP with full<br />

routing table<br />

The Contractors Internet Access service shall support the following capabilities:<br />

Access Circuit and <strong>Service</strong> Bandwidths<br />

Managed Customer Site Router<br />

Optional Internet Features<br />

Optional Security Features<br />

Professional <strong><strong>Service</strong>s</strong>.<br />

�<br />

�<br />

�<br />

�<br />

�<br />

�<br />

�<br />

�<br />


Access Circuit and <strong>Service</strong> Bandwidths<br />

The table below list access circuit and service bandwidth options.<br />

Access<br />

Circuit BW<br />

s<br />

ps<br />

354<br />

BWs<br />

Committed <strong>Service</strong><br />

Committed +<br />

Burst <strong>Service</strong><br />

BWs<br />

2Mbps 2Mbps n/a<br />

4Mbps 2, 4Mbps<br />

2Mbps burst<br />

to 4Mbps<br />

Access<br />

Technology<br />

Ethernet<br />

or Leased<br />

Line<br />

Interface<br />

(Customer<br />

provided<br />

router)<br />

X21<br />

RJ45 or<br />

Ethernet RJ45<br />

6Mbps 2, 4, 6Mbps n/a Ethernet RJ45<br />

8Mbps 2, 4, 6, 8Mbps n/a Ethernet RJ45<br />

10Mbp<br />

100Mb<br />

2, 4, 6, 8, 10Mbps<br />

10, 15, 20, 30, 40,<br />

50, 60, 70, 80, 90,<br />

5Mbps burst<br />

to 10Mbps<br />

10Mbps burst<br />

to 20Mbps<br />

Ethernet RJ45<br />

Ethernet RJ45


ps<br />

1000M<br />

355<br />

100Mbps 20Mbps burst<br />

100, 200, 250, 300,<br />

400, 500, 600, 700,<br />

800, 900, 1000Mbps<br />

to 40Mbps<br />

50Mbps burst<br />

to 100Mbps<br />

100Mbps<br />

burst to 200Mbps<br />

200Mbps<br />

burst to 400Mbps<br />

500Mbps<br />

burst to<br />

1000Mbps<br />

Ethernet<br />

x/Lx<br />

1000BaseS<br />

Ethernet may be provided over copper, using Ethernet First Mile technology, or Fibre.<br />

Where new access circuits are required, then only the ‘Committed’ and<br />

‘Committed+Burst’ service bandwidths shown above are supported over the respective<br />

access circuit bandwidths. Where MSP access circuits already exist at the Customer site,<br />

and are provided over Fibre Ethernet access technology, then any of the ‘Committed’<br />

and ‘Committed+Burst’ service bandwidths will be supported where the existing access<br />

circuit has sufficient spare capacity.<br />

<strong>Service</strong> bandwidths are inclusive of all protocol and access network transmission<br />

overheads.<br />

Unless agreed otherwise, where managed Customer Premises Equipment (CPE) is<br />

required, and subject to the bandwidth and feature requirements, the Contractor may<br />

provide the service at the bandwidths ordered over the access technology of the<br />

Contractor’s choice. Where a ‘wires only’ service is required, the technologies and<br />

interfaces relevant to each site shall be those detailed on the order form and/or agreed<br />

during service delivery.


Managed Customer Site Router<br />

Where ordered, the Contractor shall install and configure Cisco ISR G2 router equipment.<br />

The Contractor shall manage and maintain the router in-life as follows:<br />

356<br />

Undertake service change requests, including soft and minor changes remotely,<br />

including changes to routing, IP addressing or service bandwidths<br />

Proactive monitoring all year round for critical hard down, unavailability, alarms<br />

Provide 24/7 fault management, including remote fault diagnosis and fault resolution<br />

where possible, and on-site repair or replacement of the Managed Router hardware or<br />

software, if necessary, to resolve faults.<br />

Optional Internet Features<br />

These include:<br />

Domain Name <strong><strong>Service</strong>s</strong><br />

Public IP Addressing and ASNs<br />

Performance Reporting.<br />

Domain Name <strong><strong>Service</strong>s</strong><br />

The Contractor’s Internet Domain Name <strong>Service</strong> (DNS) provides registration, transfer and<br />

hosting services for one or more domains. Domain names are supported subject to terms and<br />

conditions.<br />

tariff:<br />

The Contractor shall provide the following feature options within the Domain Name <strong>Service</strong><br />

DNS resolution – DNS resolution caching servers for the Internet to map domain names<br />

to individual IP addresses<br />

SMTP mail – Using mail exchange (MX) records in conjunction with corresponding mail<br />

systems, the DNS can be used to send and receive email. The Contractor supports<br />

multiple MX records for email delivery.


357<br />

Primary and secondary DNS – The Contractor provides a primary and/or secondary<br />

authoritative Domain Name Server service.<br />

Public IP Addresses and ASNs<br />

The Contractor supports IPv4 public IP addresses. IPv6 addresses are supported on a<br />

reasonable endeavours service level basis.<br />

For IP address assignments of /29, and larger address blocks, then RIPE approval will be<br />

required.<br />

The following types of IP addresses are available:<br />

Provider Aggregateable (PA) – These addresses are not portable. Addresses must be<br />

surrendered back to the Contractor at termination of service.<br />

Provider Independent (PI) – These addresses are fully portable.<br />

If the Customer has or intends to obtain a public Autonomous System Network (ASN), PI<br />

address space is required.<br />

Performance Reporting<br />

Performance reporting may be ordered, for a premium, with all Internet Access services.<br />

Performance Reporting provides the Customer with information regarding:<br />

Bandwidth utilisation<br />

<strong>Service</strong> availability<br />

Quality of service performance over the Contractor’s Global IP Backbone.<br />

Data is polled every five minutes and returns information over hourly, daily and monthly<br />

periods. Hourly data is stored for up to three months; daily and monthly data are stored for 14<br />

months.


In order to access MyStats reporting, the Customer representative shall require a MS<br />

Internet Explorer or Mozilla Firefox browser to be installed, operating at the required version<br />

(as defined at time of call off), together with relevant Java plug-in software.<br />

Optional Security Features<br />

These include:<br />

358<br />

Resilient <strong><strong>Service</strong>s</strong><br />

Dual Homing<br />

Distributed Denial of <strong>Service</strong> (DDOS) Protection<br />

Wider Security Portfolio Options.<br />

Resilient <strong><strong>Service</strong>s</strong><br />

Where requested, the Contractor shall provide (subject to feasibility study) a second<br />

‘Resilient’ <strong>Service</strong> into a Customer Site and in such instances a higher overall annual availability<br />

SLA can be offered. The following configuration options are available:<br />

Dual Parent (Fully Diverse) – with load balancing or active/standby configuration<br />

Dual Parent (Diverse Internet Edge Routers) – with load balancing or active/standby<br />

configuration.<br />

Dual Parent (Fully Diverse)<br />

The Resilient <strong>Service</strong> shall be connected to separate MSP access nodes and Provider Edge<br />

Routers, as well as separate IP Backbone nodes and Internet Edge Routers (IER) to that of the<br />

Primary <strong>Service</strong>. Reasonable endeavours will be used to provide assured diversity (at a cable<br />

and also duct level where possible) between the Resilient and Primary <strong><strong>Service</strong>s</strong>. At the<br />

Customer site, a common building entrance point will be used as standard. Separate building<br />

entrance points may be investigated, upon request, on a bespoke basis.


The Resilient <strong>Service</strong> Internet Port bandwidth must not be less than that of the Primary<br />

<strong>Service</strong>. Only committed <strong>Service</strong>/Port bandwidths are permitted on the Primary and Resilient<br />

<strong><strong>Service</strong>s</strong>. It is possible to use the Primary and Resilient <strong><strong>Service</strong>s</strong> simultaneously (i.e. in a ‘Load<br />

Balanced’ configuration). Alternatively, the Resilient <strong>Service</strong> can be used as a backup should the<br />

Primary <strong>Service</strong> fail. Where Managed Routers are provided, the Contractor shall be responsible<br />

for configuring Load Balancing or Failover between the Primary and Resilient services. Where<br />

the Customer has their own ASN the Contractor shall support BGP resilience between the<br />

Primary and Resilient <strong><strong>Service</strong>s</strong> as standard.<br />

Dual Parent (Diverse Internet Edge Routers)<br />

The Resilient <strong>Service</strong> shall be connected to a separate IP Backbone node and Internet Edge<br />

Router (IER) to that of the Primary <strong>Service</strong>. The Resilient <strong>Service</strong> Internet Port bandwidth must<br />

not be less than that of the Primary <strong>Service</strong>. Only committed <strong>Service</strong>/Port bandwidths are<br />

permitted on the Primary and Resilient <strong><strong>Service</strong>s</strong>. It is possible to use the Primary and Resilient<br />

<strong><strong>Service</strong>s</strong> simultaneously (i.e. in a ‘Load Balanced’ configuration). Alternatively, the Resilient<br />

<strong>Service</strong> can be used as a backup should the Primary <strong>Service</strong> fail. Where Managed Routers are<br />

provided, the Contractor shall be responsible for configuring Load Balancing or Failover<br />

between the Primary and Resilient services. Where the Customer has their own ASN the<br />

Contractor shall support BGP resilience between the Primary and Resilient <strong><strong>Service</strong>s</strong> as standard.<br />

Dual Homing<br />

This resilience option allows the Customer to order a separate Internet Access service from<br />

another ISP for use alongside the Contractor’s service. The Contractor shall provide a single<br />

Internet Access <strong>Service</strong> at the Customer site. The Customer shall be responsible for managing<br />

359


the resilient configuration (in terms of load-sharing or redundancy) across the Contractor’s<br />

service and that of another ISP. The Customer is required to have their own ASN. All exchange<br />

of routes between C&W Worldwide and the Customer will be via BGP. AS numbers used in BGP<br />

sessions and in AS Paths in routes notified by the Customer to us shall not be from ranges<br />

reserved for private use.<br />

Distributed Denial of <strong>Service</strong> Protection<br />

DDOS Protection aims to stop or diminish the effectiveness of DDOS attacks. The service<br />

stops attack packets from reaching their intended destination.<br />

Arbor Peakflow SP traffic anomaly detectors are deployed on the edge of the Contractor’s<br />

Global IP Backbone (upstream peering points) and Cisco DDOS Guard is used to mitigate<br />

attacks.<br />

The Contractor offers two service options:<br />

360<br />

<strong>Service</strong> Option 1 – a reactive service where the Contractor does not monitor the<br />

Customer’s Internet Access <strong>Service</strong> for DDOS attacks. Customers will have access to a<br />

24/7 support line to contact if attacked. The service is configured per IP address block.<br />

<strong>Service</strong> Option 2 – a proactive service where the Contractor monitors the Customer’s<br />

Internet Access <strong>Service</strong> for DDOS attacks. Key service features include:<br />

o Proactive monitoring – of traffic flows to protected IP addresses against predefined<br />

thresholds. The Contractor shall respond to alarms within 15 minutes,<br />

24/7 all year round. At this point, mitigation steps shall be agreed between the<br />

Contractor and the Customer.<br />

o FiveZone Detection configuration – allowing granular monitoring of critical<br />

servers and services across the Customer’s IP address range<br />

o Reporting – a portal showing near-real-time traffic flows against protected IP<br />

addresses.


The DDOS mitigation service operates from a shared Platform that offers protection for a<br />

number of Customers. The platform capacity to mitigate DDOS traffic for any given Customer is<br />

dependent upon a number of factors, including but not limited to: capacity already allocated in<br />

mitigating DDOS traffic for other customers of the platform, method of attack used, and the<br />

location at which the attack enters the C&W Worldwide network.<br />

DDOS is only available to Customers that are connected directly to the Contractor’s AS1273<br />

backbone.<br />

Wider Security Portfolio Options<br />

The Contractor’s Internet Access <strong><strong>Service</strong>s</strong> can be provided in conjunction with the following<br />

services:<br />

361<br />

Managed Internet Proxy<br />

Email Protection<br />

Managed Firewall.<br />

Professional <strong><strong>Service</strong>s</strong><br />

The following, non-exhaustive list of professional services are offered as options to the<br />

Customer with the Internet Access <strong>Service</strong>:<br />

Project Management<br />

<strong>Service</strong> Management<br />

Network and Solution Design<br />

Capacity and Performance Management<br />

Lifecycle Management<br />

Dedicated Customer Change Management<br />

Security and Compliance Management.


Technical Characteristics<br />

Routing<br />

Static Routing<br />

The Customer’s router is configured with a default route via the Contractor’s Internet Edge<br />

Router. The router advertises the Customer’s prefix range to the Internet through a static<br />

route(s) redistributed into BGP.<br />

BGP with Default Route<br />

The Customer’s router shall be configured to establish a BGP session with the Contractor’s<br />

Internet Edge Router using a private ASN assigned by the Contractor. This routing option is the<br />

minimum required when a Resilient <strong>Service</strong> is used.<br />

362<br />

The Customer shall advertise the ranges assigned to them to the Internet router<br />

The Internet router shall only advertise a single default route back to the Customer<br />

router.<br />

NB: Default BGP Timers shall be used as standard for Internet Access services, including<br />

existing migrated services that use non-default timers. Default BGP timers are set to 60<br />

seconds/180 seconds for keep-alive/hold-time. Where Customers with dual-homed sites<br />

require increased service fail-over, the Contractor can, upon request, tune the BGP timers for<br />

the Primary site only, to a maximum of 10s/30s keep-alive/hold-time.<br />

BGP Full Table<br />

The Customer’s router shall be configured to establish a BGP session with the Internet<br />

router using the Customer’s own ASN or one assigned by the Contractor.<br />

The Customer shall advertise the ranges assigned to them to the Internet router


363<br />

The Internet router shall advertise a full Internet routing table to the Customer.<br />

NB: Default BGP Timers shall be used as standard for Internet Access services, including<br />

existing migrated services that use non-default timers. Default BGP timers are set to 60<br />

seconds/180 seconds for keep-alive/hold-time. Where Customers with dual-homed sites<br />

require increased service fail-over, the Contractor can, upon request, tune the BGP timers for<br />

the Primary site only, to a maximum of 10s/30s keep-alive/hold-time.<br />

Managed Customer Router<br />

The Contractor shall configure the router, as per the order, for any of the following routing<br />

options:<br />

NAT – Network Address Translation (NAT) over the service via a managed Customer site<br />

router or a Managed Firewall<br />

Static – Using static routing, the Customer is provided with a statically-configured<br />

default route<br />

BGP – Using BGP a dynamic routing interface is established between the Customer and<br />

the Contractor<br />

HSRP – Deployed where multiple managed Customer site routers with Resilient <strong><strong>Service</strong>s</strong><br />

are delivered.<br />

Management Traffic<br />

The Internet Access <strong>Service</strong> shall be managed in-band. <strong>Service</strong> bandwidths are inclusive,<br />

therefore a small amount of bandwidth shall be used for management purposes. Where sites<br />

are connected using third party Fibre Ethernet circuits, the Contractor may locate a dedicated<br />

NTE at the Customer site behind the third party provider’s NTE.<br />

Wires Only <strong><strong>Service</strong>s</strong><br />

Where no Managed Customer Site Router is provided, the service demarcation point shall<br />

be the Customer-facing interface of the access circuit NTE at the Customer site. Other than


where 2Mbps access circuits are provided over leased lines, the LAN interface will be<br />

configured as an IEEE 802.1Q port.<br />

Resilient <strong><strong>Service</strong>s</strong> shall require the Customer to manage resiliency and failover<br />

configuration.<br />

Resilient <strong><strong>Service</strong>s</strong><br />

Dual Parent (Fully Diverse)<br />

The eBGP sessions between the Contractor’s Managed Customer Site Router and the<br />

Internet Edge Router (IER) ASPATH pre-pend. MED is used to make the backup link less<br />

preferred. Hot Standby Redundancy Protocol (HSRP) is run between the two managed<br />

Customer site routers where requested. In the event of a failure of the Primary CE, traffic shall<br />

be serviced by the Resilient <strong>Service</strong> CE. Upon return of the Primary CE, traffic shall then be<br />

serviced by the Primary CE. HSRP, if used, is also capable of providing ‘load balancing’ in the<br />

form of multiple HSRP groups being used, with the different groups using different routers as<br />

their primary router. While this is referred to as ‘load balancing’ it does not guarantee an equal<br />

distribution of traffic across both links. That is dependent upon the traffic loads from each of<br />

the configured HSRP groups.<br />

Dual Parent (Diverse Internet Routers)<br />

The Primary and Resilient Internet Access services are connected to a single MSP Edge<br />

Router but the end points (Internet Edge Routers) are diverse. The eBGP sessions between the<br />

Customer routers and the Internet routers and ASPATH pre-pend, MED would be used make<br />

364


the backup link less preferred. HSRP is run between the two Customer site routers where<br />

requested. HSRP is capable of supporting ‘load balancing’ where ordered.<br />

Burstable Bandwidth<br />

Where a burstable bandwidth option is taken and access technology allows, Customers shall<br />

be able to exceed their contracted bandwidth, within limits, based on the access circuit and<br />

committed rate. Out-of-contract (>CIR) traffic shall be marked with a lower EXP through the<br />

MSP aggregation into the Contractor’s IP/AS backbones. In the Internet, traffic differentiation<br />

does not exist.<br />

Domain Name <strong><strong>Service</strong>s</strong><br />

The Contractor’s DNS resolution server addresses are as follows:<br />

365<br />

Euro-cns3.cw.net – 141.1.1.1<br />

Euro-cns2.cw.net – 195.27.1.1<br />

The Contractor’s Global DNS server addresses are as follows:<br />

Ans1.cw.net – 141.1.27.248<br />

Ans2.cw.net – 195.27.1.2<br />

In order to act as a secondary DNS provider for a Customer:<br />

The Customer shall amend the allow-transfer parameter in their DNS configuration to<br />

allow zones transfers from 141.1.27.128 for all domains required to be secondary<br />

The Customer must ensure that each domain for which the Contractor acts as secondary<br />

has a refresh time value set between 1000 and 86,400 seconds<br />

Once A and B have been confirmed, the Customer must also notify the Contractor of<br />

their Public IP address for their DNS server from which the zones transfers are to occur<br />

The Contractor shall then ensure the name server records have been amended by the<br />

registrar for the domain(s) and show the required authoritative name servers.


Use of AS1273 and AS2529<br />

Internet Access is provided over the Contractor’s Global AS1273 backbone, however in the<br />

UK the AS2529 backbone may be used for aggregation purposes. AS2529 is connected<br />

upstream to AS1273. The table below provides more detail:<br />

Requirement Default AS<br />

Existing AS2529 connected Customer<br />

wishes to make a hard change whilst<br />

retaining IP addressing<br />

Existing AS1273 connected Customer<br />

wishes to make a hard change whilst<br />

retaining IP addressing<br />

New Customer <strong>Service</strong> requiring DDOS<br />

Protection<br />

New Customer <strong>Service</strong> requiring IPv6<br />

support<br />

(IPv6 is supported on a reasonable<br />

endeavours basis at present)<br />

Internet Access <strong>Service</strong> provided with an<br />

existing network service, over a MSAB, to<br />

an EU site outside mainland UK<br />

366<br />

AS2529<br />

AS1273<br />

AS1273<br />

AS1273<br />

AS1273<br />

All other new Customer <strong><strong>Service</strong>s</strong>. AS2529<br />

BGP Communities<br />

The Contractor’s Internet Access <strong>Service</strong> shall support use of BGP communities allowing the<br />

Customer to advertise routes between its Autonomous System Network number and the<br />

Contractor’s peers and/or transit providers.<br />

<strong>Service</strong> Support


Proactive Monitoring<br />

As standard, the Contractor undertakes proactive monitoring for a range of alarms that<br />

correlate to the Contractor’s definition for severity 0-2 faults. Severity levels shall be defined<br />

with the Customer.<br />

The Contractor proactively monitors its Internet Backbones, Multi-<strong>Service</strong> Platform and<br />

access circuits to Customer sites, and any Managed Routers where these are provided. The<br />

Contractor shall use reasonable endeavours to identify and react to alarms, to open trouble<br />

tickets and to commence service restoration activity, ahead of the Customer raising a trouble<br />

ticket. The Contractor will notify the Customer in accordance with the agreed contact plan<br />

within 15 minutes of the Contractor opening a trouble ticket.<br />

t<br />

The table below specifies the alarms that are proactively monitored for as standard*:<br />

Impac<br />

Grouping<br />

Acces<br />

s Circuit<br />

367<br />

Type<br />

Event<br />

Interfac<br />

e Down<br />

Loss of<br />

Resilience<br />

Description Internet<br />

The circuit is unavailable to send or receive IP<br />

packets in either direction. Applicable to access<br />

circuits provided over leased line technology.<br />

Traffic has failed to a Resilient <strong>Service</strong><br />

provided at the Customer site<br />

Access<br />

Y<br />

Y


ged<br />

Mana<br />

Customer<br />

Site<br />

Router<br />

368<br />

BGP<br />

Routing<br />

Failure<br />

Bouncin<br />

g Interfaces<br />

Device<br />

unreachable<br />

BGP routing protocol is not functioning.<br />

Applicable to Access Circuits provided using<br />

Ethernet technology.<br />

An Access Circuit is subject to brief instances<br />

of unavailability. If there are more than eight of<br />

these instances over an eight minute period an<br />

alarm will be triggered.<br />

Connectivity is lost to the C&W Managed CE<br />

device from the Internet Edge Router.<br />

* Proactive Monitoring excludes all service features and components not specified.<br />

Where access circuits are provided using Ethernet technology, service unavailability is only<br />

identifiable through loss of BGP routing alerts rather than an interface down alarm, and<br />

requires the Customer to use BGP routing. Where Ethernet First Mile technology is used, only<br />

full circuit failure upon loss of BGP is provided. The Contractor’s proactive monitoring policy<br />

(for the alarms detailed above) accounts for the suppression and buffering rules detailed below.<br />

Y<br />

Y<br />

Y


Suppression<br />

The following events are suppressed from being presented to the Contractor’s Network<br />

Management Centres for validation and generation of a trouble ticket:<br />

369<br />

Planned Outages and Emergency Maintenance – alarms generated by these events shall<br />

be fully suppressed<br />

Restricted Monitoring – for certain Customer sites and/or services, proactive monitoring<br />

may be withdrawn where requested by the Customer or as a consequence of frequent<br />

occurrence (three or more instances in a calendar year) of Customer-caused events,<br />

such as powering down.<br />

Buffering<br />

Alarms that are not suppressed shall be subject to the following buffering policies prior to<br />

presentation to the Network Management Centres:<br />

Basic Buffering (all alarms) – all alarms shall be buffered for 10 minutes from first<br />

occurrence.<br />

Bouncing Interfaces – except where there are more than eight bounces over an eight<br />

minute period, alarms relating to bouncing interfaces shall be buffered. The following<br />

exception applies:<br />

o All other access circuit interfaces – if there are more than five occurrences over a<br />

two hour period, an alarm will be triggered on the sixth occurrence for proactive<br />

monitoring following the defined 10 minute buffering period.<br />

Incident & Change Management<br />

Incident management is provided 24/7, all year round. Incidents may be raised by the<br />

Customer via telephone or online using the ‘MYCW’ self-service portal.<br />

Soft changes (including changes to managed Customer site routers, service bandwidths,<br />

routing and IP addressing, optional internet and security features) and hard changes are<br />

supported.


Online Portal<br />

Where ordered, the Contractor shall provide access to an online portal. The portal provides<br />

a range of self-service applications and supporting information including:<br />

370<br />

<strong>Service</strong> and support materials<br />

Order tracking<br />

Incident Management – For raising and tracking trouble tickets, and adding queries and<br />

comments<br />

Performance Reporting – Access to reporting where ordered<br />

E-billing.<br />

Use of Sub Contractors<br />

There are no Sub-Contractors in the supply this service.<br />

APPLICATION PERFORMANCE MANAGEMENT SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contractor’s APM <strong>Service</strong> consists of two distinct capabilities named Optimisation and<br />

End User Experience. The service will provide:<br />

Traffic visibility including application usage and performance over the network, real user<br />

experience for web or enterprise applications and business services;<br />

Traffic Performance Optimisation & Assurance;<br />

Fault investigation capabilities and performance base lining;<br />

24/7 incident management and proactive monitoring for critical unavailability events in<br />

the reporting infrastructure;<br />

Access to professional services.<br />

High Level <strong>Service</strong> Offering<br />

Optimisation


371<br />

End User Experience<br />

<strong>Service</strong> Description Optimisation<br />

The Contractor will deploy customer premises equipment that is connected to the LAN side<br />

of WAN routers. Physical appliances are deployed symmetrically — in data centres and remote<br />

locations to improve the response times of business-critical applications over network links.<br />

Optimisation consists of:<br />

Application Acceleration<br />

Application Control.<br />

Together these elements:<br />

Prioritise business-critical traffic, through AQS (Application Quality Score) policing and<br />

traffic-shaping.<br />

Reduce network latency using protocol and application specific optimisation.<br />

Reduce the bandwidth required to transfer traffic by compressing traffic<br />

Application Acceleration<br />

The <strong>Service</strong> provides improved performance for applications and files (subject to traffic<br />

profile) through a combination of technologies, including:<br />

Application and file protocol acceleration - Reduces latency and bandwidth utilisation<br />

through advanced protocol optimisation, including read-ahead, message prediction, and<br />

caching;<br />

Throughput optimisation - manipulate transport protocols to improve efficiency in WAN<br />

environments; and<br />

Bandwidth optimisation - Minimise the transmission of redundant data patterns through<br />

Data Redundancy Elimination (DRE) and TCP Flow Optimisation (TFO).<br />

The solution will be capable of use with the following applications as a minimum:


372<br />

File Sharing (MS Windows/CIFS; UNIX/NFS);<br />

Email (MS Exchange/MAPI; SMTP/POP3/IMAP; Lotus Notes);<br />

Internet/ Intranet (HTTP, WebDAV);<br />

Data Transfer (FTP);<br />

Software Distribution (Microsoft SMS; IBM Tivoli, Altiris);<br />

Database Applications (SQL; Oracle; Notes);<br />

Data Protection (Backup Applications; Data Replication); and<br />

Any TCP Based Application (Layer 4 compression & Acceleration).<br />

Optional services include:<br />

Pre-positioning on-Demand - The Contractors shall provide a reduction in cross-WAN<br />

traffic by using the Common Internet File System (CIFS) file pre-positioning capability<br />

and off-peak bandwidth to pre-warm the DRE cache in anticipation of a subsequent TCP<br />

request for the content or updates.<br />

Disk Encryption - Disk encryption provides protection for sensitive information that<br />

flows through deployed WAAS systems and that is stored in WAAS persistent storage.<br />

The disk encryption feature includes two aspects: the actual data encryption on the<br />

Acceleration Appliance disk and the encryption key storage and management.<br />

Cisco WAAS supports EAL4 certified disk encryption The Cisco Disk Encryption will not<br />

store a Key on the Appliance, all keys are read at boot time from the CMS. No key is<br />

stored anywhere on the WAAS appliance.<br />

Professional <strong><strong>Service</strong>s</strong><br />

Application Control<br />

The service has two main features - Visibility & Control, which enables the following:<br />

Protection of critical application traffic using enterprise-defined objectives;<br />

End-to-end WAN optimisation;<br />

Visibility of end-to-end WAN application performance;<br />

Proactive management of network spending.<br />

The Contractor will work with the Customer to define the business criticality and<br />

performance objectives of key applications and setup the APM service accordingly. The real-


time component of APM shall automatically and continuously optimise application<br />

performance in real-time, providing:<br />

373<br />

Increased application availability;<br />

Performance visibility;<br />

Bandwidth allocation on a per application/ per session basis to provide a defined user<br />

experience for defined applications;<br />

Visibility<br />

The Contractor solution will provide and manage the APM infrastructure and deliver the<br />

tools to enable the Customer to administer the application performance, behaviour, and<br />

fluctuating user demands across the wide area network.<br />

Comprehensive Measurement<br />

The APM Control <strong>Service</strong> performs deep packet inspection to identify comprehensive<br />

network metrics on a global, per site or per application basis.<br />

Application Discovery<br />

The APM Control <strong>Service</strong> will automatically discover applications running over the Customer<br />

network. Specific applications can be further defined using subnets and ports during<br />

implementation and after by securing the services of the Contractors Professional <strong><strong>Service</strong>s</strong>.<br />

Control<br />

Application Performance Objectives<br />

Visibility gives WAN wide per user per session information which allows the Customer to<br />

define how applications are to perform across the network (Application Performance<br />

Objectives).


The Customer, in conjunction with the Contractors professional services team, establish<br />

AQS (Application Quality Scores) based on both applications criticality to the business and<br />

traffic types. This enables dynamic bandwidth allocation to support peaks in demand.<br />

Applications Quality Score (AQS)<br />

AQS is dynamically calculated using information on whether or not the Application<br />

Performance Objectives have been reached showing the delivered service level using three<br />

values:<br />

WAN.<br />

374<br />

Good: all metrics are better than the objective thresholds – Application SLA<br />

met/exceeded<br />

Fair: some or all metrics are between the objective and maximum values - Application<br />

SLA is partially met<br />

Poor: some or all metrics have reached or exceeded the maximum value - Application<br />

SLA is not met<br />

The Application SLA’s are enforced using the Application Performance Objectives across the<br />

Application SLAs are per individual active session and include a set of objectives metrics and<br />

maximum thresholds on a configuration dashboard:<br />

Bandwidth per session<br />

One-way LAN to LAN delay, jitter, loss rate<br />

Round Trip Time, TCP retransmission rates<br />

Server Response Time<br />

The <strong>Service</strong> Levels are constantly monitored by the system, comparing achieved end-to-end<br />

performance with objectives.


Reporting<br />

The Customer will be provided with their own portal to access real time diagnostic tools and<br />

reports as part of the managed service, allowing real time troubleshooting and monitoring of<br />

key application SLAs. The tools can also be utilised for predictive modelling for workforce<br />

expansions, deployment of new applications and changes in work practices when aligned with<br />

the Contractors Professional <strong><strong>Service</strong>s</strong> function<br />

Helpdesk & Discovery Tools<br />

The following elements of the Ipanema system provide the Customer information on their<br />

data as it crosses the network Nominated Customer staff will be provided with user accounts<br />

to administer these elements.<br />

375<br />

Helpdesk - The Helpdesk provides a traffic light heat map of the real time performance<br />

of the applications flowing across the network.<br />

Real Time Flows (AQS) - From the helpdesk the user can investigate any element on the<br />

heat map to view real time flows.<br />

Discovery Tool - The Discovery Tool delivers the capability to see every packet crossing a<br />

physical device.<br />

Please note<br />

“The Discovery Tool feature may be restricted or removed if there is adverse impact on the<br />

performance of the ip|e Engine. It is expected that the Customer will only start the discovery<br />

agent on an ip|e Engine when detailed traffic analysis is required for troubleshooting. This also<br />

assumes that the agent will be stopped when not required.”<br />

Optional services include:<br />

Rightsizing - This service is an optional extra available on physical engines only. The<br />

Customer can use these reports to plan the required amount of bandwidth based on the<br />

Customer’s objectives for performance and that rules are delivering enhanced<br />

performance and user satisfaction.<br />

Smartpath - This service is an optional extra available on physical engines only.<br />

Smartpath is for multi-networked branch offices, allowing automatic selection of the


376<br />

best network according to actual performance and application traffic characteristics, in<br />

real time.<br />

This feature selects the best access method for each application flow to increase the<br />

delivered performance and continuity, while optimising the usage of each available<br />

network. WAN selection criteria include performance parameters including network<br />

delay, jitter and loss, as well as currently available effective bandwidth.<br />

SmartPath assesses the best path at the beginning of each session. This choice can<br />

be static (no change during the session) or not as dynamic changes can be allowed. It is<br />

optionally possible to guarantee the same path choice for both directions of the session.<br />

Professional <strong><strong>Service</strong>s</strong><br />

End User Experience (EUE) <strong>Service</strong> Description<br />

The Contractor APM EUE service will measure end user experience that contribute to<br />

service components, proactively detect performance issues, quantify their business impact and<br />

provide information that can be used to resolve the issue. The solution works for any type of<br />

application, including applications accessed by employees, e-commerce web sites visited by<br />

Customers or applications running on mobile devices.<br />

APM EUE Reporting will provide visibility of the real user traffic for business critical<br />

applications, site to site.<br />

The service makes use of agentless probes, which can be placed at various locations across<br />

the application delivery chain, in order to measure the user performance across key


applications. It is possible to measure Meta data, application transactions and performance<br />

within multiple tiers of the application by providing detailed response-time measurements for<br />

middleware and database transactions.<br />

The Contractor’s service offers two EUE Reporting options, Standard and Premium:<br />

377<br />

Standard – provides visibility of end user transactions across the internet, and /or<br />

enterprise, for an agreed list of applications. A range of role based, dashboards and<br />

metrics are provided, to meet the needs of different users within the Customer<br />

organisation.<br />

Premium – dashboards, metrics and targets are tailored, within limitation, to meet the<br />

Customer’s requirements. It is possible to develop the dashboards to provide a business<br />

service management view.<br />

Key differences between Standard and Premium are tabled below:<br />

Key Values<br />

Single Tier Reporting for Web or<br />

Enterprise Apps<br />

Multi-Tier Reporting for Web & or<br />

Enterprise Apps<br />

In<br />

Tariff<br />

�<br />

x<br />

Standard<br />

Opti<br />

onal<br />

x<br />

�<br />

In<br />

Tariff<br />

�<br />

�<br />

Premium<br />

Optio<br />

nal<br />

x<br />

x


Universal decode for HTTP/HTTPs � x � x<br />

Out Of The Box Standard Reports<br />

and Dashboard<br />

Customised Reports, Dashboard &<br />

Business <strong>Service</strong> Management<br />

Up to 100 locations with grouped<br />

user stats<br />

Up to 250 locations with individual<br />

user stats<br />

378<br />

�<br />

x<br />

x x � x<br />

Reports updated daily � x x x<br />

Reports updated in near real time x x � x<br />

3 Monthly Baselining � x x x<br />

Monthly Baselining x x � x<br />

Optional Modules, Decodes, Metrics<br />

& Professional <strong><strong>Service</strong>s</strong><br />

�<br />

x<br />

x<br />

x<br />

x<br />

�<br />

�<br />

x � x �<br />

Professional <strong><strong>Service</strong>s</strong> � x � x<br />

x<br />

x<br />

x


(design/implementation)<br />

Professional <strong><strong>Service</strong>s</strong> (training) � x � x<br />

Professional <strong><strong>Service</strong>s</strong> (In life<br />

Performance Consulting)<br />

Optional Synthetic Web Site<br />

Monitoring<br />

379<br />

x � � x<br />

x � x �<br />

The demarcation point for the Contractor APM service is at the LAN port of the AMD<br />

physical appliance, there is no accountability on the LAN side of the Customer data Centre or<br />

for the amount of data being sent to the WAN from the LAN.<br />

APM EUE Reporting provides essential visibility of the real user experience for business<br />

critical applications, end to end, from the first mile to the last mile via 2 deployment options.<br />

APM EUE Web<br />

APM EUE Enterprise<br />

Contractor EUE Web<br />

A 10Mb IP Virtual Private Network (VPN) connection (management Path) is built and<br />

configured to connect the Customer WAN to the Contractor Hosting platform, where the<br />

Customer specific Management PoD is housed. The Management PoD houses the intelligence<br />

for the APM EUE Web service. On the Customer data centre the Contractor shall install<br />

Agentless Monitoring Device(s) to suit the solution. These devices will collect data from the


Customer network and relay that information to the Management PoD, where the information<br />

will be collated and presented back in a dashboard view to provide information about<br />

performance and usage of web site performance.<br />

Contractor EUE Enterprise Applications<br />

A 10Mb IP Virtual Private Network (VPN) connection (management Path) is built and<br />

configured to connect the Customer WAN to the Contractor Hosting platform, where the<br />

Customer specific Management PoD is housed. The Management PoD houses the intelligence<br />

for the APM EUE Web service. On the Customer data centre the Contractor will install<br />

Agentless Monitoring Device(s) to suit the solution. These devices will collect data from the<br />

Customer network and relay that information to the Management PoD, where the information<br />

will be collated and presented back in a dashboard view to provide information about<br />

performance and usage of key applications.<br />

Detection of Abnormal Application & Network Usage Patterns<br />

A set of predefined alarms detects application performance problems (response time). A<br />

report will be generated at the end of the day, showing application errors and exceptional<br />

network conditions (latency, retransmissions, bandwidth abuse) and will inform about new<br />

applications, new servers, new users, and new workstations on the network.<br />

Alarms<br />

The rule-based alerting engine, works on real-time data stored in the database, it checks all<br />

the defined alarming conditions every five minutes. The engine has:<br />

380


381<br />

Alarm-triggering hysteresis<br />

Alarm reminders<br />

Extinguishing options<br />

Automatic (baseline)<br />

Manual thresholds<br />

Customisable alarm notification messages.<br />

Professional services shall, as an option, be provided<br />

Technical Characteristics<br />

<strong>Service</strong> Management<br />

Incident Management and Reporting<br />

Proactive infrastructure Monitoring for critical unavailability issues<br />

24/7 all year round incident management<br />

Automated back-up scripts for APM configurations<br />

Change Management<br />

Upgrade / Update service<br />

The demarcation point for the Contractors APM service is at the LAN port of the WAAS<br />

physical appliance, there is no accountability on the LAN side of the Customer data Centre or<br />

branch estate or for the amount of data being sent to the WAN from the LAN.<br />

Use of Sub Contractors<br />

The Contractor uses the following sub contractors in the delivery of this service;<br />

Cisco - Provision of APM hardware and support services


STORM SERVICE DESCRIPTION<br />

<strong>Service</strong> Overview<br />

The Contractors STORM service provides direct fixed and mobile voice network connectivity<br />

with up to 30,000 ports available – 20,000 TDM and 10,000 VoIP.<br />

Each access number hosted on STORM is allocated to a specific client or service.<br />

Inbound inquiries are provisioned to receive a treatment – for example by being answered<br />

with a recorded announcement<br />

For outbound services, automated predictive diallers can initiate concurrent voice (or SMS)<br />

contacts - using number lists uploaded to STORM, or derived from a Customer’s system. Using<br />

IVR STORM can, for example, instigate a voice call, play recorded prompts, route an inquiry<br />

according to the responses given, record the entire dialogue, or generate an email or SMS<br />

notification as a result.<br />

High Level <strong>Service</strong> Offering<br />

In-bound and out-bound multi media messaging<br />

<strong>Service</strong> Description<br />

STORM provides a range of ‘Cloud based’ functions and facilities, delivered through a<br />

Software-as-a-<strong>Service</strong> (SaaS) model. These capabilities can be combined and enables the<br />

Customer to implement multi-functional messaging solutions.<br />

382


Interaction with STORM uses web-based interfaces, via the Internet or direct connections.<br />

Functions and facilities available include:<br />

Predictive Dialler<br />

Outbound voice service linking a Contact Centre agent to an end customer. Used for<br />

relaying sales, service and marketing messages or a prompt that then initiates a contact centre<br />

agent call. Or alternatively a direct connection with the Agent.<br />

Outbound Voice broadcast<br />

Contacts are called on the telephone and a pre-recorded message, preceded optionally by<br />

an introduction prompt is played to them. Acknowledgement by key press can be requested<br />

and logged.<br />

Inbound Short Message <strong>Service</strong> (SMS)<br />

The STORM platform receives a mobile text message with a key word that identifies the<br />

service to be run and then creates a configurable response determined by the content of the<br />

text. Configurable response could be a confirmation text message sent outbound or other<br />

media such as MMS or video.<br />

Outbound Short Message <strong>Service</strong> (SMS)<br />

Delivering a text message to multiple mobile lines. Informational or invitation to respond<br />

based on the content of the text that can include a mobile internet link (URL).<br />

383


Outbound International SMS<br />

The ability to send message to international mobiles or UK mobiles roaming internationally.<br />

Inbound Multi-media Messaging <strong>Service</strong> (MMS)<br />

The STORM platform receives a multi media message with a key word that identifies the<br />

service to be run and then a configurable response determined by the service. The configurable<br />

response could be a confirmation text message sent outbound or other media such as MMS or<br />

video.<br />

Outbound Multi-media Messaging <strong>Service</strong> (MMS)<br />

Delivering a multimedia message to multiple mobile lines. Informational or invitation to<br />

respond based on the content of the MMS.<br />

Outbound video to mobile<br />

Delivering video content as a MMS attachment. Can be combined with an SMS inbound<br />

short code advertised or voice inbound number, or just a straight outbound broadcast.<br />

Configurable to have a response to a contact centre agent.<br />

Web Inbound<br />

VoIP calls into STORM from a web click. Customer call link initiates a VoIP call to a contact<br />

centre agent, or web entry for polling.<br />

Inbound Email<br />

384


The STORM platform receives an email message to an address that identifies the service to<br />

run with a configurable response based on the content. Converting the email to an SMS by<br />

analysing the subject or address to find out the destination.<br />

Inbound email with WAV, TIFF or PDF attachments that are converted to a fax or voice call.<br />

Outbound Email<br />

Broadcast email message to multiple addresses, or inbound SMS/fax converted to an<br />

outbound email. Informational or invitation to respond based on content of the email.<br />

Converting an inbound SMS message to an email for delivery to an address.<br />

Red Button<br />

Entry for polling via interactive TV. Integration with 3 rd party Red button platforms to collect<br />

entries for a converged competition.<br />

Inbound Fax<br />

STORM receives fax and stores as TIF file. Inbound fax attached to an outbound email.<br />

Outbound Fax<br />

STORM sends TIF file to end user’s fax machine. Informational or invitation to respond<br />

based on content of the fax. This could also be a fax broadcast service.<br />

Automatic Speech Recognition (ASR)<br />

385


Callers are asked to speak their responses as an alternative to DTMF.<br />

Self service application<br />

The STORM self service portal allows a user to define the service logic which controls how a<br />

service runs. The Customer is allowed to set up inbound/outbound service from a template and<br />

gives it a schedule and access method / contact list (phone number, SMS short code etc).<br />

More complex requirement can be created using the <strong>Service</strong> Designer function<br />

The <strong>Service</strong> Designer can be used to create the service logic for:<br />

386<br />

Web / SMS / Red Button and Voice services<br />

Customer Identification and Verification services<br />

Inbound and outbound call handling, tracking and recording services<br />

Automated SMS, email and VoIP notification services<br />

Call recording<br />

Calls can be recorded on the basis of all calls received or a specified percentage of calls.<br />

Includes storage and an access tool for the Recording manager.<br />

Professional <strong><strong>Service</strong>s</strong><br />

The Contractor can offer professional services to assist with designing a solution for the<br />

Customer<br />

Managed service package


The set up of the inbound or outbound services are managed according to Customer<br />

requirements<br />

STORM Reporting<br />

The Customer has access to statistics, both real-time (dashboard) and historical (15 minute<br />

delay) Users can check on call volumes, and option popularity for example. Users can also pick a<br />

winner for competitions. The export facility allows download of CDR information for the<br />

Customer’s own analysis.<br />

Storm Dashboard<br />

STORM Dashboard is used to create customisable displays of real-time service data. The<br />

Customer can design their own Dashboards, multiple dashboards can be designed to cater for<br />

differing service environments and reporting requirements, and the resulting Dashboard<br />

designs can be saved and shared among users.<br />

Technical Characteristics<br />

PCI Compliance<br />

The STORM platform is PCI compliant and certified every 3 months in relation to the<br />

processing of credit/debit payments.<br />

If there is a requirement for PCI compliance in relation to call recordings, there are two<br />

options:<br />

387


388<br />

A manual stop and start recording process, i.e. the agent stops the recording and starts<br />

the recording either from the softphone or keypad tones.<br />

Integrating into a Customer’s CRM so that when the agent clicks on the payment page,<br />

the system automatically stops recording and once out of the payment page recording is<br />

resumed.<br />

<strong>Service</strong> Provision<br />

The Contractor will provide <strong>Service</strong> from the <strong>Service</strong> Commencement Date given to the<br />

Customer.<br />

When a <strong>Service</strong> or Software is to become unavailable, the Customer will be notified by<br />

means of a <strong>Service</strong> or Software Discontinuance Notification (SDN) document. The document<br />

will provide details of the <strong>Service</strong> or Software being discontinued, and relevant dates.<br />

If a discontinued <strong>Service</strong> is to be replaced by a new <strong>Service</strong> or Software, this constitutes a<br />

<strong>Service</strong> Change or Upgrade.<br />

Incident Management<br />

The STORM platform is designed to achieve a target availability of 99.999%.<br />

When necessary to carry out essential maintenance or network upgrades, The Contractor<br />

shall give the Customer at least ten (10) calendar days’ notice of any temporary interruption in<br />

<strong>Service</strong> which is necessary for to carry out essential maintenance or network upgrades<br />

(“Planned Outage”) and shall endeavour to agree a convenient time for the Planned Outage<br />

with the Customer. In the event that an emergency Planned Outage is required, The Contractor


shall give the Customer the maximum notice reasonable. Any Planned Outage shall not be<br />

included in Fault or availability measurements.<br />

The Customer must provide adequate information, to be agreed between the Contractor<br />

and Customer, to the Contractor when the problem is first reported to enable The Contractor<br />

to diagnose and resolve the suspected fault.<br />

A monthly performance report is available on request. The fault summary within the report<br />

will contain a breakdown of all faults experienced by the Customer.<br />

Billing and Payment<br />

Set-up and installation fees will be payable on receipt of order or completion of installation<br />

as agreed.<br />

Any regular monthly service charges will be payable one month in advance.<br />

Any usage charges e.g. sms or voice calls, will be billed monthly in arrears.<br />

Payment terms shall be 30 days from date of invoice.<br />

Use of Sub Contractors<br />

There are no sub contractors in the supply this service.<br />

389


Cassidian UK<br />

Provision of Communications <strong><strong>Service</strong>s</strong>: supply, installation, maintenance, technical architecture and<br />

system design, project management, and support for equipment, commodity and managed service. The<br />

Lot scope includes: all traditional and IP based voice services; voice call packages; voice minutes; DDI,<br />

premium rate numbers; non-geographic numbers; 118 enquiries; call preference services, audio<br />

conferencing, desktop video conferencing and collaboration tools; web conferencing; Internet services;<br />

email and website services; co-location and hosting; on-line storage; security services; antivirus; email<br />

scanning and filtering; firewalls; intrusion and spyware detection; authentication and access<br />

management; web and application sign on services; web conferencing; messaging services; real time<br />

information services; desktop messaging; messaging via email, SMS, pager and mobile or fixed line<br />

telephone; provision of all elements of a complete solution; Note that connectivity does not fall within<br />

the scope of this Lot.<br />

Communications <strong><strong>Service</strong>s</strong> - Introduction<br />

Cassidian provides a suite of specific services and service capabilities within the <strong>PSN</strong><br />

Communications <strong>Service</strong>, which are available to the Customer Authority and their <strong>Service</strong> Consumers.<br />

The following sections introduce Cassidian’s Technical approach, <strong>Service</strong> Management approach, and<br />

Security approach to the delivery of these services. For each of these approaches, Cassidian has<br />

identified the underpinning principles for a successful delivery to the <strong>Service</strong> Consumer.<br />

Communications <strong>Service</strong> – Technical <strong>Service</strong> Approach - Overview<br />

Cassidian has a number of service capabilities that are appropriate to the <strong>PSN</strong> <strong>Service</strong> Consumer<br />

within this framework contract. These services and service capabilities have been designed with all the<br />

relevant <strong>PSN</strong> and CESG requirements and policies incorporated within the service solution offering. All<br />

service offerings are provided with relevant client and server software, licensing, and management. The<br />

390


level and specific aspects of management provided by Cassidian via the Cassidian <strong>Service</strong> and<br />

Operations Centres (CSOC) is defined within the <strong>Service</strong> Management Approach section that can be<br />

found at 0.<br />

The underpinning Security and Accreditation approach adopted for these services within the <strong>PSN</strong><br />

environment are defined within section 0.<br />

Unless specifically excluded, Cassidian offer all of our <strong><strong>Service</strong>s</strong> and <strong>Service</strong> Capabilities within all<br />

three <strong>PSN</strong> Security Domains (PROTECT, RESTRICTED and CONFIDENTIAL).<br />

As a result of this comprehensive approach Cassidian is able to provide the following services to the<br />

<strong>Service</strong> Consumer:<br />

Voice <strong><strong>Service</strong>s</strong><br />

Within this service offering, Cassidian provides a comprehensive Voice <strong>Service</strong> that provides all of<br />

the essential and enhanced voice functionality required within the modern consumer organisation.<br />

This service delivers all the required aspects of the telephony distribution, voice conferencing, call<br />

handling, interconnectivity, and gateways to other <strong>Service</strong> Consumers along with associated services,<br />

and dependent upon the security domain, onward connectivity to and from the wider public telephony<br />

network. The full technical detail definition for this service is contained within 0.<br />

391


Desktop and Web Video Conferencing and Collaboration Environment<br />

Within this service offering, Cassidian provides a fully functional Video-Teleconferencing and<br />

Collaboration environment, this service and it constituent capabilities have been designed to deliver the<br />

most flexible, integrated and agile near-face to face and collaboration environment for our <strong>Service</strong><br />

Consumers within the requirements of the <strong>PSN</strong> security environments.<br />

This service provides the <strong>Service</strong> Consumer with all the required aspects of this service including the<br />

client software and server capabilities. This service also provides integration with voice services via a SIP<br />

gateway, fully functional remote connectivity via the web-client interface and federation integration<br />

with other solutions via the standards based VTC gateway.<br />

The full technical detail definition for this service is contained within 0.<br />

Internet <strong><strong>Service</strong>s</strong><br />

Within this service offering Cassidian provides a complete suite of Internet and Intranet <strong>Service</strong><br />

capabilities. These capabilities have been selected to allow the <strong>Service</strong> Consumer to realise all of the key<br />

and core enabling and underpinning service capabilities required for effective communications within<br />

the <strong>PSN</strong> environment. To achieve this Cassidian can provide the <strong>Service</strong> Consumer with the following<br />

service capabilities:<br />

392<br />

Internet Access <strong>Service</strong> – This provides a complete managed and monitored connection from<br />

the <strong>Service</strong> Consumer’s environment to the Internet. The full technical detail definition for this<br />

service is contained within 0


393<br />

Domain Name <strong>Service</strong> – This provides the <strong>Service</strong> Consumer will all resolution services required<br />

within their own Intranet namespace and manage their Internet namespace. The full technical<br />

detail definition for this service is contained within 0<br />

Dynamic Host Configuration Protocol (DHCP) <strong><strong>Service</strong>s</strong> – This allows the <strong>Service</strong> Consumer to<br />

dynamically provide all of their IP devices and appliances with the relevant IP configuration<br />

information and the location of key services. The full technical detail definition for this service is<br />

contained within 0<br />

Forward and Reverse Network Address Translation (NAT) <strong><strong>Service</strong>s</strong> – This ensures that the<br />

<strong>Service</strong> Consumer does not publish or route incorrect IP addresses outside of their boundary<br />

whilst still ensuring that interoperability can be achieved with other Organisations within your<br />

<strong>PSN</strong> environment. The full technical detail definition for this service is contained within 0<br />

Network and Capability Monitoring <strong><strong>Service</strong>s</strong> – This capability ensure that the <strong>Service</strong> Consumer<br />

is provided a real-time awareness of the current status of all Cassidian delivered services and<br />

capabilities. This service offering is also available for the <strong>Service</strong> Consumer to achieve a<br />

comprehensive 24x7 view of their current network; platform and services with an ITIL based<br />

escalation and alerting process. This service is available for all existing <strong>Service</strong> Consumers assets.<br />

The full technical detail definition for this service is contained within 0<br />

Network Capability Management <strong><strong>Service</strong>s</strong> – Network Management extends the capabilities<br />

within Network Monitoring to include a fully managed and configuration controlled <strong>Service</strong><br />

Consumers environment delivered 24x7 by Cassidian. The full technical detail definition for this<br />

service is contained within 0<br />

Secure Internet Gateways – The Cassidian Secure Internet Gateway capability provides the<br />

<strong>Service</strong> Consumer with both secured messaging and web gateways services to enable<br />

interworking between PROTECT and the Internet, for higher level inter-domain working please<br />

use the firewall services. The full technical detail definition for this service is contained within 0<br />

Accurate Time <strong>Service</strong> – Modern systems and security capabilities require highly accurate time,<br />

this service capability form Cassidian provides the service consumer will all the required<br />

elements to maintain that accurate time required to support business applications and<br />

operations. The full technical detail definition for this service is contained within 0<br />

E-Mail and Desktop Messaging (Including scanning and filtering)<br />

Within this service offering Cassidian provides the <strong>Service</strong> Consumer with a comprehensive suite of<br />

Messaging services and capabilities. These capabilities provide the service consumer with all of the<br />

functional aspects required from the client and security labelling extensions to the messaging servers<br />

and inter-organisational gateways.<br />

Within the scope of this service offering Cassidian also provides extensibility options to support<br />

secure Inter-Personal Messaging and Inter-Organisational Messaging.


This service can also be supplemented by application level firewalls to provide the <strong>Service</strong> Consumer<br />

with inter-organisational mail scanning and filtering and secure release of inter-domain messaging. The<br />

full technical detail definition for this service is contained within 0.<br />

Co-location and Hosting<br />

Within this service offering Cassidian provisions processing, storage, networks, and other<br />

fundamental computer resources where the <strong>Service</strong> Consumer is able to deploy and run arbitrary<br />

software, which can include operating systems and applications. The <strong>Service</strong> Consumer does not<br />

manage or control the underlying infrastructure but has control over operating systems, storage,<br />

deployed applications and limited control of select networking components dependent upon the<br />

security domain. This service is only provided for PROTECT and RESTRICTED <strong>PSN</strong> domains. The full<br />

technical detail definition for this service is contained within 0<br />

On-Line Storage <strong><strong>Service</strong>s</strong><br />

The online storage service (Secure Managed Storage <strong>Service</strong>) provides Microsoft Windows based<br />

network file shares based on the Common Internet File System (CIFS) standard, providing secure remote<br />

file and directory access for client machines independent of the client machines operating system. The<br />

service has been designed to integrate with the <strong>Service</strong> Consumers selected Directory <strong>Service</strong> to support<br />

full access control. This service is only provided for PROTECT and RESTRICTED <strong>PSN</strong> domains. The full<br />

technical detail definition for this service is contained within 0.<br />

Security <strong><strong>Service</strong>s</strong><br />

Within this service offering Cassidian provides the <strong>Service</strong> Consumer with a mix of Professional<br />

<strong><strong>Service</strong>s</strong> and Technical <strong><strong>Service</strong>s</strong>.<br />

394


The Professional <strong><strong>Service</strong>s</strong> capabilities provide the <strong>Service</strong> Consumer with all aspects of support and<br />

configuration required to ensure that their service environment is compliant with all of the relevant <strong>PSN</strong><br />

and CESG security aspects and resultant documentation. This service has been designed to support the<br />

<strong>Service</strong> Consumer from initial environment security scoping thought implementation to on-going<br />

compliance and audit validation. This is delivered by our CLAS Consultants.<br />

The Technical <strong><strong>Service</strong>s</strong> capabilities provide the <strong><strong>Service</strong>s</strong> Consumer with a number of specialist<br />

Professional <strong><strong>Service</strong>s</strong> delivered by our security design and enforcement engineers who will work with<br />

the <strong>Service</strong> Consumer to ensure that the implementation has been security ruggedised in accordance<br />

with <strong>PSN</strong> requirements. Cassidian also provides a number of specifically-designed security-enabling and<br />

enforcing service capabilities:<br />

395<br />

Managed Encryption – This service capability provides the <strong>Service</strong> Consumer with a complete<br />

managed inter-site or campus encryption capability at RESTRICTED and CONFIDENTIAL using the<br />

relevant PEPAS and CAPS approved encryption capabilities.<br />

Secure Remote Access – This service provides the <strong>Service</strong> Consumer with the ability to securely<br />

extrude their LAN environment for off-site, remote and home workers who only have Internet<br />

Access. This service has been specifically extended to address the issues of connection over<br />

portal based internet access (e.g. Hotels, Hot-spots). This <strong>Service</strong> is available at PROTECT and<br />

RESTRICTED.<br />

Another instance of this service has been designed to allow remote <strong>Service</strong> Consumers that have a<br />

PROTECT level network available to reach back to their RESTRICTED level LAN. This service is available at<br />

RESTRICTED.


The full technical detail definition for this service is contained within 0<br />

Anti-Virus and Patching <strong>Service</strong><br />

Within this service offering Cassidian provides the <strong>Service</strong> Consumer with a complete anti-virus,<br />

spyware detection and security patching service.<br />

The AV offering includes all of the required service aspects from the desktop or mobile client to the<br />

distribution service and near real-time signature and threat update service. Cassidian also provides a<br />

number of service extensions for the clients within this capability to extend the functionality to address<br />

centrally based Host Intrusion Detection <strong><strong>Service</strong>s</strong> (HIDS) and an Organisational level Patch status review<br />

to identify where your environment is at risk due based upon current threat vectors and the patching<br />

status of your devices.<br />

The Patching <strong>Service</strong> provides the <strong>Service</strong> Consumer with an on-line patch distribution service for all<br />

<strong>Service</strong> Consumer requirements for Windows and Linux.<br />

The full technical detail definition for this service is contained within 0<br />

Firewall <strong>Service</strong><br />

Within this service offering Cassidian provides the <strong>Service</strong> Consumer with a comprehensive suite of<br />

firewall services. These firewall services are categorised into two capability families:<br />

396


397<br />

Network Level Firewalls – These provide the <strong>Service</strong> Consumer with purpose-built, high<br />

performance platforms delivering WAN connectivity and security, plus the power to protect the<br />

high-speed LAN against internal network and application-level attacks while simultaneously<br />

stopping content-based attacks.<br />

o Shared Management through role based graphical Web UI central management system<br />

which is accessed via the Cassidian Customer Web Portal.<br />

o Policy-based management to allow centralised, end-to-end life-cycle management.<br />

Application Level Firewalls – These provide the <strong>Service</strong> Consumer with a range of both formats<br />

and grades of Application and Protocol Level Firewalls. Cassidian provides support to the<br />

following applications:<br />

o Messaging – Support to both standard e-Mail (SMTP) and organisational messaging<br />

(x.400)<br />

o Web Access – Support to secure managed web access for both HTTP and HTTPS<br />

o File Transfer – Support to secure transfer via FTP<br />

o Fixed Formal – Support to the secure interchange of files or messages with a defined<br />

format<br />

o XML – Support to the interchange of information based upon the .xml format<br />

o Directory – Support to the interchange of directory based information in both DIF and<br />

LDIF<br />

o Chat and Instant Messaging – Support to the secure interchange of Instant Messaging<br />

information (.xmpp)<br />

All Cassidian firewall services and solutions have been architected with accreditability by design to<br />

provide the <strong>Service</strong> Consumer with the lowest risk to adoption.<br />

Intrusion and Spyware Detection <strong>Service</strong><br />

Within this service offering, Cassidian provides the <strong>Service</strong> Consumer with a comprehensive and<br />

resilient Intrusion and Spyware Detection <strong>Service</strong> which has been designed to provide the <strong>Service</strong><br />

Consumer with a modular scalable IDS capability via the Cassidian Computer Network Defence (CCND)<br />

<strong>Service</strong>.


The core of this service is the Cassidian Threat Management Engine (TME). This provides our<br />

analysts with a coherent and comprehensive tuned view of all current security threats and security<br />

related events that are occurring within the managed <strong>Service</strong> Consumers environment.<br />

This TME receives threat and security related events from a broad suite of sources, including:<br />

398<br />

Operating Systems Security and Event Logs<br />

Network Switch and Routing Devices<br />

Firewall Devices<br />

AV packages<br />

NIDS solutions<br />

HIDS solutions<br />

Live Threat Updates<br />

Cassidian provides real-time threat analysis to the <strong>Service</strong> Consumer as a 24x7 service from the<br />

Cassidian <strong>Service</strong> Operations Centre (CSOC). The <strong>Service</strong> consumer can achieve their own view of the<br />

current security picture through either a dedicated correlated view within their own environment or as<br />

an access controlled view via the Customer Web Portal.<br />

Depending upon the <strong>Service</strong> Consumer’s current environment, Cassidian provides a suite of<br />

deployable Intrusion and Spyware detection tools that will either upgrade or supplement the <strong>Service</strong><br />

Consumer’s existing threat detection and monitoring capabilities. These are provided, as per the main<br />

service, as a fully managed capability. These modular extensions include:


399<br />

Network Intrusion Detection <strong>Service</strong> (NIDS) – This will provide the <strong>Service</strong> Consumer with<br />

dedicated detection devices at the critical ingress and egress points within their network.<br />

Host Intrusion Detection <strong><strong>Service</strong>s</strong> (HIDS) – This is an extension to our AV <strong>Service</strong> which will<br />

provide the <strong>Service</strong> Consumer will a centrally managed and monitored policy-based client and<br />

server threat and anomalous detection and reporting engine.<br />

End-point Control – This service extension builds upon the AV and HIDS capability to centrally<br />

control the Client and manage the applications, websites, client-side firewall and data types that<br />

the client can execute or access. The use of this service ensures that the <strong>Service</strong> Consumer<br />

maintains the strongest practicable security stance for their environment.<br />

All of the Cassidian services and capabilities that provide a security enforcing and security policing<br />

function are fully integrated with the CCND <strong>Service</strong> thus ensuring the <strong>Service</strong> Consumer receives a<br />

comprehensive approach to security and compliancy. The full technical details of the Cassidian CCND<br />

can be found at 0<br />

Authentication and Access Control (inc Web and Application Sign-on)<br />

Within this service offering Cassidian provides the <strong>Service</strong> Consumer with a scalable, secure<br />

Authentication and Access Management <strong>Service</strong> for all <strong>Service</strong> Consumer Scenarios including federation,<br />

web-access, 3 rd party service sign-on, and client minimal sign-on.<br />

This service supports a number of different authentication methods for the User, Machine and<br />

software service, these include support to:<br />

Machine and <strong>Service</strong> Authentication – Certificate based Machine Authentication<br />

User Authentication – Classic – Username and Password combination<br />

User Authentication – Two factor – Username and Passcode or Certificate<br />

User Authentication – Smartcard based authentication


400<br />

Access Control Policies – These policies can be defined and enforced at the User, Organisational<br />

Group, security domain and Organisation levels thus allowing the <strong>Service</strong> Consumer the ultimate<br />

flexibility in adoption.<br />

Inter-Organisational Trusts – This ensure that the <strong>Service</strong> Consumers can ensure that all policies<br />

and authentication is defined once and used for all relationships from their authoritative<br />

source.<br />

All Authentication services provide a role-persona management and access control capability for<br />

business and operational access to such entities as:<br />

File Stores<br />

Websites and <strong><strong>Service</strong>s</strong><br />

Centralised Applications<br />

Terminal <strong><strong>Service</strong>s</strong><br />

Portals<br />

External Organisations<br />

This service extends the authentication element to include the following Access Control methods:<br />

Network Access Control – Decision support, based upon a profile analysis of a machine to<br />

determine if it is authorised to access the <strong>Service</strong> Consumers network and which network<br />

segment(s) it is authorised to connect to.<br />

Host Network Access Control - Decision support based upon a capability and compliancy profile<br />

analysis of the machine to determine if it is authorised to access the <strong>Service</strong> Consumers<br />

environment (e.g. – current status of the AV and patch levels of any given client).<br />

Full details as to the technical interoperability and scope of this service and extended capabilities are<br />

provided within 0.


Real-time <strong><strong>Service</strong>s</strong><br />

Within this service offering Cassidian provides the <strong>Service</strong> Consumer with a secure real-time<br />

presence aware, multi-instance security aware Instant Messaging (IM) chat client and server service.<br />

This service is provided with a full recording and auditing function thus allowing the <strong>Service</strong><br />

Consumer and <strong>PSN</strong>-approved Agencies to replay, review and analyse all IM traffic. It is possible to<br />

federate this bandwidth aware client with external collaboration client services via the standards-based<br />

.xmpp gateway extension (e.g. federation with the Cassidian Collaboration Environment) and establish<br />

cross-domain relationships with the Cassidian Chat Firewall <strong>Service</strong>.<br />

Full technical details of this service can be found at 0.<br />

Communications <strong><strong>Service</strong>s</strong> – <strong>Service</strong> Management Approach - Overview<br />

Cassidian shall deliver to the Customer Authority an ITILv3 aligned <strong>Service</strong> Wrap that covers the<br />

complete <strong>Service</strong> Lifecycle.<br />

Cassidian shall provide the <strong>PSN</strong> Customer Authority with a Call-Off Operating Manual relevant to the<br />

provisioned <strong>Service</strong>.<br />

Cassidian Support Solution<br />

Cassidian shall deliver a <strong>Service</strong> Model that will reflect the best use of <strong>Service</strong> Capability across the<br />

Customer Authority environment and relevant Security domain.<br />

401


In support of the Managed <strong>Service</strong> solution offered to the Customer Authority, Cassidian employs a<br />

set of industry standard Processes which interfaces with the Customer Authority and other <strong>PSN</strong>SPs at<br />

agreed touch points.<br />

The Cassidian <strong>Service</strong> framework is aligned and complimentary to the ISO 20000 standard (Cassidian<br />

holds ISO 20000 certification as an organisation) so supports the <strong>PSN</strong> requirement to achieve ISO 20000<br />

certification for the delivered <strong>Service</strong> within eighteen months of the date of signature of each Call-Off<br />

Contract.<br />

<strong>Service</strong> Support Locations<br />

Cassidian shall support <strong>PSN</strong> <strong><strong>Service</strong>s</strong> from the Cassidian <strong>Service</strong> Operations Centre (CSOC) in<br />

Newport and/or the Alternate <strong>Service</strong> Operations Centre (ASOC) in Cheltenham.<br />

Timing and Hours of Cover<br />

Cassidian warrant that Support <strong><strong>Service</strong>s</strong> shall be provided to all relevant sites and made available 24<br />

hours a day, 7 days a week, 365 day a year (24/7/365). Actual support hours shall depend on the<br />

contracted <strong>Service</strong> Category (i.e. Gold, Silver or Bronze).<br />

Contract Start and Duration<br />

Cassidian shall deliver <strong><strong>Service</strong>s</strong> from the agreed Operational <strong>Service</strong> Commencement Date.<br />

Cassidian shall continue to deliver <strong><strong>Service</strong>s</strong> until the end of the Call-Off contract.<br />

402


Operational <strong>Service</strong> Support<br />

Operational <strong>Service</strong> Support for Communication <strong><strong>Service</strong>s</strong> shall be provided through the Cassidian<br />

<strong>Service</strong> Operations Centre (CSOC).<br />

The CSOC shall provide the operational management of Communication <strong><strong>Service</strong>s</strong> 24 hours a day,<br />

seven days a week 365 days per annum, or at the times agreed with the Customer Authority.<br />

The <strong>Service</strong> Desk is staffed by Cassidian <strong>Service</strong> Agents and engineers on a shift rotation basis,<br />

supported by additional back office personnel during normal business hours. CSOC effort is driven by the<br />

resolution processes detailed within the <strong>PSN</strong> <strong>Service</strong> Definitions, ITILv3 <strong>Service</strong> Processes and applicable<br />

work instructions.<br />

<strong>Service</strong> Desk Function (SPOC)<br />

Cassidian will provide a Single Point of Contact (SPOC) <strong>Service</strong> Desk facility as the support focal point<br />

for all Customer Authority resources. The <strong>Service</strong> Desk shall provide accessibility for Authority Users of<br />

Communication <strong><strong>Service</strong>s</strong> to report all faults or requests for service through a single dedicated telephone<br />

number or email address.<br />

Cassidian shall deliver a <strong>Service</strong> Desk function that is designed as a tiered <strong>Service</strong> Desk structure to<br />

deliver a dedicated Incident relevant response. It shall be staffed by Cassidian trained in-house analysts<br />

who will be able to provide subject matter expertise to the User upon first contact so ensuring that a<br />

defined level of <strong>Service</strong> can be supported.<br />

403


The <strong>Service</strong> Desk shall be fully staffed and supervised to support all <strong>PSN</strong> <strong>Service</strong> requirements<br />

24/365 and shall be capable of handling all service requests across the <strong>Service</strong>, regardless of the time of<br />

day. The <strong>Service</strong> Desk shall provide support for a wide range of activities from logging incidents and<br />

providing advice to assisting users on how to gain access to <strong><strong>Service</strong>s</strong> through to acting as a central point<br />

for change.<br />

To aid User interaction with the <strong>Service</strong> Desk function, Cassidian employ a client Web Portal which<br />

shall provide controlled access to authorised stakeholders.<br />

All Incidents and requests for assistance are logged into the <strong>Service</strong> Desk tracking system.<br />

Functionality is provided through this toolset to support:<br />

404<br />

Visibility of all requests and their current status;<br />

Management of the lifecycle of incidents and requests; with escalation activity as relevant;<br />

The closing of Incidents where the user is satisfied with the result;<br />

Keeping users informed of the status of services, incidents and requests;<br />

<strong>Service</strong> Desk interaction via communication means that include telephone, web portal and<br />

email. This shall include the function to create <strong>Service</strong> Desk tickets using the web portal or<br />

email.


The Cassidian support solution ensures that the <strong>Service</strong> Desk shall be able to efficiently perform the<br />

following activities:<br />

405<br />

Incident recording (including Major Incidents and Security Incidents) against the standard<br />

detailed in <strong>PSN</strong> document Incident Management v2.0 at Appendix C;<br />

Incident classification;<br />

Incident prioritisation;<br />

Incident triage;<br />

Incident escalation;<br />

Inform the <strong>PSN</strong> bridge of all Major Incidents within 30 mins (during Agreed <strong>Service</strong> Time);<br />

Immediately inform the <strong>PSN</strong> Security Manager of all Security Incidents with a security severity<br />

level of Major or Emergency (during Agreed <strong>Service</strong> Time);<br />

Participate in Joint Major Incident Team (JMIT) activity;<br />

Search for workaround (via the Cassidian Knowledge Base);<br />

Receive all inquiries on incidents and Changes;<br />

Update the user on Incident progress;<br />

Perform communication activities for the other ITILv3 processes (e.g. release notifications,<br />

change schedules, SLM reports etc.);<br />

Weekly updates of all relevant procedural and emergency contact information;<br />

Report service desk performance to relevant stakeholders.<br />

Contacting the SPOC<br />

Support Team details, including the SPOC contact details will be provided to the Customer Authority<br />

as detail within the Call-Off Operating Manual.<br />

Resolver Group Function<br />

1st Level – The <strong>Service</strong> Desk<br />

The Cassidian <strong>Service</strong> Desk Agent shall register and classify Incidents received from the Customer<br />

Authority User and attempt to restore the failed Communication <strong>Service</strong> as quickly as possible. The<br />

<strong>Service</strong> Desk shall provide the capability to deliver first time fixes so as to reduce user downtime and so<br />

aid improved productivity.


If, post triage, no resolution is achieved, 1st Level support will electronically transfer the Incident to<br />

the relevant Cassidian expert Technical Support Group (2nd Level Support).<br />

1st Level support processes <strong>Service</strong> Requests and also keeps Authority Users informed about<br />

Incident status, at agreed intervals.<br />

2nd Level – User Support<br />

The Cassidian 2nd Level support function is responsible for resolving incidents escalated from the<br />

1st Level <strong>Service</strong> Desk and resolution of Events (i.e. system generated) through the Event Management<br />

process. 2nd Level User Support is responsible for the configuration and management of the<br />

Communication infrastructure.<br />

If, post triage, no resolution is achieved, the relevant Incident will be routed via the Resolver Group<br />

roadmap to the appropriate Cassidian SME or 3rd party vendor for resolution.<br />

3rd Level Support<br />

The Cassidian 3rd Level teams receive incidents that have been escalated from 2nd Level teams.<br />

In order to effectively maintain the detailed knowledge required to manage the various technology<br />

platforms and capabilities relative to Internet <strong><strong>Service</strong>s</strong>, 3rd Level support shall be delivered by dedicated<br />

Subject Matter Experts (SME) teams.<br />

Major Incident Team<br />

When requested, Cassidian shall create a team of technical experts, led by the Cassidian <strong>Service</strong><br />

Delivery Manager, to work within the remit of the Joint Major Incident Team.<br />

406


<strong>Service</strong> On-Boarding and Off-Boarding<br />

Cassidian employs a standard service introduction approach to deliver against proposals covering<br />

green field installations and service transition environments. Cassidian’s Take On <strong>Service</strong> Plan (TOSP) is<br />

used to manage the on-boarding process that transitions <strong>Service</strong> users from their existing <strong>Service</strong> to the<br />

new <strong>Service</strong> (and off again at the <strong>Service</strong> off-boarding point).<br />

Cassidian’s approach ensures that service continuity is maintained during the Transition Phase, and<br />

that the <strong>Service</strong> Consumer community continues using the processes in place immediately prior to on-<br />

boarding to record any faults and change requests; such that the “change” for <strong>Service</strong> Consumers is<br />

minimised.<br />

The remainder of this section describes how Cassidian introduce a new <strong>Service</strong> Consumer from both<br />

the Engineering and Security (EngSy) perspective and the <strong>Service</strong> Introduction Perspective (SvcInt).<br />

<strong>Service</strong> On-Boarding – EngSy<br />

The Cassidian On-Boarding process will take the <strong>Service</strong> to the point of <strong>Service</strong> Transition.<br />

Design <strong>Service</strong><br />

Cassidian will work with the Customer Authority to identify the required configuration,<br />

dispersement and visualisation required for the <strong>PSN</strong> service instance. This scope of this activity will vary<br />

depending on the maturity of the <strong>Service</strong> consumer requirements, and the service options selected, but<br />

where appropriate would cover the definition of service levels, availability levels, site and user<br />

resiliency, segregation, quality of service settings, and security configuration. Consultancy services can<br />

optionally be provided where needed by the customer.<br />

407


The key aspects of this service include:<br />

1. Support to the accreditation process;<br />

2. Programme Management;<br />

3. <strong>Service</strong> Introduction;<br />

4. Baseline configuration of all relevant Configuration Items (CI’s);<br />

5. Defining change type based upon the assets and their associated complexity.<br />

Where infrastructure is to be installed, a site survey would normally be required to work with the<br />

<strong>Service</strong> Consumer to define accurate locations for user connectivity and on site equipment and to<br />

produce a site design for installation. This design would then be agreed and then implemented. Where<br />

RESTRICTED and CONFIDENTIAL equipment is being installed, these would be treated in line with<br />

JSP440, and JSP480 as appropriate.<br />

Installation and Commissioning <strong>Service</strong><br />

Within this phase of service introduction Cassidian will work with the Customer Authority to<br />

implement the <strong>Service</strong> as defined within the design phase. At the culmination of this phase Cassidian will<br />

perform the <strong>Service</strong> Acceptance tests with the Customer Authority as the final aspect of transition to<br />

Operational <strong>Service</strong>. An as-installed document pack detailing the passive and active equipment would be<br />

provided. This pack would include building and site drawings with equipment physical and logical<br />

connectivity, and any necessary configuration details relevant to the service being provided to the<br />

service consumer.<br />

408


<strong>Service</strong> Off-Boarding - EngSy<br />

At the cessation of a service contract, Cassidian will recover all Cassidian owned assets from the<br />

<strong>Service</strong> Consumer sites and provide a final entity map export in MS Visio format. Cassidian will also<br />

provide the Customer Authority via DVD a copy of all current CI’s configuration status.<br />

<strong>Service</strong> On-Boarding – SvcInt<br />

<strong>Service</strong> Introduction<br />

This <strong>Service</strong> Introduction approach ensures that:<br />

1. All ITILv3 processes required to support the <strong>PSN</strong> <strong>Service</strong> are considered;<br />

2. Particular attention is paid to both environment and security domain when defining support<br />

processes that are fit for purpose across the totality of the <strong>Service</strong> Consumer’s operating<br />

envelope;<br />

3. <strong><strong>Service</strong>s</strong> are flowed into the live environment following a structured approach, delivered using a<br />

tailored Project Management background (i.e. Prince2 or PMI).<br />

Governance<br />

A <strong>Service</strong> Introduction Manager will interface directly with the Customer Authority representative to<br />

ensure project risks, issues and escalations are managed in alignment both within <strong>Service</strong> Introduction<br />

and day-to-day business.<br />

Cassidian will agree and allocate the necessary resources across the project to ensure the support of<br />

the programme delivery timelines.<br />

Governance and escalation relating to areas within the control of <strong>Service</strong> Management and <strong>Service</strong><br />

Assurance will be escalated and managed through the agreed <strong>PSN</strong> governance structure.<br />

409


Assurance<br />

The <strong>Service</strong> Introduction assurance approach will be described in the Assurance Plan. The relevant<br />

elements of the Assurance Plan will be produced as Product <strong>Descriptions</strong>. These assurance activities will<br />

be contained within the <strong>Service</strong> Introduction Schedule.<br />

The <strong>Service</strong> Introduction process will provide input into the scoping and definition of testing and<br />

trialling activities through the production of a <strong>Service</strong> Evidence Plan.<br />

Requirements Management<br />

Cassidian will centrally manage all SM Requirements to be delivered during <strong>Service</strong> Introduction. All<br />

requirements will be prioritised, consolidated and baselined according to timescales defined by the<br />

<strong>Service</strong> Introduction Manager.<br />

Products - <strong>Service</strong> Introduction<br />

The creation or amendment of <strong>Service</strong> Management products will be captured by the <strong>Service</strong><br />

Delivery team. Products such as ITIL Processes, Work Instructions, Communications Plan, OLA and UC<br />

will be documented and held in the Cassidian QMS.<br />

Trialling approach<br />

The <strong>Service</strong> Management Project Evidence Plan will outline which components of the <strong>Service</strong><br />

Solution are to be trialled.<br />

Cassidian will provide the necessary resource to support the baselined scenarios and scripts.<br />

410


ITILv3 Processes<br />

All elements of the Communication support solution shall be aligned with the ITILv3 framework and<br />

will complement industry and OGC standards.<br />

Cassidian shall provide the Customer Authority Call-Off Operating Manual to support the ITILv3<br />

modules illustrated.<br />

SM Enterprise (<strong>Service</strong> Strategy)<br />

Cassidian shall design and deliver the processes and procedures to support the following ITILv3<br />

<strong>Service</strong> Strategy elements:<br />

IT Financial Management<br />

Cassidian shall provide input to the relevant Customer Authority processes to support the Customer<br />

Authority in the delivery of:<br />

411<br />

Financial Planning;<br />

Financial Analysis and Reporting.<br />

<strong>Service</strong> Portfolio Management<br />

The <strong>Service</strong> Portfolio presents a complete list of the <strong>PSN</strong> <strong><strong>Service</strong>s</strong> managed by Cassidian.<br />

Production of business cases for new <strong>PSN</strong> <strong><strong>Service</strong>s</strong> to ensure that Cassidian has the right mix of<br />

services to meet required Customer Authority business outcomes.<br />

Demand Management<br />

Cassidian Demand Management activities focus on anticipating <strong>Service</strong> Consumer demand for<br />

<strong><strong>Service</strong>s</strong>. Cassidian align Demand Management with the Capacity Management process to<br />

ensure sufficient capacity is available to meet the required demand.<br />

Continual <strong>Service</strong> Improvement (CSI)<br />

Cassidian uses CSI to align <strong><strong>Service</strong>s</strong> to changing Customer Authority business needs by<br />

identifying and implementing improvements to the <strong>PSN</strong> services that underpin those business<br />

processes.<br />

Cassidian will use a <strong>Service</strong> Improvement Log to manage ongoing CSI proposals and activities.<br />

This log shall be partitioned to show to which <strong>Service</strong> the proposed improvement applies.


412<br />

A Continual <strong>Service</strong> Improvement Plan (CSIP) shall be established for each Cassidian <strong>PSN</strong> <strong>Service</strong><br />

entering the live environment with the aim of reducing costs throughout the <strong>Service</strong> Lifecycle,<br />

whilst improving the end user experience.<br />

Cassidian shall design and deliver the processes and procedures to support the following<br />

Continual <strong>Service</strong> Improvement elements:<br />

o CSI - Step Improvement;<br />

o <strong>Service</strong> Review;<br />

o <strong>Service</strong> Reporting;<br />

o Customer Satisfaction.<br />

o <strong>Service</strong> Records<br />

Cassidian will provide the Customer Authority with either a Performance Monitoring Report or<br />

a Monthly Summary Report as detailed in Schedule 2.1 Section 3.<br />

<strong>Service</strong> Design<br />

Cassidian shall advise the Customer Authority on business and IT Capability design as a function of<br />

Change. Cassidian shall design and deliver the processes and procedures to support the following<br />

<strong>Service</strong> Design elements:<br />

<strong>Service</strong> Level Management<br />

The <strong>Service</strong> Level Management <strong>Service</strong> shall manage the <strong>Service</strong> Level Agreement (SLA) with<br />

the Customer Authority and ensure that <strong>PSN</strong> <strong><strong>Service</strong>s</strong> are designed to meet the agreed <strong>Service</strong><br />

level targets.<br />

The <strong>Service</strong> Level Management function shall:<br />

o Define, document, agree, monitor, measure, report and review the level of <strong>PSN</strong> service<br />

provided to the Customer Authority;<br />

o Ensure that the Customer Authority has a clear and unambiguous definition and<br />

expectation of the level of service to be delivered;<br />

o Identify those interfaces which constitute links in the <strong>Service</strong> delivery chain;<br />

o Manage the output of any internal or external <strong>Service</strong> Provider tasked with the delivery<br />

of an element supporting the <strong>Service</strong>. This shall include, in the form of an OLA or UC, the<br />

<strong><strong>Service</strong>s</strong> and <strong>Service</strong> levels required from that <strong>Service</strong> Provider and, where applicable,<br />

how those <strong><strong>Service</strong>s</strong> shall be called off by the Cassidian <strong>Service</strong> function;<br />

o Provide and improve the relationship and communication between Cassidian <strong>Service</strong><br />

function and the <strong>PSN</strong> customer;<br />

o Ensure that proactive Continual <strong>Service</strong> Improvement measures are delivered and<br />

implemented where Benefit can be realised;<br />

o Monitor and improve <strong>PSN</strong> Customer satisfaction through the quality of service<br />

delivered.<br />

2. Capacity Management<br />

Cassidian shall implement a Capacity Management plan aligned to a set of processes that shall<br />

ensure that the infrastructure can support existing and future capacity requirements. This


413<br />

process, and its associated activities, shall enable the Cassidian <strong>Service</strong> function to actively<br />

forecast, monitor and report capacity utilisation on the <strong>PSN</strong> <strong>Service</strong> infrastructure.<br />

The key processes and activity that Cassidian use to deliver the Capacity Management <strong>Service</strong><br />

are:<br />

o Capacity Monitoring<br />

o Capacity Optimisation<br />

o Capacity Reporting<br />

o Capacity Problem Management<br />

o Capacity Planning<br />

Availability Management<br />

Availability Management (AM) is managed in co-ordination with the Capacity Management process.<br />

In accordance with ITILv3 Good Practice guidance, Cassidian AM plans shall be produced to<br />

support all <strong>PSN</strong> <strong>Service</strong> AM activities.<br />

Cassidian shall design and develop the AM <strong>Service</strong> function to influence the design of the<br />

<strong>Service</strong>, and supporting processes, to consistently provide the contracted levels of <strong>Service</strong><br />

Availability to the Customer Authority.<br />

Cassidian shall design and develop the AM <strong>Service</strong> function to:<br />

o Influence the design of the <strong>Service</strong>, and its supporting processes, to consistently provide<br />

the contracted levels of <strong>Service</strong> Availability to the Customer Authority,<br />

o Establish the appropriate monitoring capability to:<br />

� Quickly drive awareness of issues affecting Availability or Performance of<br />

<strong>Service</strong>;<br />

� Obtain the relevant Availability information for Reporting, Audit and trending;<br />

� Counter Availability issues in both a reactive and proactive manner;<br />

� Provide input to the <strong>Service</strong> Reporting <strong>Service</strong>;<br />

� Provide input to the <strong>Service</strong> Continuity <strong>Service</strong>.<br />

o Deliver a reactive process that manages Availability issues as part of <strong>Service</strong> Continuity,<br />

o Escalate Incidents that impact <strong>Service</strong> Availability to the Cassidian <strong>Service</strong> management<br />

team best placed to deal with the issue,<br />

o Identify vulnerable <strong>Service</strong> components and introduce effective countermeasures<br />

through the Change Management process.<br />

IT <strong>Service</strong> Continuity Management<br />

Cassidian shall deliver processes that detail Cassidian <strong>Service</strong> management and coordination of<br />

IT <strong>Service</strong> Continuity Management (ITSCM) activity including Business Continuity (BC) and<br />

Disaster Recovery (DR) solutions.<br />

Cassidian shall develop and maintain a set of IT <strong>Service</strong> Continuity Plans and IT recovery plans<br />

that support the overall Business Continuity Plans (BCP) of the Customer Authority, these will<br />

include:<br />

o IT <strong>Service</strong> Continuity and Recovery Plans;


414<br />

o Risk Analysis and Management processes;<br />

o An assessment process to determine the impact of Change on the IT <strong>Service</strong> Continuity<br />

Plans and IT recovery plans;<br />

o Escalation procedures;<br />

o Any necessary evidence-preservation activities (for security related incidents).<br />

Information Security Management<br />

The Cassidian Information Security Management (ISM) / Information Assurance process shall<br />

ensure that IT Security is aligned with Business security and that Information Security is<br />

effectively managed in all Cassidian <strong>Service</strong> areas.<br />

The Cassidian design for an Information Security Management process supports an ISO 27001<br />

compliant Information Security Management model.<br />

Cassidian Information Security Management (ISM) / Information Assurance process will be<br />

delivered through the following activities:<br />

o Production, review and revision of an overall Information Security Policy and a set of<br />

supporting specific policies;<br />

o Communication, implementation and enforcement of the security policies;<br />

o Assessment and classification of all information assets and documentation;<br />

o Implementation, review, revision and improvement of a set of security controls and risk<br />

assessment and responses;<br />

o Monitoring and management of all security breaches and security Incidents;<br />

o Analysis, reporting and reduction of the volumes and impact of security breaches and<br />

Incidents;<br />

o Schedule and completion of security reviews, audits and IT health checks.<br />

Supplier Management<br />

The Supplier Management process shall manage all suppliers, and the services they provide, in<br />

order that a seamless quality of <strong>Service</strong> is delivered to Customer Authority. The Supplier<br />

Management <strong>Service</strong> ensures that all contracts with suppliers support the needs of the Call-Off<br />

contract and that all <strong>Service</strong> suppliers meet their contractual commitments.<br />

To ensure that the element of <strong>Service</strong> provided by the Supplier(s) continues to meet <strong>PSN</strong><br />

<strong>Service</strong> requirements, an internal system of monitoring, reporting and regular review of<br />

Supplier performance against targets will be followed. These reports shall be made available to<br />

the Customer Authority for audit and review<br />

Any identified improvements shall be delivered through the production and management of a<br />

Supplier Improvement Plan.<br />

<strong>Service</strong> Transition<br />

Cassidian shall provide the processes and Call-Off Operating Manual sections to support the<br />

following <strong>Service</strong> Transition elements:<br />

Change Management<br />

The Cassidian Change Management process ensures that Cassidian uses a standard format for<br />

efficient and prompt handling of corrective, adaptive and perfective Change. This strategy shall


415<br />

minimise the impact of Change related Incidents upon <strong>Service</strong> quality and consequently<br />

improve the day-to-day operations of the Customer Authority.<br />

Cassidian employ a standard ITILv3 Change process, which is aligned with Call-Off Schedule 6.2,<br />

and accredited to ISO 20000 standard.<br />

The main components of the Change Management <strong>Service</strong> lifecycle are:<br />

o Raising and recording Changes;<br />

o Categorising the Changes;<br />

o Contract Change<br />

o Fast-Track Change<br />

o Operational Change<br />

o Assessing the impact, cost, benefit and risk of proposed Changes as detailed in Call-Off<br />

Schedule 6.2 Section 5;<br />

o Approving or rejecting Changes (applying Customer Authority business, financial,<br />

operational and strategic perspectives);<br />

o Building, testing and, where appropriate, trialling Changes;<br />

o Scheduling and implementing Changes;<br />

o Reviewing and closing Changes;<br />

o Trend analysis and Performance Monitoring reporting.<br />

Knowledge Management<br />

Cassidian employs the ITIL Knowledge Management process to capture, maintain and make<br />

available operational information to the Cassidian <strong>Service</strong> teams, so promoting the effective<br />

delivery of <strong>Service</strong>. This improves <strong>Service</strong> efficiency, by reducing the need to rediscover<br />

Knowledge, and drives informed decision making.<br />

The Cassidian Operations Management function shall share this knowledge base information<br />

with the Customer Authority and other <strong>PSN</strong>SPs, at a level that aligns with their support role.<br />

Knowledge sharing will be carried out using all available communication channels. However,<br />

access to Knowledge detail shall be regulated to prevent unauthorised or insufficiently trained<br />

personnel using that information.<br />

<strong>Service</strong> Asset and Configuration Management<br />

Cassidian’s <strong>Service</strong> Asset and Configuration Management (SACM) process provides a logical<br />

model of the IT infrastructure deployed for the <strong>PSN</strong> <strong>Service</strong>. It does this by identifying,<br />

controlling, maintaining and verifying the versions of all Assets and Configurable Items (CI) used<br />

to supply the <strong>PSN</strong> service.<br />

SACM allows for precise control of all IT Assets required to deliver the <strong>PSN</strong> service, as it is the<br />

management of these Assets which underpins the delivery and support of the service.<br />

Cassidian’s SACM process will:<br />

o Provide a focal point for the control of <strong>Service</strong> Assets and CIs in support of activities<br />

planned to deliver the <strong>PSN</strong> <strong>Service</strong>;<br />

o Ensure that Infrastructure and <strong>Service</strong> components, supplied in support of the <strong>PSN</strong><br />

<strong>Service</strong>, are controlled at all times;<br />

o Use ITILv3 Good Practice guidance to account for all Assets and CIs throughout the life<br />

of the <strong>Service</strong>;<br />

o Make visible the status of CIs, their versions, location, related changes and problems<br />

and associated documentation to Customer Authority Stakeholders as they require it;


416<br />

o Support traceability and audit control, through the use of discovery tools where<br />

necessary;<br />

o Manage interfaces to internal and external service providers where there are <strong>Service</strong><br />

Assets and CIs that need to be controlled;<br />

o Support license management activity.<br />

Transition Planning and Support<br />

The Transition Planning and Support <strong>Service</strong> support the controlled deployment of a new or<br />

modified <strong>PSN</strong> <strong>Service</strong> into Live <strong>Service</strong>; together with the necessary <strong>Service</strong> Management<br />

process modification.<br />

The Planning and Support <strong>Service</strong>, as presented through the Cassidian <strong>Service</strong> Introduction<br />

process, is responsible for the definition of the <strong>Service</strong> transition strategy, preparation for<br />

<strong>Service</strong> transition, development of the <strong>Service</strong> transition plan and support for Stakeholders.<br />

Cassidian employ a <strong>Service</strong> Introduction approach to deliver Transition Planning and Support<br />

<strong>Service</strong> activity. This <strong>Service</strong> Introduction approach ensures that:<br />

o All ITILv3 processes required to support transition of the <strong>Service</strong> are considered;<br />

o Particular attention is paid to both environment and security domain when defining<br />

support processes that are fit for purpose across the totality of the operating envelope;<br />

o <strong><strong>Service</strong>s</strong> are flowed into the live environment following a structured approach; using a<br />

tailored PRINCE2 or PMI background.<br />

Release and Deployment Management<br />

Cassidian manage Release and Deployment as an output activity from Change Management.<br />

The Cassidian <strong>Service</strong> Delivery Manager shall engage with the Customer Authority stakeholders<br />

to ensure that the Release Packages meet their specified requirements (including awareness<br />

and communication material) for integration testing and that the same Release Packages are<br />

released to the live <strong>PSN</strong> environment, in accordance with all relevant Standards and Policies.<br />

Detailed plans regarding the resource requirements, timings, communications and regression<br />

planning etc. will be held within the Change Management system and updated, inline with<br />

deployment progress. This approach ensures that any Release has been fully impacted across<br />

the Customer Authority business with respect to Operational effectiveness.<br />

<strong>Service</strong> Validation and Testing<br />

Validation and verification is performed by Cassidian’s Test function to assure the quality and<br />

correctness of the deliverable against the requirements of the customer, enabling the Customer<br />

Authority to issue the relevant test certificate and/or milestone achievement certificate. The testing is


performed in line with the Cassidian Business Management System (BMS. These processes conform to<br />

IEEE829 standards for test documentation and are fine-tuned to fit the needs of the customer.<br />

Cassidian shall make the associated Test Reports and Test Issue Management Logs available to the<br />

customer to enable the certificates to be issued. Cassidian will provide the Customer Authority with at<br />

least ten days written notice of a successfully tested deliverable becoming available to meet the<br />

delivery date defined in the Implementation Plan. All Cassidian test professionals are International<br />

Software Testing Qualifications Board (ISTQB) qualified and experienced in large scale integration<br />

testing.<br />

Evaluation<br />

Evaluation Management assures that the <strong><strong>Service</strong>s</strong> offered by Cassidian match the goals and<br />

requirements of the Customer Authority. It maintains the quality of the products and services in the live<br />

<strong>Service</strong> environment and assesses the impact of <strong>Service</strong> Change on the Customer Authority.<br />

Cassidian Evaluation activity considers:<br />

417<br />

the relevance of the Cassidian service design;<br />

Transition of the <strong>Service</strong> to the operating environment;<br />

the operational and business environments that the Change will have an impact on.<br />

<strong>Service</strong> Operation<br />

The primary aim of the <strong>Service</strong> Operation capability, as delivered through the Cassidian Operations<br />

function, is to support Incident, Event, <strong>Service</strong> Request and Problem Management in order to provide<br />

End-to-End management of <strong>Service</strong> Configuration Items (CI).<br />

Cassidian shall design and deliver the processes and procedures to support the following


<strong>Service</strong> Operation elements:<br />

Incident Management<br />

418<br />

The Cassidian approach to Incident Management, inline with ITILv3 Good practice, is to restore<br />

normal service operation as quickly as possible so as to minimise the adverse impact on<br />

business operations. Cassidian’s <strong>Service</strong> Management Group is an ISO 20000 accredited<br />

organisation.<br />

The Incident Management <strong>Service</strong> shall:<br />

o Record all incidents;<br />

o Co-ordinate efforts to resolve incidents in a controlled manner, to agreed <strong>Service</strong> Levels;<br />

o Escalate Incidents when applicable;<br />

o Provide updates and communications through a variety of methods;<br />

o Detail workarounds and fixes that can be applied by first line support;<br />

o Deliver Key Performance reports to agreed timescales.<br />

<strong>PSN</strong> <strong><strong>Service</strong>s</strong> will be assigned an agreed <strong>Service</strong> Category based on:<br />

o their value to the Customer Authority business; and<br />

o the impact of the unavailability of that <strong>Service</strong> on the Customer Authority.<br />

Cassidian offer 3 levels of service (i.e. Gold, Silver and Bronze <strong>Service</strong> Levels) that map to the<br />

criticality of delivery and support of the <strong>Service</strong> to the Customer Authority.<br />

Cassidian will manage Major Incidents and Security Incidents inline with the direction offered in<br />

<strong>PSN</strong> Incident Management v2.0.<br />

Event Management<br />

The Event Management process gives the Cassidian Operations function the ability to detect<br />

events, make sense of them and determine the appropriate control action. This process also<br />

forms the basis for Operational Monitoring and Control across the live <strong>Service</strong> environment.<br />

The Event Management <strong>Service</strong> shall:<br />

o Detect Event notifications produced within the <strong>Service</strong> infrastructure;<br />

o Filter the Events according to pre-defined criteria;<br />

o Trigger the correct process or RG to act against the information produced by the Event;<br />

o Review actions to ensure that the most efficient and effective response was given.<br />

The key processes and activities that are used to deliver the Event Management <strong>Service</strong> are:<br />

o Event Notification<br />

o Event Detection<br />

o Event Filtering<br />

o Event Correlation<br />

o Response Trigger<br />

o Action Review<br />

o Event Closure<br />

Request Fulfilment<br />

The procedure for raising a <strong>Service</strong> Request shall be set out in Cassidian’s Call-Off Operating<br />

Manual. The CSOC shall provide the SPOC for initiating a <strong>Service</strong> Request.<br />

Request Fulfilment is the process of dealing with <strong>Service</strong> Requests from the Customer<br />

Authority.


419<br />

The Request Fulfilment <strong>Service</strong> shall:<br />

o Provide a channel for Authority Users to request and receive standard services for which<br />

a pre-defined approval (i.e. via the <strong>PSN</strong> <strong>Service</strong> Board) and qualification process exists<br />

(i.e. has been Impact assessed);<br />

o Provide information to Authority Users about the availability of <strong><strong>Service</strong>s</strong> and the<br />

procedure for obtaining them;<br />

o Assist with general information, complaints or comments.<br />

The Request Fulfilment <strong>Service</strong> shall deliver a reactive process that:<br />

o Accepts and logs <strong>Service</strong> Requests from users;<br />

o Ensures that the correct approvals are obtained, if necessary;<br />

o Engages the correct resources to fulfil the request;<br />

o Reports on activity to ensure that SLA targets are met.<br />

Problem Management<br />

The Cassidian <strong>Service</strong> function Problem Management team shall minimise the adverse impact<br />

of Incidents and problems on the <strong>PSN</strong> business and day-to-day user activity through the<br />

prevention of the recurrence of Incidents related to known errors in the <strong><strong>Service</strong>s</strong> being<br />

provided.<br />

The Problem Management <strong>Service</strong> shall:<br />

o Log, investigate and diagnose problems with the <strong>PSN</strong> <strong>Service</strong>;<br />

o Co-ordinate efforts to resolve problems in a controlled manner to agreed <strong>Service</strong> Levels;<br />

o Attend the Problem Management forum (as facilitated by the <strong>PSN</strong> <strong>Service</strong> Bridge);<br />

o Carry out trend analysis to identify potential problems before they impact the <strong>PSN</strong><br />

<strong>Service</strong>.<br />

Access Management<br />

Cassidian provides capability that ensures only authorised Users are granted access to <strong><strong>Service</strong>s</strong>,<br />

applications and facilities while restricting access to non-authorised Users.<br />

Additional Support Functions<br />

Field <strong><strong>Service</strong>s</strong> (remote support)<br />

Cassidian will provide a distributed support capability for in scope <strong><strong>Service</strong>s</strong> at remote locations.<br />

This function will be delivered by a 2nd Level Field <strong>Service</strong> Engineering (FSE) role group which is<br />

located at the Cassidian main site. They shall act as the mobile FSE function in response to<br />

support requirements at remote locations.<br />

FSE staff would be used to investigate and resolve service Incidents at a local level where those<br />

Incidents could not be resolved remotely by the Cassidian <strong>Service</strong> function support functions<br />

using the Cassidian toolsuite.<br />

4th Level Support<br />

Cassidian 4th Level support is provided by vendors assisting the Cassidian <strong>Service</strong> function with<br />

the resolution of incidents and known errors.


Communications <strong><strong>Service</strong>s</strong> – Security and Resilience Approach – Overview<br />

This section describes Cassidian’s professional approach to securing and maintaining the<br />

confidentiality, integrity and availability of our <strong><strong>Service</strong>s</strong> within each security domain defined within the<br />

<strong>PSN</strong> scope. The remainder of this section identifies Cassidian overarching approach to security with any<br />

specific aspects of design for any given service being identified within their respective service definition.<br />

Securing the <strong>Service</strong> Business, Platform and Infrastructure<br />

Accreditation of <strong><strong>Service</strong>s</strong><br />

All services will be certified or accredited in line with the requirements of the <strong>PSN</strong> RMARDS, the<br />

Security Policy Framework and applicable HMG policies.<br />

The strategy to achieve and maintain certification of PROTECT and accreditation of RESTRICTED and<br />

CONFIDENTIAL services shall be described in an appropriate Security Plan for the contracted level of<br />

service provided in compliance with Schedule 2.2 of the Call-Off Terms.<br />

Site Security<br />

Cassidian shall ensure that physical access controls prevent access by unauthorised individuals using<br />

a series of layered measures. The Cassidian campuses at Newport and Cheltenham that shall host the<br />

services are accredited as 'LIST X' facilities in accordance with the UK HMG Security Policy Framework<br />

(SPF), encompassing physical, personnel, technical and physical or electronic information handling<br />

measures.<br />

Cassidian’s ‘LIST X’ approval and accreditation status allows it to handle UK HMG Protectively<br />

Marked information up to SECRET. Confirmation of this status can be obtained from: DE&S SAC, Defence<br />

420


Equipment and Support, ISS, Poplar - 1 #2005, MOD Abbey Wood, Bristol, BS34 8JH, UK, Tel: +44<br />

(0)11791 34378.<br />

Staff Clearances<br />

Cassidian shall meet the necessary security requirements by obtaining suitable staff clearances<br />

through vetting, prior to granting physical or logical access to information or critical components in<br />

relation to the provision of the service. Logical and physical access shall also be controlled on a ‘Need-<br />

To-Know’ basis, limiting access to only those roles required and therefore to the minimum necessary to<br />

securely provision the service. Cassidian UK personnel and Contractors are Security Cleared by the DBS-<br />

NV (Defence Business <strong><strong>Service</strong>s</strong> National Vetting. The requirement for personnel to hold a higher level of<br />

clearance (above SC) is project specific.<br />

The Cassidian service offerings have been identified and resourced to support the requirement that<br />

the bulk of service operational personnel hold an ‘SC clearance’ by DBS as a minimum with some<br />

identified administrator/oversight roles, e.g. log analysis or deletion, requiring a higher clearance based<br />

upon the business risk assessment and agreement with the <strong>PSN</strong> Accreditation Panel. The process<br />

workflows shall be assessed to identify where segregation of duties is appropriate or necessary as a<br />

result of the business risk assessment.<br />

Platform Security<br />

Secure Configuration<br />

The service offering shall be hosted on a suite of secured Windows Server 2008 (W2K8) servers,<br />

Linux Redhat Enterprise Servers and Solaris platforms using dedicated hardened appliances. The W2K8<br />

Servers are securely configured in accordance with the Microsoft Specialised Security - Limited<br />

Functionality (SSLF) guidance and all Management Workstations are securely configured using the CESG<br />

421


GAP process flowed out as a Group Policy via the Domain Controller (DC). Linux and Solaris Servers will<br />

also be suitable locked down.<br />

Logical Access and Privilege Management<br />

Each host OS is configured to operate the necessary application instances with limited privileges.<br />

Controlled access to the host and the applications management console shall be in accordance with the<br />

recommendations of UK HMG Information Assurance (IA) Standard No 7 and IAIG3. Access and<br />

privileges will be implemented on an auditable business need and role basis and will be reviewed in line<br />

with policy or on change of role or termination of employment.<br />

User access to dedicated appliances or components such as switches, firewalls and routers shall also<br />

be secured and controlled in line with defined roles. The Operating System (OS) and applications are<br />

configured to operate within the scope of a single Active Directory (AD) DC.<br />

Access to the Linux and Solaris servers will be controlled by role based permissions.<br />

Availability<br />

The servers associated with the service offering exist within a secure physical and virtualised<br />

environment hosted across several physical server platforms and managed by a local hypervisor within a<br />

Cassidian <strong>Service</strong> Operations Centre (CSOC) at each site in order to meet the necessary availability.<br />

422


Resilience<br />

These service offerings have inherent resilience as stated in the applicable functionality description<br />

sections of each service offering; in summary each service offering shall achieve the required level of<br />

resilience by utilising the following strategies or a combination:<br />

423<br />

<strong>Service</strong> is distributed across multiple sites<br />

<strong>Service</strong> operates on a HA hypervisor environment<br />

<strong>Service</strong> is included in a scheduled back-up regime<br />

Logging <strong>Service</strong><br />

The solution logs all key transactions to a centralised logging service within the CSOC at each site.<br />

The logging service has the capacity to index and store a minimum 3 months of transactions with a<br />

further archive of 3 months as an off-site back-up service. The logging service shall utilise a time<br />

stamping service that is provided by a time server at each CSOC and synchronised across all the<br />

Cassidian service offerings.<br />

Patching <strong>Service</strong><br />

Within the scope of the secured AD security domain there is an OS and Application patch<br />

distribution service within the CSOC at each site.<br />

Linux and Solaris patching will be performed in compliance with the requirements of the security<br />

plan and defined SyOPs.<br />

Infrastructure Defence<br />

At the point of connection to the <strong>Government</strong> Conveyance Network (GCN) service at each site the<br />

service provisioning environment is protected with a twin, EAL4+ firewall instance implementation with


application and network level protection modules to ensure that any DoS/DDoS detected attacks can be<br />

filtered and mitigated without placing undue burden upon the delivering infrastructure. The firewalls<br />

can be strictly configured to limit the potential attack surface exposed by the service provisioning<br />

environment to the <strong>PSN</strong> WAN.<br />

Protective Monitoring<br />

Each site has a dedicated NIDS and HIDS solution which is centrally monitored within the CSOC at<br />

each site to detect any anomalous activity which, upon detection, is responded to in a timely fashion.<br />

This capability takes feeds from the logging service, all networked components, the virtualised hosting<br />

environment and all servers and workstations.<br />

Malware<br />

Each hosted server or management workstation has a full end-point protection implementation<br />

including AV, executable/driver white listing, external device control and a malware client. This service is<br />

managed from a management, configuration and update server located within the CSOC at each site.<br />

Integrity of the infrastructure and process used to deliver the service<br />

All changes to the service provisioning environment that deliver the service follow the ITILv3 Change<br />

Management process (Cassidian are ISO20000 accredited as a <strong>Service</strong> Management Group) described<br />

within the <strong>Service</strong> Delivery section of this lot. The configuration of the infrastructure is monitored<br />

remotely against the Configuration Management Data Base (CMDB). Any detected infrastructure<br />

changes are flagged to the CSOC administrators. Any unauthorised changes are flagged to the Cassidian<br />

service desk for escalation. Changes performed by service administrators are automatically detailed in<br />

an audit log showing as a minimum, the user identity that made the change, what the change was, and<br />

when the change was made. The automatic monitoring is supplemented by regular manual compliance<br />

audits and IT Health Checks of the technical security measures in order to maintain the accreditation<br />

424


status. The manual compliance audits also verify the integrity of the <strong>Service</strong> Delivery processes utilised<br />

as an integral part of the continued ISO20000 accreditation.<br />

Communications <strong><strong>Service</strong>s</strong> – Detailed <strong>Service</strong> Definition<br />

Voice <strong><strong>Service</strong>s</strong><br />

Technical <strong>Service</strong> Offering<br />

The Cassidian Voice <strong>Service</strong> provides a comprehensive suite of secure and scalable service<br />

capabilities to the <strong>Service</strong> Consumer.<br />

Cassidian provides the following <strong>PSN</strong> compliant service capabilities:<br />

425<br />

Next Generation Telephony Networks<br />

o SIP and Networking<br />

o <strong>PSN</strong> Standards Compliance<br />

Transport Layer Security (TLS)<br />

Voice <strong><strong>Service</strong>s</strong><br />

o Make and receive inbound and outbound calls<br />

o Voicemail <strong><strong>Service</strong>s</strong><br />

o Conference <strong><strong>Service</strong>s</strong><br />

o Call Routing <strong><strong>Service</strong>s</strong><br />

o Logging and Billing<br />

o Mobility<br />

Telephony Features<br />

o Standard Features<br />

o Enhanced Features<br />

o Group Working Features<br />

Handsets and Peripherals<br />

o Physical Phones<br />

o Soft Phones


Deployment Model<br />

The service supports a number of deployment scenarios. These deployment scenarios are in line<br />

with the needs and size of the <strong>Service</strong> Consumer. These include:<br />

426<br />

Full Central Managed <strong>Service</strong> delivery<br />

Local Instance – deployment of a local instance of the service(s) with a centralised management<br />

function<br />

Design and delivery of a fully distributed service deployment to support a multi-site instance<br />

with centralised and shared service management model.<br />

All service capabilities can be delivered as a high availability capability in support of the required<br />

service availability.<br />

Next Generation Networks Telephony<br />

Cassidian are engaged with the <strong>PSN</strong> Tier 1 suppliers of MPLS and SIP trunk gateways to provide<br />

solutions that make use of next-generation transport layers and <strong>PSN</strong> services. As part of this <strong>Service</strong><br />

Capability Cassidian comply with the requirements documented in the <strong>PSN</strong> Technical Domain<br />

Description v 2.0 for Telephony <strong>Service</strong> Provider Obligations and the Cryptographic Framework v 0.1.<br />

Cassidian shall make use of IP and SIP technology within the <strong>PSN</strong> environment to deliver services to<br />

the <strong>Service</strong> Consumers, using the inherent Transport Layer Security (TLS) within the network to provide<br />

secure connectivity. Cassidian also deploys Session Border Controllers (SBC) to provide demarcation<br />

between the internal systems and external SIP networks to provide access control and protocol repair.


For additional security the Cassidian solution provides Secure Real Time Protocol (SRTP) within the<br />

phone system and voice encryption products if required by the security domain. Additional details for<br />

these are provided with the voice security section.<br />

Security is inherent throughout the service using devices which contain security certificates suitable<br />

for use within a TLS. Cassidian shall as part of its service delivery, validate the system to CESG Assured<br />

<strong><strong>Service</strong>s</strong> (Telecom).<br />

Within each <strong>PSN</strong> security domain the service is provided using standard telephony equipment using<br />

the TLS to provide separation.<br />

Telephony <strong>Service</strong> Core Features<br />

For off network secure communication the system supports:<br />

427<br />

SRTP to increase security for use within a RESTRICTED security domain<br />

SCIP phones for use in the CONFIDENTIAL domain.<br />

However where a site has a significant number of Authority Users within the CONFIDENTIAL domain,<br />

Cassidian can deploy their Ectocryp Black product, which encrypts all secure telephony streams as they<br />

leave the protected environment rather than deploying SCIP phones for each Authority User. This<br />

provides cost savings by utilising standard telephones and reduced key management.


The service provided makes use of:<br />

428<br />

Quality of <strong>Service</strong><br />

Class of <strong>Service</strong><br />

Power over Ethernet (PoE)<br />

VLANs for segregation of voice traffic over an IP network.<br />

Multiple access points within the <strong>PSN</strong> and/or local access points at the <strong>Service</strong> Consumers sites<br />

to provide additional resilience.<br />

Traditional telephony gateways and interfaces as needed to provide smooth migration paths<br />

from legacy systems and make use of existing capabilities as required.<br />

The service provides these additional service capabilities:<br />

Direct Dial In (DDI) and Direct Dial Out (DDO)<br />

Dial Plans<br />

o Number Porting <strong>Service</strong>: Cassidian offers a number porting service to transfer numbers<br />

from legacy systems into the new environments to enable this activity to take place<br />

without service interruption<br />

o Local STD presentation for inbound and outbound calls where required irrespective of<br />

network ingress and egress points<br />

Automated rerouting for calls to alternate network access points in the case of congestion of<br />

failures.<br />

Non Geographic Numbers and Intelligent Network Capability shall be provided if required.<br />

Voice <strong><strong>Service</strong>s</strong><br />

The <strong><strong>Service</strong>s</strong> includes the following function and features as standard:<br />

Application Enablement <strong><strong>Service</strong>s</strong>


429<br />

Conference Bridge<br />

o Ready Access (Ad Hoc)<br />

o Event Call (Planned) – scheduled and managed through the customer portal or<br />

dedicated <strong>Service</strong> Consumers interface<br />

Mobility<br />

o Feature Name Extensions<br />

o Mobile Integration<br />

o Hot Desking / Remote Hot Desking with user authentication<br />

o Presence<br />

Call Logging/Billing<br />

o Call Data Record Capture<br />

o Report Generation<br />

o Account Code Dialling<br />

o Advice of Charge for live calls<br />

o Billing Reports<br />

� Itemised billing<br />

� Department billing<br />

� Highlight areas of high spend<br />

Call Routing <strong><strong>Service</strong>s</strong><br />

o Centralised Routing for ease of maintenance<br />

o Resilient Local routing capability<br />

o Including Barring and Allowing access of numbers and users<br />

Installation and Maintenance<br />

o Patches and updates to the system are be performed from centralised services such as<br />

TFTP and DHCP<br />

Voicemail<br />

o Interface to email facility (universal inbox)<br />

o External Access<br />

o Individual Mailbox<br />

o Internal Access<br />

o PIN security<br />

o Through dialling<br />

Automated menu based call routing to assist with call management (Auto Attendant)<br />

Audio <strong><strong>Service</strong>s</strong><br />

o Music on Hold<br />

o Voice Recording and Archiving<br />

o Recorded Announcements<br />

This service also has a number of enhanced features that can be included as options for the <strong>Service</strong><br />

Consumers:


430<br />

Operator <strong><strong>Service</strong>s</strong><br />

o Directory Enquiries <strong>Service</strong> (118)<br />

o Centralised Telephony Operator <strong>Service</strong><br />

Integration with Collaboration <strong><strong>Service</strong>s</strong> via a SIP Gateway<br />

Integration with the Clients messaging in-box to provide a Universal In-box capability<br />

Integration with the Organisation Directory <strong>Service</strong><br />

Legacy System interoperation using both SIP (IP) and TDM interfaces, such as EuroISDN, QSIG<br />

and DPNSS supporting Migration and Parallel working.<br />

Telephony <strong>Service</strong> – Client Features<br />

The service provides a wide range of user features through the use of industry leading products. A<br />

selection of these that are commonly used have been included below for reference.<br />

Standard Features – As standard the Telephony <strong>Service</strong> provides the following:<br />

Abbreviated Dialling / Speed Dialling (Stored Numbers)<br />

Alerts (Audio, Visual including use of display, lights)<br />

Automatic Callback (Recall)<br />

Call Hold, Unhold, Hold Recall<br />

Call Forward<br />

Call Park, Answer Back<br />

Call Waiting<br />

Tones (Busy, Dial Tone, Engaged, Unavailable)<br />

Display (CLID, Name, History)<br />

Diversion (Busy, Immediate, No reply)<br />

Do not Disturb<br />

Last Number Dialled / Last Number Redial<br />

Transfer<br />

Loudspeaker Paging<br />

Flexible Language Displays<br />

Multiple Call Handling, Multiple Lines, Multiple Call Appearances<br />

Ringer Control<br />

Speakers<br />

Personalised Ringing<br />

On-Hook Dialling


Enhanced Client Features – Additional enhanced client features are available as options for the<br />

service Consumers Organisation:<br />

431<br />

Call Coverage 6 levels (Redirection <strong>Service</strong>)<br />

Caller ID (Name and number)<br />

Call Log (Missed/Answered/Outgoing calls, Call/Delete/Details)<br />

Directory, LDAP Integration<br />

Contacts (Add/Edit/Delete/Details)<br />

Malicious Call Trace<br />

Push Audio or text to Phones<br />

Local Survivability with Third Party Gateways<br />

Enhanced Group Working Features – The telephony service can be further expanded to include the<br />

following Group-working functionality:<br />

Call Pickup (Standard, Directed, Extended)<br />

Hunt Groups<br />

Executive / Assistant Features<br />

Conferencing<br />

Busy Line Indicator<br />

MLPP TDM Trunking<br />

Team Button<br />

Night <strong>Service</strong><br />

Group Mailbox<br />

It should be noted that this is not a fully comprehensive list of features, and that customer specific<br />

features can be developed by Cassidian if required. This is enabled by the nature of the voice<br />

architecture used. Please contact Cassidian to discuss the specific requirements.


Handsets and Peripheral Devices<br />

The service provides a wide range of devices and interfaces for existing customer peripherals such as<br />

existing SIP end points and SCIP / BRENT phones. All these devices should be used in accordance with<br />

<strong>Service</strong> Consumers acceptable usage policy e.g. some customers may not allow USB storage devices on<br />

site.<br />

432<br />

Analogue phones and Devices<br />

Attendant Software package<br />

IP Phones including<br />

o Desk phones,<br />

o Soft phones (Work station and Smart Phone Applications),<br />

o Conference Phones – Installed from central templates using TFTP services for rapid<br />

deployment<br />

o Button Module (24)<br />

o Ethernet Interface 10/100/1000Mbps<br />

o Secondary Ethernet Interface (PC)<br />

o USB Devices<br />

o Web Phone<br />

BRI ISDN to the Desk<br />

Wireless - Subject to the site security policy Cassidian also provide the following hands free<br />

systems.<br />

Wireless IP – It should be noted that provision of Wireless LAN would be the responsibility of the<br />

<strong>Service</strong> Consumer<br />

DECT – Provision subject to site survey<br />

The Cassidian Telephony <strong>Service</strong> has been designed to support both H.323 and SIP IP devices along<br />

with a number of legacy technologies.


<strong>Service</strong> Management Offering<br />

Voice <strong>Service</strong><br />

The support for the voice service is delivered from the CSOC and managed according to the TIL<br />

processes previously outlined at 2.1. The following sub-sections give further detail on specific service<br />

delivery elements.<br />

Voice System Test<br />

A test plan shall be tailored to account for site specific requirements and agreed with the <strong>Service</strong><br />

Consumer to address the services procured.<br />

Testing shall take place on all delivered systems and solutions according to the deployment test<br />

plan. As far as possible the system shall be tested prior to transition to mitigate risk prior to the system<br />

transition. Typically, as <strong>Service</strong> Access Points (Handsets, Faxes etc) are introduced to the system, a<br />

sample of these ensure that all capability is operational for the deployment, this includes testing the<br />

features and services and that monitoring and management capabilities are properly operational. Basic<br />

testing shall be undertaken on the remainder of the system to ensure that all <strong>Service</strong> Access Points<br />

(SAPs) initiate and connect to the system.<br />

Voice - Transition to <strong>Service</strong><br />

Cassidian recognises that Transition between voice systems needs to avoid impact to the <strong>Service</strong><br />

Consumer and their business activities. In order to support this activity Cassidian works with the <strong>Service</strong><br />

Consumer to find an appropriate solution and create a Transition Plan to meet their needs. Some of the<br />

services that Cassidian support are:<br />

433


434<br />

Porting of numbers to the new system<br />

Connectivity to Legacy systems to provide parallel usage and / or staged migration activity<br />

Out of hours cutover service<br />

Training of Authority Users prior to cutover activity taking place<br />

Floor walking services to resolve any usage issues and provide support to the Authority Users.<br />

User guides for the SAPs deployed<br />

Site Documentation<br />

Voice - Training<br />

As part of Cassidian’s standard provision, user guides for the SAPs shall be supplied. Typically this<br />

shall be provided as soft copy, hard copies shall be provided on request via the <strong>Service</strong> Consumer Portal.<br />

Additionally guides shall also be provided for other services such as conference bridging.<br />

Training shall be provided based on the needs of the <strong>Service</strong> Consumer and a Training Plan shall be<br />

agreed accordingly. This is in the form of training on standard SAP and service usage. Roll out methods<br />

include training for all Authority Users or nominated individuals. In some cases where the <strong>Service</strong><br />

Consumer wishes to take on additional activity such as management of their own billing and logging<br />

reports, additional training shall be required.<br />

Voice - System Monitoring <strong><strong>Service</strong>s</strong><br />

All core equipment and IP phones support SNMP enabling remote management and provision of<br />

real time updates to the system manager and providing end to and visibility of the installed system.<br />

A full system monitoring service is available from the CSOC that enables Cassidian to proactively<br />

address any issues that arise. Such issues are often identified by the CSOC prior to the <strong>Service</strong> Consumer<br />

being aware, particularly where a resilient solution is in place.


Additionally the Cassidian solution supports traffic measurement across the system to record traffic<br />

levels, usage on trunks, etc. This enables provides the capability to both ensure that the system is not<br />

over or under provisioned and trend analysis to be undertaken which facilitates the tracking of changing<br />

system demands prior to this becoming an issue for the <strong>Service</strong> Consumers.<br />

Voice System Management<br />

Cassidian offers its Solution with a fully managed service or supporting activity alongside the <strong>Service</strong><br />

Consumer. Through its <strong>Service</strong> Operations Centre, (CSOC), Cassidian offer the following services:<br />

435<br />

Configuration Management of the system in response to Authority User requests, such as User<br />

account maintenance services<br />

Logging and Billing services, including report production<br />

Active System Monitoring with maintenance instigation<br />

Implement Change Management;<br />

Provide Release and Deployment Management;<br />

Dedicated <strong>Service</strong> Managers to liaise with the <strong>Service</strong> Consumers providing a common point of<br />

contact to discuss changing requirements, new capability that may be of interest and address<br />

any issues should they arise.<br />

Voice System Maintenance<br />

Fault management for deployed equipment is considered as part of the core service provided by<br />

Cassidian for the equipment deployed, where Cassidian is undertaking Monitoring services, this shall<br />

automatically invoked to tackle issues in the most efficient way possible minimise the possibility or<br />

duration of disruption to the <strong>Service</strong> Consumers. Additionally Cassidian offers a number of services from<br />

the CSOC to support the deployed systems including:


436<br />

Routine Maintenance such as patching and software upgrades in line with the manufacturers<br />

development cycles (may not be required for shorter contract durations)<br />

Controlled Power Down and Power Up <strong><strong>Service</strong>s</strong><br />

Block Wiring and Cabling services<br />

Desktop and Web Video Teleconferencing and Collaboration Environment<br />

Technical <strong>Service</strong> Offering<br />

The Cassidian Desktop/Web Video Conferencing and Collaboration Tools service delivers as part of<br />

our Unified Communications offering the following capabilities and functions:<br />

Near face to face meetings audio and video.<br />

Full Managed on-net conference facilities<br />

o Public and Private Conference Rooms<br />

o Conference Booking <strong>Service</strong><br />

o Conference Moderation<br />

o Support to ad-hoc Conferencing<br />

o Record and replay meetings<br />

o Presence Aware<br />

Full system and user utilisation reporting<br />

Conferencing Clients<br />

o Web client<br />

o Desktop Client<br />

o Mobile Client (where the security profile permits)<br />

Conferencing features<br />

o Visual indicators of participants joining and active speaker<br />

o Privacy<br />

o Desktop and application sharing<br />

o Whiteboard for all participants to work simultaneously<br />

o Secure encrypted meetings<br />

o Shared Conference Repositories<br />

Optional Extensible Interfaces and Gateways<br />

o Integrate with SIP services<br />

o Integrate with IM services<br />

o Integration with classic video conferencing solutions<br />

o Integrate with Messaging client to deliver single Inbox capability.<br />

o Universal Address Book<br />

Deployment Models Supported<br />

Each of these <strong><strong>Service</strong>s</strong> are available to the <strong>Service</strong> Consumer with the following deployment models:


437<br />

Full Central Managed <strong>Service</strong> delivery<br />

Local Instance – deployment of a local instance of the service(s) with a centralised management<br />

function<br />

Design and delivery of a fully distributed service deployment to support a multi-site instance<br />

with centralised and shared service management model.<br />

All service capabilities can be delivered as a high availability capability to support the required<br />

service availability.<br />

Security Aspects of the <strong>Service</strong><br />

This service leverages the underlying authentication service provided via the Authentication service<br />

provided by Cassidian for the fully managed or shared management instances of this service. Where the<br />

service offering is operationally managed by the <strong>Service</strong> Consumer or the <strong>Service</strong> Consumer has an<br />

extant suitable authentication DS then an instance of this service will be integrated with that where<br />

appropriate form a security and interoperability perspective.<br />

Desktop/Web video conferencing capability<br />

The Desktop/Web Video Conferencing service includes the following selectable capabilities.<br />

Standard or high availability service.<br />

<strong>Service</strong> Consumers can connect regardless of their location within the <strong>PSN</strong> via the web gateway<br />

service.<br />

Provision of real-time near face-to-face meetings and collaboration.<br />

Desktop Voice and Video Conferencing (DV2C)<br />

The DV2C service delivers high quality video and voice conferencing using standard protocols:


438<br />

PROTECT networks will use the following communications<br />

o Client – Server communications RTP/TLS over SIP/SDP<br />

o Video encoding H.264<br />

RESTRICTED, CONFIDENTIAL<br />

o Cryptographic and message authentication using SRTP/TLS over SIP/SDP<br />

o Video encoding H.264<br />

<strong>Service</strong> Collaboration Interface and Features<br />

The DV2C service provides the following collaboration capabilities and optional external service<br />

interfaces:<br />

Interfaces to:<br />

o MS Office<br />

o MS Outlook<br />

o SIP Gateway to other external or 3rd party voice services<br />

o IM Gateway to integrate with other external or 3rd party IRC services<br />

User Collaboration Features<br />

User Collaboration is achieved using a provided Client providing the following features and<br />

capabilities:<br />

Desktop sharing.<br />

Application sharing.<br />

Whiteboard for all participants to work simultaneously<br />

File sharing<br />

Shared collaboration document store by conference<br />

Scheduler Functions<br />

The service provides the service consumer with the following scheduling functions:<br />

Schedule a new meeting<br />

List all scheduled meetings


439<br />

View and modify details of an existing meeting<br />

Delete an existing meeting<br />

Join an existing conference<br />

Send email invitations to meeting participants.<br />

Client Authentication and Encryption<br />

The Cassidian DV2C service supports multiple authentication methods to ensure only authorised<br />

<strong>Service</strong> Consumers can participate in meetings<br />

Direct Challenge Response – The User will be challenged to enter their credentials via a secure<br />

pop-up.<br />

Single Sign-on – When integrated with a suitable DS the <strong>Service</strong> will automatically validate the<br />

User and confirm their credentials for a specific conference.<br />

Encrypted communications client–server<br />

Optimised for conference room systems and headsets<br />

The preferred implement of DV2C shall use certificates to perform strong authentication and TLS for<br />

client-server interaction.<br />

Logging and Auditing<br />

Cassidian will implement DV2C with full auditing capabilities to comply with the <strong>PSN</strong> security policy<br />

thus all transactions will be logged to a central management point for a pre-agreed duration with the<br />

<strong>Service</strong> Consumer.<br />

<strong>Service</strong> Management Offering<br />

The full managed on-net service is managed from the CSOC and access to the Video Conferencing<br />

service is booked through the Consumer Portal. The conferencing management application will,<br />

dependent on the authentication method used, present an invitation to the conference call to each<br />

participant giving the call details and authentication requirements. All Incident and Problem


management and other ITILv3 processes are managed by the CSOC and available via the <strong>Service</strong><br />

Consumer Portal.<br />

Internet <strong><strong>Service</strong>s</strong><br />

The Cassidian Internet <strong><strong>Service</strong>s</strong> have been designed to provide the <strong>Service</strong> Consumer with the<br />

comprehensive suite of secured services required for Internet and Intranet access, integration and<br />

interoperability. Cassidian provides the following <strong>PSN</strong> compliant capabilities within our Internet <strong>Service</strong><br />

Offering:<br />

440<br />

Internet Access <strong>Service</strong><br />

Domain Name <strong>Service</strong> - DNS<br />

Dynamic Host Configuration Protocol (DHCP) <strong><strong>Service</strong>s</strong><br />

Forward and Reverse Network Address Translation (NAT) <strong><strong>Service</strong>s</strong><br />

Network Monitoring <strong><strong>Service</strong>s</strong><br />

Network Management <strong><strong>Service</strong>s</strong><br />

Secure Internet Gateways<br />

Accurate Time <strong>Service</strong><br />

Deployment Models Supported<br />

Each of these <strong><strong>Service</strong>s</strong> are available to the <strong>Service</strong> Consumer with the following deployment models:<br />

Full Central Managed <strong>Service</strong> delivery<br />

Local Instance – deployment of a local instance of the service(s) with a centralised management<br />

function<br />

Design and delivery of a fully distributed service deployment to support a multi-site instance<br />

with centralised and shared service management model.<br />

All service capabilities can be delivered as a high availability capability to support the required<br />

service availability.


Security Environments Supported<br />

All of Cassidian’s service capabilities have been designed to be delivered at PROTECT, RESTRICTED<br />

and CONFIDENTIAL (unless specifically excluded within the capability description) and are supported<br />

from the Cassidian <strong>Service</strong> Operations Centre (CSOC).<br />

Technical <strong>Service</strong> Offering<br />

Internet Access <strong><strong>Service</strong>s</strong><br />

Cassidian will provision an Internet facing service for the <strong>Service</strong> Consumer. This can be provided in<br />

either standard or high availability mode as a virtual point of presence via a secured extrusion for the<br />

CSOC over the Cassidian Encryption <strong>Service</strong> (Security <strong><strong>Service</strong>s</strong>) or as a physical point of presence at the<br />

<strong>Service</strong> Consumers location(s). Irrespective of the deployment model this service can be provided in<br />

both standard and high availability mode.<br />

Within this capability Cassidian provides an agile service that can be augmented by the additional<br />

capabilities identified below. Cassidian also ensure that the <strong>Service</strong> Consumer is provided with an agile<br />

bandwidth capability, to respond to changes in the <strong>Service</strong> Consumers needs and ensuring no loss of<br />

response or access during anomalous surges.<br />

Within this <strong>Service</strong> Offering Cassidian manage, maintain and registers the <strong>Service</strong> Consumers:<br />

441<br />

Internet Address Space<br />

Internet Name Space<br />

Bandwidth and Contention<br />

Resilience and Availability<br />

Basic Access Control<br />

Routing


442<br />

Time Source<br />

Domain Name <strong><strong>Service</strong>s</strong><br />

Cassidian will provide the <strong>Service</strong> Consumer with a high availability secure <strong>PSN</strong> compliant Name<br />

<strong>Service</strong> based upon a secure distributed BIND implementation. This implementation provides the<br />

following technical functionality:-<br />

Supported Implementations<br />

The Cassidian Name Resolution <strong>Service</strong> implementation has identified and can provide the following<br />

configuration options<br />

Full DNS – This will provide the <strong>Service</strong> Consumer with a complete DNS for all zones that the<br />

<strong>Service</strong> Consumer requires to be hosted.<br />

Split DNS – This will provide the <strong>Service</strong> Consumer with a DNS to support a differential public<br />

and or private resolution space. This function also supports the DNS requirements for support to<br />

cross boundary resolutions (via proxies or other means).<br />

Zone Delegation and Parent Hosting – This will provide the <strong>Service</strong> Consumer with the required<br />

delegations and zone hosting records required to allow the <strong>Service</strong> Consumer to run their own<br />

child domain as a zone hosted on a Name Server within their control.<br />

Secondary DNS Hosting – This will provide the <strong>Service</strong> Consumer with a shared resilient DNS<br />

implementation. Thus it will be possible for the <strong>Service</strong> Consumer to share the responsibilities<br />

within this service provision implementation thus enabling tight coupling and integration with<br />

any existing LAN side implementations.<br />

The remainder of this section identifies the scope of technical functionality available to support<br />

these implementations.<br />

Server Types<br />

The following Server types are provided within this service:


443<br />

Primary Master Name Server – Master<br />

Secondary Master Name Server – Slave<br />

Supported Zone Types<br />

The Cassidian service provides support to the following zone types within its Name Servers:<br />

Forward zones<br />

in-addr-arpa and ip6.arpa zones<br />

Stub Zones<br />

Based upon the zones this <strong>Service</strong> provides the <strong>Service</strong> Consumer with a complete resilient<br />

resolution path service that supports any required configuration for the delegation, management and<br />

hosting of full domain tree or sub-tree implementation.<br />

Supported Resolution Modes<br />

The Cassidian service supports the following resolution modes:<br />

Recursive – The DNS <strong>Service</strong>, when operating in this mode for any given <strong>Service</strong> Consumer, shall<br />

provide the originating requester a complete answer to the original request. Depending upon<br />

the resolvability of the initial request the resultant response shall either provide the required<br />

zone response or the relevant error/failure message.<br />

Iterative – The DNS <strong>Service</strong>, when operating for any given <strong>Service</strong> Consumer, in this mode will<br />

provide the best answer this instance knows back to the requester (typically another server) or<br />

an error/failure message.<br />

Extended Resource Records (RR) Support<br />

The Cassidian DNS <strong>Service</strong> supports all bespoke or specific requirements and extensions mandated<br />

by any current Operating Systems or network implementations. The Cassidian implementation supports<br />

all currently recognised RR’s. This includes, but is not limited to, those records required for:


444<br />

DNS Security (RRSIG, DNSKEY, DS, NSEC)<br />

Telephone Number Mapping (NAPTR)<br />

<strong>Service</strong> or Server Location (SRV)<br />

Geographic locator records (LOC) the implementation<br />

Supports all IPv4 and IPv6 derived record types.<br />

Additional Support to Private or Close Community Full Path Resolution<br />

The Cassidian implementation provides the following support to the root-path:<br />

Integrate and maintain the trusted root path for all zones it is responsible for as a child of a<br />

parent domain tree.<br />

Integrate with the security domains root and maintain the trusted root path for all zones it is<br />

responsible for as a parent within a domain tree.<br />

Provide a fully traversable root zone path (including a root service if required) for all<br />

implementations that are closed or private in their nature.<br />

Provide a root.hints file for those <strong>Service</strong> Consumers’ clients and servers Operating Systems.<br />

Support to Legacy Domain Names and Domain Name Migrations<br />

The Cassidian solution provides interim and transition support to legacy FQDN transformations. This<br />

provides the <strong>Service</strong> Consumer with a transformational capability to ensure that the externally<br />

resolvable names reflect the current <strong>PSN</strong> naming conventions whilst the internal system is migrating<br />

from a previous naming convention.<br />

Supported Interfaces and Transaction types<br />

This implementation provides listeners on port 53 for both TCP and UDP interactions with built in<br />

support for EDNS0 transactions.<br />

Support to Zone Transition


The Cassidian DNS implementation provides the <strong>Service</strong> Consumer with a low risk service transition<br />

via a number of defined zone transfer and adoption processes.<br />

Support to Dynamic DNS<br />

For any given <strong>Service</strong> Consumers zone this service can provide this as a DDNS enabled zone.<br />

Access to the DNS <strong>Service</strong> Status and Zone Administration<br />

Access to the current availability status of the DNS <strong>Service</strong> will be presented via the Customer<br />

Technical Portal. Where a zone has been delegated for <strong>Service</strong> Consumer Administration access to this<br />

zone will be via a secondary authentication interface presented on the Customer <strong>Service</strong> Portal.<br />

Optional <strong>Service</strong> Consumers Hub Name Servers<br />

Where the underlying network architecture and VPN correlation dictates a dedicated DNS Appliance<br />

can be included within that site thus optimising the resolution for that <strong>Service</strong> Consumers environment.<br />

This extension would be recommended for overall performance efficiencies when large volumes of<br />

hosts are connecting to DDNS enabled zones.<br />

<strong>Service</strong> Capacity<br />

The provided DNS <strong>Service</strong> will support the capacity throughput requirements as defined within the<br />

<strong>PSN</strong> Technical Domain Description v2.<br />

Performance Metrics<br />

The solution has been scaled to support the performance requirements as defined within the <strong>PSN</strong><br />

Technical Domain Description v2.<br />

Security Aspects of the <strong>Service</strong><br />

445


The Cassidian DNS implementation has the same security architecture and characteristics for<br />

PROTECT, RESTRICTED and CONFIDENTIAL service offerings as a consequence of the DNS lookup services<br />

within the <strong>PSN</strong> being considered critical and, as such, shall meet IL 5 in terms of integrity (refer to<br />

Section 8 of the <strong>PSN</strong> Technical Domain Description , V2.0).<br />

For each of these security impact level service offerings there is a segregated solution in terms of<br />

physical platform and logical functionality.<br />

DNS Operational Integrity<br />

The Cassidian implementation supports the following transactional security measures utilised in<br />

order to support the DNS functionality:<br />

446<br />

Transactional Signatures (TSIG) – Cassidian supports a transactional signature based solution.<br />

DNS Security Extensions (DNSSEC) – Cassidian supports a DNS Security based solution.<br />

The Cassidian service also implements and supports access control lists at both the Name Server and<br />

Zone levels.<br />

The implementation also ensures that there is delineation between the recursive Name Servers and<br />

the iterative Name Servers. Thus any external resolver requests are handled by dedicated iterative<br />

Name Server instances to accommodate their requests. These iterative Name Servers will direct the<br />

client to a Slave recursive Name Servers for final resolution.


It should be noted that within this model the resolver client only interacts with the Slave Name<br />

Servers for a given zone and not the Primary Name Server for that zone. The relationship between the<br />

Slave Name Servers and the Primary Name Server for zone transfers and interactions utilises TSIG.<br />

DNSSec is used to ensure the integrity of the records and exchanges for Name Servers and<br />

compliant resolvers outside of the Cassidian DNS implementation.<br />

Resilience Options<br />

The Cassidian DNS provides the required resolution capacity within the compliant VPOC<br />

deployment. Each hosted zone will be deployed across our HA architecture which in turn will be<br />

distributed across our DR site. The service is implemented on a dedicated suite of hardware with<br />

inherent hardware resilience and robustness. Each hosted zone will be fully resolvable from any of our<br />

DR sites.<br />

Dynamic Host Configuration Protocol<br />

Cassidian will provide the <strong>Service</strong> Consumer with a fully functional DHCP service as defined within<br />

RFC 2131. This capability will provide the requestor with host requestor configuration parameters, the<br />

allocation of a network address and the ability to interwork with BootP relay agents.<br />

447


Within this DHCP service the required and defined service parameters can be configured on a scope<br />

by scope basis for any given <strong>Service</strong> Consumer. The most common parameters as defined within RFC<br />

2132/2485/3679/4776/6153 that are supported include but are not limited to:<br />

448<br />

Gateway<br />

Time Server Address<br />

DNS Server Address<br />

Log Server<br />

Print Server<br />

Domain Name<br />

NETBIOS Parameters and Server<br />

FQDN<br />

SIP Server Options<br />

Lease time<br />

VLAN ID<br />

IPv4 Address allocation<br />

IPv6 Address allocation<br />

TFTP Server Address<br />

Mail Server Address(s)<br />

Cassidian provides this service as a centralised capability, a site specific instance or a hybrid /<br />

distributed deployment. The nature of any deployment of this service will be guided by the <strong>Service</strong><br />

Consumer’s needs, the capabilities of the underlying LAN/WAN infrastructure, the resilience required<br />

and the size of any given consumer by site and organisation.<br />

Security Aspects of the <strong>Service</strong><br />

As DHCP standard has no inherent security configuration parameters this service leverages the<br />

overarching security configuration for all Internet <strong><strong>Service</strong>s</strong> and the <strong>PSN</strong> baseline security profile and<br />

engineering best practice.<br />

Resilience Options


Given the nature of DHCP a multi homed and cool standby DHCP service can be provided to support<br />

the resilience requirement of the <strong>Service</strong> Consumer.<br />

Forward and Reverse Network Address Translation (NAT)<br />

Cassidian provides an IPv4 forward and reverse Network Address Translation service. This service<br />

enable a <strong>Service</strong> Consumer to present <strong>PSN</strong> allocated IP Addresses irrespective of the existing the IP<br />

address plan used internally.<br />

Forward NAT <strong>Service</strong><br />

The forward NAT <strong>Service</strong> will assign and manage the session based IPv4 translation between the<br />

internal (private) IP address and an external (public) IP Address.<br />

Reverse NAT <strong>Service</strong><br />

The reverse NAT <strong>Service</strong> will map an external IP Address and port to a specific internal IP Address<br />

and port. This function allow the <strong>Service</strong> Consumer to present external services (via a split DNS) to other<br />

organisations or consumers without exposing the internal IP structure.<br />

Security Aspects of the <strong>Service</strong><br />

This service will ensure that the <strong>Service</strong> Consumers internal IP address range is obfuscated from the<br />

public areas of the <strong>PSN</strong>. This service will log all translation mappings for future review and analysis<br />

Network Monitoring <strong>Service</strong><br />

Cassidian provides a full Network Monitoring <strong>Service</strong>. The Network Monitoring <strong>Service</strong> provides the<br />

Customer Authority with a solution that will continuously monitor a network, providing early detection<br />

449


and notification of slow, over utilised or failing components and then notify your administration team of<br />

these issues.<br />

In order to support today’s complex IT systems and networks the Cassidian Network Monitoring<br />

<strong>Service</strong> provides a comprehensive monitoring service that delivers:<br />

450<br />

Early indications of faults and errors;<br />

Identification of equipment configuration changes and inconsistencies (e.g. additions or<br />

removals);<br />

Monitoring of performance of any IT component against a defined operational scope;<br />

Provision of data in support of the Compliancy and Security Audit process.<br />

Main Components of the <strong>Service</strong><br />

To describe the breadth and depth of our Network Monitoring <strong>Service</strong>, Cassidian has defined the<br />

following functional components:<br />

Discovery and Agent <strong>Service</strong> – Cassidian work with the <strong>Service</strong> Consumer to discover and<br />

catalogue all networked assets to be monitored. Once the first capture has been executed<br />

Cassidian shall periodically repeat the discovery to assist in the identification of changes or<br />

anomalies within the defined scope of those elements being monitored.<br />

Incident and Alert Collectors – Cassidian work with the <strong>Service</strong> Consumer to efficiently design<br />

and define how existing and additional collectors can be best utilised to provide the most<br />

comprehensive alerts and notifications within the defined scope of those elements being<br />

monitored.<br />

Network Efficient Aggregators – Cassidian work with the <strong>Service</strong> Consumer to ensure that the<br />

most cost and capability efficient aggregation service is delivered thus maximising your return<br />

on investment.<br />

Unifying Correlator and Threshold Monitor – Efficient alerting capture is only the first part of an<br />

effective Network Monitoring <strong>Service</strong> so within this function Cassidian works with the <strong>Service</strong><br />

Consumer to baseline and identify the required correlation and entity thresholds required to<br />

provide a pro-active and reliable.<br />

Visualisation and Alerting <strong>Service</strong> – This function provides the <strong>Service</strong> Consumer with a near-real<br />

time visualisation of the status of all networked elements within the defined scope of those<br />

elements being monitored which is access from the Customer Web Portal.


451<br />

Ticketing System – This function is used to support the helpdesk service by controlling the flow<br />

of events throughout the support process and ensuring that there is a designated owner for<br />

each event action.<br />

Configuration and Reporting <strong>Service</strong> – Cassidian will provide a regular status report for the<br />

<strong>Service</strong> Consumer to assist with internal compliancy, change and future growth management.<br />

Network Management <strong>Service</strong><br />

The Network Management <strong>Service</strong> provides you with a fully managed solution that will continuously<br />

and proactively manage a network providing change control, configuration management and network<br />

monitoring of all networked devices. This service provides the <strong>Service</strong> Consumer with the following<br />

capabilities:<br />

Give early indications of faults and errors;<br />

Identify equipment configuration changes and inconsistencies (e.g. additions or removals);<br />

Monitor the performance of any IT component against a defined operational scope;<br />

Provide data in support of the Compliancy and Security Audit process;<br />

Manage change;<br />

Maintain 5 configuration snapshots for all relevant managed devices;<br />

Provide Networked device patch update service;<br />

Provide Anomalous behaviour detection.<br />

The Network Management <strong>Service</strong> uses the ISO / ITU-T FCAPS model to deliver Fault, Configuration,<br />

Accounting, Performance and Security Management as its core capabilities and deployed using an ITILv3<br />

aligned <strong>Service</strong> wrap.<br />

The FCAPS model and the ITIL framework underpin this service by providing:<br />

Active network monitoring – Proactive SNMP and ICMP monitoring of selected target devices;


452<br />

Passive network monitoring - Reception and processing of SNMP traps and messages; through<br />

standard protocols or custom log file reading and parsing.<br />

Device configuration management;<br />

Change Management;<br />

Release and Deployment Management;<br />

Fault Resolution – Customer facing Visualisation and Alerting <strong>Service</strong>;<br />

Performance Reporting – <strong>Service</strong> Levels, Trending and Configuration reports.<br />

Main Components of the <strong>Service</strong><br />

To describe the breadth and depth of our Network Management <strong>Service</strong>, Cassidian has defined the<br />

following functional components:<br />

Discovery and Agent <strong>Service</strong> – Cassidian will work with the <strong>Service</strong> Consumer to discover and<br />

catalogue all networked assets to be monitored. Once the first capture has been executed<br />

Cassidian will periodically repeat the discovery to assist in the identification of changes or<br />

anomalies within the defined scope of those elements being monitored.<br />

Incident and Alert Collectors – Cassidian will work with the <strong>Service</strong> Consumer to help design and<br />

define how existing and additional collectors can be best utilised to provide the most<br />

comprehensive alerts and notifications within the defined scope of those elements being<br />

monitored.<br />

Network efficient Aggregators – Cassidian will work with the <strong>Service</strong> Consumer to ensure that<br />

the most cost and capability efficient aggregation service is delivered so maximising your return<br />

on investment.<br />

Unifying Correlator and Threshold Monitor – Cassidian recognises that efficient alerting capture<br />

is only the first part of an effective Network management <strong>Service</strong> thus within this function<br />

Cassidian works with the customer to baseline and identify the required correlation and entity<br />

thresholds required to provide a pro-active and reliable.<br />

Visualisation and Alerting <strong>Service</strong> – This function provides the <strong>Service</strong> Consumer with a near-real<br />

time visualisation of the status of all networked elements within the defined scope of those<br />

elements being monitored.<br />

Ticketing System – This function is used to support the helpdesk service by controlling the flow<br />

of events throughout the support process and ensuring that there is a designated owner for<br />

each event action.<br />

Configuration Collection Repository – Cassidian has developed a dedicated toolset that focuses<br />

on collecting all managed devices current or running configurations and compares those with<br />

the current deposited version on a bi-weekly basis. In the event of any difference Cassidian will<br />

investigate these anomalies and provide a report of the delta with a severity and urgency based<br />

upon the results of that analysis.<br />

Configuration and Reporting <strong>Service</strong> – Cassidian has found that providing a regular status report<br />

for their customers greatly assists them with their internal compliancy, change and future<br />

growth management.


453<br />

Change Management Process – To support change within this service Cassidian has a complete<br />

Change Management process from initial receipt of the Request for Change through to<br />

implementation and configuration update.<br />

Network Monitoring<br />

Each network element will be monitored continuously, or at a frequently necessary and appropriate<br />

to its function, for failure or degradation in performance against a pre-defined threshold. Monitoring<br />

criteria will be set according to the nature of the network element and its function e.g. for a network<br />

data link the link status, bandwidth utilisation and number or errors will be measured whereas for a<br />

server the CPU utilisation, temperature and free disk space available will be monitored.<br />

Tuning<br />

It will be necessary to adjust the level of monitoring to maintain a usable level of information. Too<br />

much emphasis on one item, such as increasing link bandwidth usage, may mask degradation in another<br />

related field such as data link errors and vice versa and it is important therefore to review the attributed<br />

within the monitoring system on a regular basis.<br />

Test for Normal Condition<br />

An integral part of the process is the test for normal condition and this will largely be an automated<br />

process with rules being set up within the software toolset to process information received directly from<br />

the polling engine. Once an event occurs outside of what is classified as the normal condition for the<br />

monitored element, it will be flagged by an alert or alarm according to its severity or significance and<br />

will be resolved according to the rule set and either logged or escalated to an engineer for further<br />

attention as per the normal operation of Event Management.<br />

CSOC Notification


The monitoring toolset will be configured to notify the CSOC engineers of any anomaly according to<br />

the priority criteria set within the SLA. The CSOC will then resolve the Incident within the timescales<br />

indicated in the <strong>Service</strong> Level Agreement (SLA).<br />

Web portal access will also be available to view real time data and produce customisable reports.<br />

Continuation of Monitoring<br />

Following any notification to the CSOC and at any point during the lifecycle, a decision may be made<br />

to discontinue monitoring customer equipment. This may be due to one of several reasons:<br />

454<br />

Temporary loss of contact with the equipment due to upstream failure<br />

Disconnection of the device for maintenance<br />

Removal of the equipment after decommissioning<br />

Contract termination<br />

If the monitoring is to be suspended temporarily, this will be processed using a standard model<br />

change request (service request) and the polling engine suspended for the agreed period. If the change<br />

is permanent a normal change will be raised so that the schedule may be amended as appropriate. A<br />

separate process for termination will be defined in the Off-boarding process so that relevant data may<br />

be archived for future statistical reference and accounting purposes.<br />

Configuration Management<br />

The configuration of each network element will be monitored for any unscheduled change and any<br />

deviation from a known configuration baseline stored in the configuration management database


(CMDB). Any unauthorised configuration changes identified will be investigated and reported upon by<br />

the CSOC.<br />

<strong>Service</strong> Delivery Points<br />

Cassidian will deliver the Network Management <strong>Service</strong> from the Cassidian <strong>Service</strong><br />

Operations Centre (CSOC) in Newport and will securely connect to the customer network via IPSec<br />

VPN tunnels; for a more resilient solution, it is recommended that the VPNs are terminated at two<br />

separate customer locations.<br />

For small enterprises comprising less than 5000 monitored elements, an Aggregator and Correlator<br />

will be sited at the Cassidian site; for larger enterprises, with greater than 5000 monitored elements and<br />

where bandwidth requirements dictate, one or more Aggregators and a Correlator will be sited at the<br />

customer premises; if bandwidth requirements permit, the Correlator may be retained at Cassidian.<br />

Cassidian will provide the necessary hardware platforms and required software for the<br />

Aggregator/Correlator.<br />

Backup and Restore<br />

Cassidian perform a daily cross platform warm standby back-up for all critical <strong>Service</strong> elements,<br />

including real time database replication across multiple distributed platforms. This ensures Cassidian can<br />

exceed the requirements for a Tier 3 data centre for those critical delivery elements of this service<br />

offering<br />

455


Security Aspects of the <strong>Service</strong><br />

This service is provided with the following security aspects and attributes:<br />

456<br />

All interactions with the devices under management will be completed using a secure channel if<br />

the device is capable of support.<br />

All data in transit to and from the CSOC will be configured to pass down a secure separated<br />

channel.<br />

All access to the resultant network status views will be via the Cassidian Secured Customer Web<br />

Portal will full access control and rights management.<br />

All access to the resultant status for a discreet implementation will be configured with the<br />

relevant local rights management and access control parameters.<br />

Secure Internet Gateways<br />

Cassidian provides two types of Secure Internet Gateway <strong><strong>Service</strong>s</strong>:<br />

Secure Web Gateway<br />

Secure e-Mail Gateway<br />

The Secure Web and e-Mail Gateway services described below is only available at PROTECT however<br />

an enhanced Web-Guard service is also available at RESTRICTED and CONFIDENTIAL which will provide<br />

the functionality as required by <strong>PSN</strong> and CESG security standards within these higher security domains –<br />

Please see the Firewall <strong>Service</strong> – Application Firewalls for further details.<br />

Secure Web Gateway<br />

HTTP(S) Scanning<br />

The Web <strong>Service</strong> Gateway scans all HTTP and HTTPS traffic and analyses it for both malware and<br />

inappropriate content. This includes inspection and alerting for all certificates that appear suspicious.


Organisational Acceptable Use Policies<br />

This capability allows the <strong>Service</strong> Consumer Organisation to set a comprehensive usage policy based<br />

upon a number of defining criteria:<br />

457<br />

A list of users, computers and/or groups to whom the policy applies<br />

A list of URL category and application filtering rules<br />

Destination site reputation risk analysis<br />

Malware scanning including real-time Javas emulation and analysis<br />

Enhances zero-day attack detection rates<br />

File type definitions and analysis<br />

Data loss mitigation<br />

Additional options that affect the user’s browsing experience.<br />

Advanced Detection Techniques<br />

The Web <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced technologies<br />

and techniques that have been designed to help reduce and mitigate the threats from:<br />

Anonomyzing Proxies detection – attack vectors launched from behind a proxy service<br />

Anonymous Call Home detection – Detects and identifies machine making unexpected or<br />

authorised web connections<br />

Deployment and Management<br />

This service can be deployed as either a physical or virtual appliance at a <strong>Service</strong> Consumers location<br />

or accessed from the CSOC. Irrespective of the deployment configuration this service will receive near<br />

real-time signature updates and ‘bad site lists’ from the CSOC over the <strong>PSN</strong> within the relevant security<br />

domain.


Cassidian will manage these gateways from the CSOC for the <strong>Service</strong> Consumer and can provide<br />

both shared view and shared management via role based delegation thus optimising the usability and<br />

responsiveness of this service within the approved implementation security parameters.<br />

Enhanced Capabilities<br />

This gateway is fully interoperable and can be fully integrated with the Cassidian Computer Network<br />

Defence <strong>Service</strong>, further enhancing the security detection for the <strong>Service</strong> Consumer.<br />

This gateway is fully interoperable with the Cassidian HIDS and Anti-Virus <strong>Service</strong>; when integrated<br />

this service will combine to provide fully protection and control of remote users when suitable<br />

connected (e.g. via the Cassidian Secure Remote Access <strong>Service</strong>).<br />

Secure e-Mail Gateway<br />

The e-Mail <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced<br />

technologies and techniques that have been designed to help reduce and mitigate the threats from:<br />

458<br />

Pre-defined sensitive data types<br />

Automatic data protection Prevent the accidental or malicious loss of sensitive data.<br />

Protects sensitive data with automatic email encryption<br />

Reduces the risk of data loss with pre-packaged DLP definitions<br />

Blocks known and zero-day threats with the built in AV engine<br />

Anti-spam management and mitigation<br />

Advanced Detection Techniques<br />

The e-Mail <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced<br />

technologies and techniques that have been designed to help reduce and mitigate the threats from:


459<br />

SPAM Campaigns – Eliminate over 99% of spam with Sender Genotype Technology and Live<br />

Anti-Spam real-time updates<br />

Proactively protect against evolving threats including viruses, phishing, and malware with<br />

Behavioural Genotype technology<br />

Deployment and Management<br />

This service can be deployed as either a physical or virtual appliance at a <strong>Service</strong> Consumers location<br />

or accessed from the CSOC. Irrespective of the deployment configuration this service will receive near<br />

real-time signature updates and ‘bad site lists’ from the CSOC over the <strong>PSN</strong> within the relevant security<br />

domain.<br />

Cassidian will manage these gateways from the CSOC for the <strong>Service</strong> Consumer and can provide<br />

both shared view and shared management via role based delegation thus optimising the usability and<br />

responsiveness of this service within the approved implementation security parameters.<br />

Enhanced Capabilities<br />

This gateway is fully interoperable and can be fully integrated with the Cassidian Computer Network<br />

Defence <strong>Service</strong>, further enhancing the security detection for the <strong>Service</strong> Consumer.<br />

This gateway is fully interoperable with the Cassidian HIDS and Anti-Virus <strong>Service</strong>; when integrated<br />

this service will combine to provide fully protection and control of remote users when suitable<br />

connected (e.g. via the Cassidian Secure Remote Access <strong>Service</strong>).<br />

Accurate Time <strong>Service</strong><br />

Cassidian can provide the <strong>Service</strong> Consumer with a highly accurate Time <strong>Service</strong>. This time service is<br />

provided to ensure that all aspects of the <strong>Service</strong> Consumers IS and IT environment can maintain<br />

accurate time and time synchronisation to within


Cassidian <strong>PSN</strong> compliant time source or an available time source from the <strong>Service</strong> Consumers DNSP<br />

source as defined within the <strong>PSN</strong> Technical Domain Description Document.<br />

This time service has a number of different deployment models to support the <strong>Service</strong> Consumers<br />

requirements:<br />

460<br />

Full Client Time <strong>Service</strong> Capability<br />

o Clients connected to the CSOC managed Client Time Server<br />

o Clients connected to a deployed Cassidian Client Time Server<br />

Time Synchronisation Capability<br />

o Connection to the Cassidian Stratum Time source over the <strong>PSN</strong> WAN link<br />

o Connect to a site deployed stratum time source<br />

<strong>Service</strong> Management Offering<br />

All component services that comprise the Internet <strong>Service</strong> provision are monitored and managed<br />

from the CSOC using remote network and device management toolsets. The CSOC delivers Event,<br />

Incident and Availability management processes which are key components that underpin the service<br />

and information concerning real-time service status is provided via the <strong>Service</strong> Consumer Portal.<br />

E-Mail and Desktop Messaging<br />

Technical <strong>Service</strong> Offering<br />

Cassidian provides the following <strong>PSN</strong> compliant capabilities within our messaging offering which is<br />

delivered within our Unified Communications <strong>Service</strong> offering. This service provides the following<br />

capabilities:<br />

Desktop Messaging<br />

Web Messaging<br />

Interpersonal Messaging (SMTP and eSMTP)


461<br />

Inter-Organisational Messaging (x.400)<br />

Enterprise and Domain Messaging Gateways<br />

Content inspection of incoming and outgoing messages for infection and non-compliance with<br />

<strong>PSN</strong> policy<br />

Extended Client functionality including<br />

o Collaboration with shared calendars<br />

o Fully functional Address Book<br />

o Task Management<br />

o Meeting planning<br />

o Security Labelling for Messages<br />

<strong>Service</strong> Continuity Scope<br />

Availability<br />

The hosted solution is Highly Available and Scalable across our DR sites. Secure multifunction<br />

messaging gateways in conjunction with Mail Guards protect the network from external mail threats.<br />

Outgoing mail is checked for conformity against IA based policies. Hosted services are centrally managed<br />

from Cassidian <strong>Service</strong> Operation Centre (CSOC).<br />

Backup and Restore<br />

Cassidian perform a daily cross platform warm standby back-up for all critical <strong>Service</strong> elements,<br />

including real time database replication across multiple distributed platforms. This ensures Cassidian can<br />

exceed the requirements for a Tier 3 data centre for those critical delivery elements of this service<br />

offering<br />

Security Aspects of the <strong>Service</strong><br />

This service is provided with the following security aspects and attributes:<br />

All interactions with the devices under management will be completed using a secure channel if<br />

the device is capable of support.<br />

All data in transit to and from the CSOC will be configured to pass down a secure separated<br />

channel.<br />

All access to the resultant network status views will be via the Cassidian Secured Customer Web<br />

Portal will full access control and rights management.


462<br />

All access to the resultant status for a discreet implementation will be configured with the<br />

relevant local rights management and access control parameters.<br />

<strong>Service</strong> Capabilities<br />

Client Capabilities<br />

Standards Desktop Messaging (Windows Client) – the client provided is integrated and multi-<br />

capable; examples of the functionality provided includes:<br />

Personal email management<br />

Multiple email accounts from different domains or servers<br />

Address book local and company<br />

Security labelling of all messages<br />

The Messaging client will be modified with Security Classification labels which comply with <strong>PSN</strong><br />

IA policies. The Security labels ensure downstream equipment route the messages on the<br />

correct network.<br />

Message archive<br />

Searchable archive across multiple end user mailboxes<br />

Secure email transport SSL/TLS POP3, SSL/TLS IMAP4, SSL/TLS SMTP<br />

Integrates seamlessly with directory services and PKI infrastructure<br />

Mail and attachment screening for virus and malware content<br />

Junk mail filtering<br />

Protection against Phishing attacks<br />

Extended Desktop Client functionality includes:<br />

Collaboration with shared calendars<br />

Fully functional Address Book<br />

Task Management<br />

Meeting planning


Web Messaging – Web messaging will connect roaming and remote access <strong>Service</strong> Consumers to<br />

their mailbox via and authentication hosted web interface.<br />

463<br />

Search folders<br />

Message filtering<br />

Ability to set categories in the message list<br />

Options in the Web management interface for Outlook Web App<br />

Side-by-side view for calendars<br />

Multiple client language support<br />

Ability to attach messages to messages<br />

Expanded right-click capabilities<br />

Integration with Office Communicator, including presence, chat, and a contact list<br />

Conversation view<br />

Outlook Web App mailbox policies<br />

Messaging Server Capability<br />

The Cassidian Messaging <strong><strong>Service</strong>s</strong> support the following capabilities:<br />

Support to MIME and SMIME attachments<br />

Messages sent on the RESTRICTED and CONFIDENTIAL networks will be digitally signed in<br />

accordance with CESG guidance and the PKI-Strategy for <strong>PSN</strong><br />

Mail-box sizing<br />

Security Label enforcement<br />

Anti-virus and Malware detection.<br />

Interpersonal Messaging also supports:<br />

Client Transport mechanisms supported<br />

o POP3<br />

o IMAP<br />

Inter-server transport mechanisms


464<br />

o SMTP<br />

o eSMTP<br />

Inter-Organisational Messaging (x.400) also supports:<br />

non-repudiation<br />

Supported formats<br />

o P2<br />

o P22<br />

o P772<br />

Within Inter-Organisational Domain Messaging Gateway<br />

The e-Mail <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced<br />

technologies and techniques that have been designed to help reduce and mitigate the threats from:<br />

Pre-defined sensitive data types<br />

Automatic data protection Prevent the accidental or malicious loss of sensitive data.<br />

Protects sensitive data with automatic email encryption<br />

Reduces the risk of data loss with pre-packaged DLP definitions<br />

Blocks known and zero-day threats with the built in AV engine<br />

Anti-spam management and mitigation<br />

Advanced Detection Techniques<br />

The e-Mail <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced<br />

technologies and techniques that have been designed to help reduce and mitigate the threats from:<br />

SPAM Campaigns – Eliminate over 99% of spam with Sender Genotype Technology and Live<br />

Anti-Spam real-time updates


465<br />

Proactively protect against evolving threats including viruses, phishing, and malware with<br />

Behavioural Genotype technology<br />

Cross-Domain Messaging Gateway<br />

The above gateway is supplemented with the following functionality (as required) when deploying a<br />

messaging gateway between security domains.<br />

Cassidian will provide Multi Functional Gateways to send and receive X.400 and SMTP traffic.<br />

The gateway will inspect mail message security label and act based upon the define <strong>Service</strong><br />

Consumers release and acceptance policy.<br />

Non delivery reports are configurable and can notify <strong>Service</strong> Consumers of failed messages or<br />

the security office dependent upon the <strong>Service</strong> Consumers policy requirements.<br />

Source and Destination domain white-lists<br />

The MFG conforms to MMHS<br />

Hygiene Management<br />

Each hosted server or management workstation has full end-point protection implementation<br />

including AV, white listing, and a malware client. This service is updated with new threats and signatures<br />

from an update server located within the CSOC at each site.<br />

Collaboration Servers –Option<br />

The Cassidian messaging service shall allow <strong>Service</strong> Consumers to collaboratively work on shared<br />

documents, share calendars, tasks, email and notes Collaboration services will be delivered as Normal<br />

Availability or High Availability where:<br />

Normal Availability – A single Collaboration Server with daily back-ups


466<br />

High Availability – Multiple Collaboration Servers load balanced across DR sites<br />

Mailbox Servers<br />

Cassidian shall implement mailbox servers across our DR sites for resilience hosting the following<br />

functions:<br />

Web Server<br />

Host Mailbox database<br />

Provide email storage<br />

Host Public folder database<br />

Email Address Policies<br />

Address lists and offline address books<br />

Multi-mailbox searches<br />

Content indexing<br />

HA and site resiliency<br />

Messaging records management and retention policies<br />

Cassidian shall provide the <strong>Service</strong> Consumer with access to a web server instance. This capability is<br />

required to host the webmail portal for <strong>Service</strong> Consumers accessing their mailbox through a web<br />

browser<br />

User Authentication<br />

<strong>Service</strong> Consumers shall be authenticated against a directory service to gain access to their mailbox.<br />

Integration and Interoperability functions<br />

Cassidian messaging service uses open standards to allow <strong>Service</strong> Consumers to communicate<br />

across disparate networks<br />

Deployment Models Supported<br />

Each of these <strong><strong>Service</strong>s</strong> are available to the <strong>Service</strong> Consumer with the following deployment models:<br />

Full Central Managed <strong>Service</strong> delivery<br />

Local Instance – deployment of a local instance of the service(s) with a centralised management<br />

function


467<br />

Design and delivery of a fully distributed service deployment to support a multi-site instance<br />

with centralised and shared service management model.<br />

All service capabilities can be delivered as a high availability capability to support the required<br />

service availability.<br />

Business Continuity and Disaster Recovery<br />

Each HA Site resilient service will be deployed across our HA architecture which in turn will be<br />

distributed across our DR site. The service is implemented on a dedicated suite of hardware with<br />

inherent hardware resilience and robustness. Each hosted service will be fully resolvable from any of our<br />

DR sites.<br />

Cassidian can offer a site resilient service to ensure no loss of service by extending the physical<br />

locations of the mailbox servers.<br />

Mailbox backup will form part of the DR policy. <strong>Service</strong> consumers will be able to request retrieval of<br />

deleted email or a corrupt mailbox<br />

<strong>Service</strong> Management Offering<br />

Messaging services are hosted and delivered from the CSOC. All infrastructure elements that<br />

underpin the service, including Collaboration Servers and Mail guard gateways are monitored and<br />

managed using remote network and device management toolsets. <strong>Service</strong> status information is provided<br />

via the <strong>Service</strong> Consumer Web Portal which also provides Incident management and <strong>Service</strong> Request<br />

support.


Co-location and Hosting<br />

Technical <strong>Service</strong> Offering<br />

Cassidian provides Co-Location and Hosting <strong><strong>Service</strong>s</strong> through its Secure Data Centre <strong><strong>Service</strong>s</strong> Centres<br />

(SDSC) managed via our CSOC. These data centres are equipped to deliver Tier 3 services to meet<br />

requirements from the hosting of <strong>Service</strong> Consumer owned equipment to the provisioning of servers<br />

and virtual data centres.<br />

The Cassidian SDSC is approved to operate up to RESTRICTED and implements the relevant security<br />

process and procedures as defined within the relevant impact level. As such this service is only offered<br />

at PROTECT and RESTRICTED for <strong>PSN</strong>.<br />

The Infrastructure as a <strong>Service</strong> (IaaS) capability provisions processing, storage, networks, and other<br />

fundamental compute resources where the <strong>Service</strong> Consumer is able to deploy and run arbitrary<br />

software, which can include operating systems and applications. The <strong>Service</strong> Consumer does not<br />

manage or control the underlying infrastructure but has control over operating systems, storage,<br />

deployed applications and limited control of select networking components dependent upon the<br />

security domain.<br />

Scope and Function of the <strong><strong>Service</strong>s</strong><br />

The Co-Location and Hosting <strong><strong>Service</strong>s</strong> are flexible and shall be offered for the following<br />

infrastructure layers:-<br />

468


Hosting Environment<br />

469<br />

Co-location of <strong>Service</strong> Consumer equipment through the provision of data centre floor space,<br />

power and physical connectivity<br />

Secure connectivity from the <strong>Service</strong> Consumers location(s) through <strong>PSN</strong> connections.<br />

Support for <strong>Service</strong> Continuity and Disaster Recovery.<br />

Hardware Platform<br />

Co-location of <strong>Service</strong> Consumer equipment in Cassidian provided server and network<br />

equipment racks<br />

Cassidian provided physical servers into Cassidian managed server racks<br />

Storage presentation from the Cassidian SDSC SAN storage facility<br />

Secure connectivity from the <strong>Service</strong> Consumers location(s) through <strong>PSN</strong> connections.<br />

Support for <strong>Service</strong> Continuity and Disaster Recovery.<br />

Virtualised Platform<br />

Virtual servers and virtual data centres based upon the Cassidian SDSC virtualisation and<br />

provisioning platform.<br />

Secure connectivity from the <strong>Service</strong> Consumers location(s) through <strong>PSN</strong> connections<br />

Support for <strong>Service</strong> Continuity and Disaster Recovery.<br />

The <strong>Service</strong> Consumer may use the above service offerings in combination interconnected as<br />

required within the constraints of the security domains.


This <strong>Service</strong> offering is intended to meet the needs of what is currently termed “private cloud” and<br />

“community cloud” deployment models.<br />

Security Aspects of the <strong>Service</strong><br />

The Co-Location and Hosting <strong><strong>Service</strong>s</strong> shall be offered over two security domains covering PROTECT<br />

and RESTRICTED. Both domains are physically and logically separated from the other domains to avoid<br />

any accidental or deliberate attempt to transfer information to a lower domain. Each domain has its<br />

own service management infrastructure platform for the maintenance and monitoring of the equipment<br />

providing the services, supporting security separation.<br />

PROTECT level services are protected by standard security measures as identified in the baseline<br />

countermeasure set within ISO 27001, whilst RESTRICTED level services have additional security<br />

measures in line with the Deter and Resist Controls. <strong>PSN</strong> Connectivity will be employed to provide<br />

protection for data transmitted and received data at the necessary Impact Levels.<br />

Within each domain, the security model for each <strong>Service</strong> Consumer varies depending upon the layer<br />

of Co-Location and Hosting <strong><strong>Service</strong>s</strong> taken up. Part of the SLA definition with the <strong>Service</strong> Consumer will<br />

identify the exact level of security measures to be provided by Cassidian to support accreditation of the<br />

<strong>Service</strong> Consumers system and maintain accreditation/certification of the SDSC data centre.<br />

Specific Capability<br />

The Cassidian SDSC Tier 3 data centres provide the infrastructure environment for the hosting and<br />

co-location services offered up to RESTRICTED. These data centres within or secure facilities.<br />

470


The Cassidian service management team supports the <strong>Service</strong> Consumer with the definition of<br />

resource requirements, planning, on-site logistics, resource deployment, and connectivity services.<br />

The following service offerings are available within the SDSC datacentres:<br />

471<br />

Floor space to host service user owned equipment<br />

o The <strong>Service</strong> Consumer provides the hardware and enclosures to be placed and<br />

commissioned in an allocated space within in the SDSC facility<br />

o Access to this environment is as determined by the <strong>Service</strong> Consumer’s requirements<br />

for application, administrative and out-of-band access.<br />

Partial or full rack space to host service user owned equipment e.g. Servers and network<br />

equipment<br />

o Dedicated standard server and network equipment racks into which <strong>Service</strong> Consumer<br />

installs their equipment<br />

o Access to this equipment is as determined by the <strong>Service</strong> Consumer’s requirements for<br />

application, administrative and out-of-band access<br />

Physical servers built to specific hardware, BIOS and firmware configurations<br />

o This IaaS deployment model provides servers ready for operating system and<br />

application deployment. Network connectivity is provided to local and wide-area<br />

networks<br />

o Network connectivity is provided through VLAN separation<br />

o Access to this equipment is as determined by the <strong>Service</strong> Consumer’s requirements for<br />

application, administrative and out-of-band access<br />

Virtual machines configured to support service user workloads<br />

o The provisioning of one or more virtual machines to the <strong>Service</strong> Consumer using a CAPS<br />

approved hypervisor environment which is part of the SDSC. The virtual machines are<br />

provisioned with the resources available to satisfy the service user application workload<br />

requirements such as performance and availability<br />

o Connectivity to the Virtual Data Centre (VDC) is provided through virtual network<br />

adapters associated with the VLANs assigned to the service user<br />

o Access to the virtual machines is via virtual machine remote console access and any<br />

operating system remote access and application protocols<br />

VDC configured to support <strong>Service</strong> Consumer workloads and virtual network segmentation<br />

o Virtual Data Centres enable multiple virtual machines to be deployed and operated as a<br />

single entity. The virtual machines can be segmented and secured within the virtual data<br />

centre using hypervisor virtual distributed switches and virtual appliances which provide<br />

edge firewall capability. An example of using this facility would be a multi-tier web site<br />

service where web servers, application servers and database servers can be deployed on


472<br />

separate network segments within virtual data centre and traffic filtering applied as<br />

required<br />

o Connectivity to the VDC is provided through virtual network adapters associated with<br />

the VLANs assigned to the service user<br />

o Access to the virtual machines is via virtual machine remote console access and any<br />

operating system remote access and application protocols<br />

Virtual machine backup and recovery.<br />

o The backup facilities offered cover virtual machine disks using the virtualisation platform<br />

storage APIs. This enables virtual machine recovery without the use of agents or access<br />

to the virtual machines<br />

o A file level recovery option is available where agent software can be deployed to<br />

provide an interface for <strong>Service</strong> Consumer initiated recovery. This is only available for<br />

supported operating systems and workloads<br />

Virtual machine High Availability or Fault Tolerance<br />

o The SDSC virtualisation infrastructure supports both High Availability (HA) and Fault<br />

Tolerance (FT) options. The HA option enables virtual machines that are affected by a<br />

host server failure to be instantiated on another server within the same cluster. Fault<br />

Tolerance achieves this using a hot standby virtual machine on another host server in<br />

the same cluster<br />

Fibre Channel SAN based storage presented as required.<br />

o Cassidian SAN based storage is provisioned on high function, multiple high availability<br />

storage arrays capable of supporting high performance and high capacity requirements<br />

through a tiered storage architecture<br />

o Where storage is being presented to physical hardware this facility requires HBA<br />

hardware and firmware specifications which meet the compatibility requirements of the<br />

SAN fabric, storage technology and the <strong>Service</strong> Consumer’s operating system. This<br />

compliance requirement is determined as part of the technical design<br />

Inter-site disaster recovery through synchronous or asynchronous storage replication.<br />

o Where Cassidian SAN based storage is utilised local and inter-site resilience options are<br />

available through replication and point-in-time copy (snapshot)<br />

Each service offering described is implementable at PROTECT and RESTRICTED.<br />

The Power, HVAC and physical uplink connectivity will be provided by Cassidian. The redundancy<br />

level and diversity will be determined by the security domain Impact Level and specific <strong>Service</strong><br />

Consumer requirements.


Provisioning of the service offerings are achieved through established work flows including<br />

requirements analysis, design and specification.<br />

The <strong>PSN</strong> provides the required protection for all data in transit for the relevant security domain.<br />

The virtualisation platform provides dedicated virtual machines; storage and connectivity based on a<br />

CAPS-approved hypervisor technology on which the <strong>Service</strong> Consumer is able to deploy their operating<br />

systems and applications. The SDSC is equipped with chassis based blade servers with redundant power,<br />

SAN and LAN redundancy.<br />

Where <strong>Service</strong> Consumer environments at different IL levels are inter-connected the higher impact<br />

level environment will contain an appropriate security gateway. These will be determined according to<br />

the security requirements.<br />

Access to the hosted services is provided through <strong>PSN</strong> secured connections.<br />

Monitoring<br />

The following infrastructure elements are covered by the system monitoring and alerting toolset.<br />

473<br />

Environmental monitoring of Power, HVAC.


474<br />

Cassidian supplied hardware monitored through out-of-band management interfaces. E.g. HP<br />

iLo for Proliant servers.<br />

Virtualisation, Network, SAN fabric and storage subsystems.<br />

Access control systems.<br />

SDSC data centre surveillance.<br />

Deployment and Migration <strong><strong>Service</strong>s</strong><br />

Cassidian provides comprehensive planning, design and deployment services tailored to <strong>Service</strong><br />

Consumer needs.<br />

Cassidian supplies physical and virtual computing resources along with the required connectivity<br />

through standard service management processes managed by the CSOC.<br />

Cassidian can assist <strong>Service</strong> Consumers in deploying their workloads to the IaaS computing<br />

resources.<br />

Cross-domain security models<br />

The Co-Location and Hosting <strong><strong>Service</strong>s</strong> provided relate to single domain solutions for PROTECT and<br />

RESTRICTED. Any requirement for multi domain provisions must be addressed as independent solutions.<br />

Security Aspects of the <strong>Service</strong><br />

The services offered for PROTECT and RESTRICTED are managed with in-domain tool-sets.<br />

Regardless of which level of service is required by the <strong>Service</strong> Consumer, the security design of the<br />

Cassidian Data Centre capability should address the following within each of the security environments.<br />

Security <strong>Service</strong> Code of Connection compliance


<strong>Service</strong> Consumers wishing to connect into the services must adhere to the Code of Connection<br />

(CoCo) for the security level being provided by Cassidian. The CoCo needs to place suitable controls on<br />

the <strong>Service</strong> Consumer’s infrastructure to minimise the risk of attacks through the interface provided.<br />

Prior to the CoCo, the first step is to clarify the <strong>Service</strong> Consumer’s requirement for the protection of<br />

confidentiality and integrity of their information or data. This will be provided through a Security Aspect<br />

Letter and a Privacy Impact Assessment by the <strong>Service</strong> Consumer to Cassidian alongside any technical,<br />

schedule or commercial service terms.<br />

These documents identify the business and privacy impact levels associated with the service<br />

provision agreement and initiate the appropriate actions, preparations and awareness within the<br />

Cassidian Security Management structure, amongst the service provision personnel and if necessary<br />

flowed down to any contracted external suppliers.<br />

Physical Security Aspects of the <strong>Service</strong><br />

Within the approved site, dedicated rooms with electronic access controls are required to prevent<br />

unauthorised access by Cassidian or contractor personnel not allowed entry into these areas. Separate<br />

racking and locking of infrastructure for the different security levels and individual <strong>Service</strong> Consumers is<br />

required to prevent unauthorised access to the rest of the system by those individuals that are allowed<br />

into these areas.<br />

475


Security sensitive areas such as the CSOC are kept physically separate from the data centre to<br />

reduce the insider threat by removing the ability to attack the infrastructure from within the data centre<br />

itself.<br />

Resilience and disaster recovery of the services are provided through use of two data centres at<br />

different sites.<br />

Enhanced Security Enforcing Functions<br />

These are the electronic and hardware controls that protect the data centre and the service<br />

provision to the <strong>Service</strong> Consumer. These controls are grouped into the eight areas of concern that are<br />

addressed in the following sections.<br />

Within the service provision Cassidian shall employ a strategy for protecting the <strong>Service</strong> Consumer<br />

information or data that falls into eight possible categories depending upon the service required. These<br />

categories are:<br />

476<br />

Physical Protection to site, buildings and rooms<br />

Access Control to Infrastructure<br />

Separation of Individual <strong>Service</strong> Consumer <strong><strong>Service</strong>s</strong><br />

Separation of the Different IL Security Domains<br />

Confidentiality and Integrity Protection of the Data<br />

Monitoring of the Infrastructure (including Audit collection)<br />

Configuration Control of the Infrastructure<br />

Maintenance of the Infrastructure<br />

<strong>Service</strong> Provided - Hosting Environment


When the <strong>Service</strong> Consumer procures this service they require the physical location to place their<br />

infrastructure within. Therefore the security service element is primarily around providing physical<br />

protection of the <strong>Service</strong> Consumer’s equipment as part of the security environment and the secure<br />

connection between the <strong>Service</strong> Consumer’s sites and the Cassidian locations.<br />

The service options available from a security viewpoint are:<br />

477<br />

Minimum interaction from Cassidian – Minimum interaction is effectively where Cassidian has<br />

no management connection into the <strong>Service</strong> Consumer’s equipment other than at the boundary<br />

to monitor the interface. The <strong>Service</strong> Consumer is totally responsible for installation of<br />

operating system, software and system updates including all licensing and support costs. The<br />

infrastructure in this case is an extension of the <strong>Service</strong> Consumer’s own security environment<br />

where instances happen to be located at the Cassidian data centre. Therefore the <strong>Service</strong><br />

Consumer must also be responsible for additional security measures such as PKI management<br />

and user access to equipment/applications, lock down of equipment, time synchronisation and<br />

overall monitoring of their equipment. Cassidian in this scenario are only responsible for<br />

segregation of environments, preventing <strong>Service</strong> Consumer activity from interfering with or<br />

disabling other <strong>Service</strong> Consumer’s infrastructure<br />

Security Monitoring of <strong>Service</strong> Consumers infrastructure – Security Monitoring of <strong>Service</strong><br />

Consumers Infrastructure provides an additional level of security service to monitor the <strong>Service</strong><br />

Consumer’s hosted equipment for any security events detected by the monitoring tools. This<br />

can be adopted separately or as part of a wider CSOC service provision to the <strong>Service</strong><br />

Consumer’s infrastructure at their own sites to give them a full network monitoring capability.<br />

The <strong>Service</strong> Consumer though in this scenario is still responsible for maintaining the hardware<br />

and software installed on the infrastructure. The CSOC in this case becomes an extension of the<br />

<strong>Service</strong> Consumer’s security domain as a monitoring element<br />

Full Security Protection of <strong>Service</strong> Consumers infrastructure – Full Security Protection of <strong>Service</strong><br />

Consumers Infrastructure effectively takes over control and maintenance of the hardware<br />

provided by the <strong>Service</strong> Consumer so that Cassidian perform all OS upgrades, software updates<br />

and installs all patch releases. AV and IDS monitoring of the hardware will be provided through<br />

the Cassidian core services. Audit and backup of the hardware are also available as options on<br />

the core services. A PKI service can also be offered as part of larger CSOC service offering for<br />

identity management. The <strong>Service</strong> Consumer is still responsible for providing the OS, software<br />

and all update/patch releases to Cassidian, but Cassidian will test on the System Reference<br />

Model (SRM) prior to installation on the live infrastructure


<strong>Service</strong> Provided - Hardware Platform<br />

When the <strong>Service</strong> Consumer procures this service they require Cassidian to also provide the physical<br />

hardware as well as the hosting location. Therefore the security service element is widened to provide<br />

enhanced security measures as standard to the <strong>Service</strong> Consumer.<br />

The options available are:<br />

478<br />

Base Hardware (i.e. no OS or applications installed) – The base hardware option is effectively the<br />

same as the Hosting Environment service, with the only difference being that Cassidian provides<br />

the physical hardware. Secure management and monitoring of this hardware by the CSOC will<br />

depend upon the type of service required by the <strong>Service</strong> Consumer<br />

Secured Hardware – The secured hardware option is a higher level service offering where<br />

Cassidian manage the infrastructure that the <strong>Service</strong> Consumer’s applications and data are<br />

hosted upon. The <strong>Service</strong> Consumer only need provide the application and in service updates to<br />

Cassidian for them to integrate and manage on the data centre platform. This service closely<br />

resembles the final service offering of Virtualisation, where Cassidian provides and manage the<br />

entire infrastructure used by the <strong>Service</strong> Consumer<br />

<strong>Service</strong> Provided - Virtualisation<br />

When the <strong>Service</strong> Consumer procures this service they require Cassidian to host applications/data<br />

on their virtualisation platform in the data centre. Therefore the security service element is the standard<br />

implementation of the security controls required to protect the data centre. The <strong>Service</strong> Consumer will<br />

be allocated virtual machines on the existing infrastructure or a separate instance of virtualised platform<br />

depending on the impact level of the <strong>Service</strong> Consumer’s data


The <strong>Service</strong> Consumer only need provide the application, data and in service updates to Cassidian<br />

for them to integrate and manage on the data centre platform. Cassidian are responsible here for all<br />

other security measures to protect the <strong>Service</strong> Consumer’s environment within the data centre<br />

<strong>Service</strong> Continuity and Availability<br />

Cassidian has a comprehensive service continuity plan that satisfies our critical service support<br />

commitments. It should be noted that this service is hosted upon a high resilience infrastructure with in-<br />

built component and process redundancy. This critical capability design is supplemented by the<br />

following additional back-up, data recovery and disaster recovery plans as identified below.<br />

Cassidian perform daily platform warm standby backups for all critical service elements including<br />

real-time replication across multiple distributed platforms. This ensures Cassidian meet the service<br />

requirements for the critical service delivery elements.<br />

Virtual machine High Availability or Fault Tolerance options are provided as required mitigating<br />

virtualisation host failures.<br />

Cassidian can offer support to the <strong>Service</strong> Consumer for:<br />

479<br />

Online data storage for disaster recovery data copies<br />

Synchronous and asynchronous storage replication for storage allocated on Cassidian SAN based<br />

storage between sites.


480<br />

Inter-site virtual data centre failover<br />

Connectivity and support for server consumer BC and DR technical solutions<br />

<strong>Service</strong> Management Offering<br />

Management of the service is provided by CSOC who will monitor and maintain all ancillary and<br />

peripheral infrastructure elements relevant to the service provided. In addition, a ‘remote hand’ service<br />

is available to provide local engineering support to hosted <strong>Service</strong> Consumer equipment at the CSOC<br />

site. Escort personnel will be provided for <strong>Service</strong> Consumer engineering staff requiring access to hosted<br />

equipment if this option is not taken up.<br />

On-line Storage<br />

Technical <strong>Service</strong> Offering<br />

Cassidian provides Co-Location and Hosting <strong><strong>Service</strong>s</strong> through its Secure Data Centre <strong><strong>Service</strong>s</strong> Centres<br />

(SDSC) which are hosted on a List X accredited site. These data centres are equipped to deliver Tier 3<br />

services to meet requirements from the hosting of <strong>Service</strong> Consumer owned equipment to the<br />

provisioning of servers and virtual data centres.<br />

The online storage service (Secure Managed Storage <strong>Service</strong>) provides Microsoft Windows based<br />

network file shares based on the Common Internet File System (CIFS) standard, providing secure remote<br />

file and directory access for client machines independent of the client machines operating system. This<br />

service is provisioned for use at PROTECT and RESTRICTED.<br />

The service is hosted from the SDSC UK premises and accessed via the <strong>PSN</strong> from <strong>Service</strong> Consumer<br />

location/s.


The Secure Managed Storage <strong>Service</strong> allows the <strong>Service</strong> Consumer to:<br />

481<br />

Control which of their users has access to the service<br />

Allow the <strong>Service</strong> Consumer (clients) to access files and directories located on the file store as if<br />

they were local.<br />

The service is hosted on a virtual file server from the Cassidian SDSC and accessed via the <strong>PSN</strong><br />

connection from <strong>Service</strong> Consumer location/s. The service allows the <strong>Service</strong> Consumer to administrate<br />

the virtual file server thus allowing the <strong>Service</strong> Consumer (clients) to control access to files and<br />

directories located on the file store.<br />

The service can be readily integrated with the <strong>Service</strong> Consumer’s Microsoft Active Directory <strong>Service</strong><br />

(MSAD) enabling role based access control with minimal administration overhead.<br />

Key functions:<br />

An access controlled network file share<br />

Client and server file storage<br />

<strong>Service</strong> Consumer centralised administration for configuration access to files and folders<br />

The Secure Managed Storage <strong>Service</strong> shall:<br />

Provide a network file share (or shares) supporting a specific Impact Level of the defined volume<br />

and monitor this file share to the agreed thresholds.<br />

Deliver the Secure Managed Storage <strong>Service</strong> from the Cassidian <strong>Service</strong> Operations Centre<br />

(CSOC) in the UK and propose the secure connection be via the <strong>PSN</strong>.


Security Models<br />

The On-line Storage service is available at PROTECT and RESTRICTED. Each domain will be physically<br />

separated from the other domains to avoid any accidental or deliberate attempt to transfer information<br />

to a file share on a lower domain. Each domain will also have its own service management infrastructure<br />

platform for the maintenance and monitoring of the equipment providing the services to support the<br />

separation.<br />

The <strong>Service</strong> Consumer shall comply with the relevant security measures detailed in the code of<br />

connection for the SDSC.<br />

Specific Capability<br />

The Secure Managed Storage <strong>Service</strong> is based on virtual Microsoft Windows bases servers<br />

presenting storage as one or more Common Internet File System (CIFS) file shares.<br />

482<br />

The online storage service is constructed using one or more virtualised Microsoft Windows file<br />

servers provisioned by Cassidian with the file services role enabled. These servers are<br />

provisioned in the SDSC CAPS approved virtualisation platform. The <strong>Service</strong> Consumer is then<br />

able to customise and administer the server at the operating system level.<br />

The require storage capacity is presented as one or more virtual disks as agreed with the <strong>Service</strong><br />

Consumer. This is provisioned from the SDSC highly available storage facility. The virtual disks<br />

are physically discreet and provisioned in line with the requirements of the security domain.<br />

The service resilience is achieved according to the SLA agreed with the <strong>Service</strong> Consumer.<br />

The following options can be facilitated:<br />

o A backup and recovery service. This is a virtual machine backup but includes file level<br />

recovery capability.<br />

o A High Availability configuration where a failed virtual server is re-instantiated on a<br />

different physical server.<br />

o A Fault Tolerance configuration where a failed virtual server is rapidly replaced by a hotstandby<br />

server transparently to the <strong>Service</strong> Consumer.<br />

o An inter-site failover based upon synchronous or asynchronous storage replication<br />

between SDSC data centres.


483<br />

Access to the servers is enabled through a secure network connection giving administrative<br />

access through Remote Desktop <strong><strong>Service</strong>s</strong>.<br />

The servers are handed over to the <strong>Service</strong> Consumer technical support nominees who take<br />

administrative control of the server. This enables the <strong>Service</strong> Consumer to integrate the server<br />

with their environment for the intended purpose and implement access control and protection<br />

according to their Security Policies.<br />

Deployment and Migration <strong><strong>Service</strong>s</strong><br />

Cassidian provides comprehensive planning, design and deployment services tailored to <strong>Service</strong><br />

Consumer needs.<br />

Cassidian supplies physical and virtual compute resources along with the required connectivity<br />

through standard service management processes managed by the CSOC.<br />

Cassidian can assist <strong>Service</strong> Consumers in deploying their workloads to the IaaS compute resources<br />

Two domain security model<br />

To achieve this multi-domain model, a separate data connection for each domain will be required<br />

and achieved using the <strong>PSN</strong> connectivity.<br />

The On-line Storage offering will have to be procured by the <strong>Service</strong> Consumer. This service will be<br />

facilitated using the connection required to the relevant domain, routing the information appropriately<br />

from the consumer to the file share within the SDSC.<br />

Security Aspects of the <strong>Service</strong><br />

The Cassidian SDSC is approved to operate up to RESTRICTED and will implement the<br />

relevant security process and procedures required for ISO27001 Certification or Accreditation<br />

under HMG IS 1 and 2 as required for the impact level. We can also provide the <strong>Service</strong><br />

Consumer with security guidance and support for any internal accreditation updates or<br />

modifications to satisfy their requirements.


The CSOC will provide discreet physically separate management infrastructures to support each of<br />

the proposed security domains being offered at PROTECT and RESTRICTED.<br />

Security <strong>Service</strong> Code of Connection compliance<br />

<strong>Service</strong> Consumers wishing to connect into the services must adhere to the Code of Connection<br />

(CoCo) for the impact level being supplied. Cassidian will require them to show compliance against the<br />

CoCo, which places suitable controls on the <strong>Service</strong> Consumer’s infrastructure to minimise the risk of<br />

attacks through the interface provided.<br />

Prior to the CoCo, the first step is to clarify the <strong>Service</strong> Consumer’s requirement for the protection of<br />

confidentiality and integrity of their information or data placed on the file share. This will be provided<br />

through a Security Aspect Letter and a Privacy Impact Assessment by the <strong>Service</strong> Consumer to Cassidian<br />

alongside any technical, schedule or commercial service terms.<br />

These documents identify the business and privacy impact levels associated with the service<br />

provision agreement and initiate the appropriate actions, preparations and awareness within the<br />

Cassidian Security Management structure, amongst the service provision personnel and if necessary<br />

flowed down to any contracted external suppliers.<br />

Physical Security Aspects of the <strong>Service</strong><br />

Within the approved site, dedicated rooms with electronic access controls are provided to prevent<br />

unauthorised access by Cassidian or contractor personnel with no requirement for entry into these<br />

areas. Separate racking and locking of infrastructure for the different IL levels is required to prevent<br />

484


unauthorised access to the other system areas by any other individuals that are allowed into these<br />

areas.<br />

Security sensitive areas such as the CSOC are kept physically separate from the data centre to<br />

reduce the insider threat by removing the ability to attack the infrastructure from within the data centre<br />

itself.<br />

Resilience and disaster recovery of the services are provided through use of two data centres at<br />

different sites.<br />

Enhanced Security Enforcing Functions<br />

These are the electronic and hardware controls that protect the data centre and the service<br />

provision to the <strong>Service</strong> Consumer. These controls are grouped into the eight areas of concern identified<br />

below that have to be addressed within the security design, through the implementation of control<br />

measures.<br />

Within the service provision Cassidian shall employ a strategy for protecting the <strong>Service</strong> Consumers<br />

information or data that falls into the eight possible categories depending upon the service required.<br />

These categories are:<br />

485<br />

Physical Protection to site, buildings and rooms


486<br />

Access Control to Infrastructure<br />

Separation of Individual <strong>Service</strong> Consumer <strong><strong>Service</strong>s</strong><br />

Separation of the Different IL Security Domains<br />

Confidentiality and Integrity Protection of the Data<br />

Monitoring of the Infrastructure (including Audit collection)<br />

Configuration Control of the Infrastructure<br />

Maintenance of the Infrastructure<br />

Security <strong>Service</strong> Element<br />

When the <strong>Service</strong> Consumer procures this service, they require Cassidian to host file shares on their<br />

platforms in the data centre. Therefore the security service element is the standard implementation of<br />

the enhanced security controls required to protect the data centre, but with the exception that the<br />

<strong>Service</strong> Consumer’s technical support team have administrative control over the configuration and use<br />

of the file share.<br />

The <strong>Service</strong> Consumer will be allocated virtual machines on the existing infrastructure or a separate<br />

instance of virtualised platform depending on the impact level of the <strong>Service</strong> Consumer’s data being<br />

stored.<br />

Cassidian is totally responsible for installation of operating system and system updates, including all<br />

licensing and support costs. The file share infrastructure in this case is an extension of the <strong>Service</strong><br />

Consumer’s own security environment where the instances happen to be located at the Cassidian data<br />

centre. Therefore the <strong>Service</strong> Consumer must be responsible for some security measures, such as<br />

controlling user access to the data.


All other security measures such as lock down of equipment, PKI certificate management time<br />

synchronisation, overall monitoring of their equipment come under the Cassidian security service<br />

provision. Cassidian are also responsible for segregation of environments, preventing <strong>Service</strong> Consumer<br />

activity from interfering with or disabling other <strong>Service</strong> Consumer’s file shares.<br />

Business Continuity and Disaster Recovery<br />

This service is hosted upon a high resilience infrastructure with in-built component and process<br />

redundancy. This critical capability design is supplemented by the following additional back-up, data<br />

recovery and disaster recovery plans as identified below.<br />

Cassidian perform daily platform warm standby backups for all critical service elements including<br />

real-time replication across multiple distributed platforms. This ensures Cassidian meet the service<br />

requirements for the critical service delivery elements.<br />

Virtual machine High Availability or Fault Tolerance options are provided as required mitigating<br />

virtualisation host failures.<br />

Cassidian can offer support to the <strong>Service</strong> Consumer for:<br />

487<br />

Online data storage for disaster recovery data copies<br />

Synchronous and asynchronous storage replication for storage allocated on Cassidian SAN based<br />

storage between sites.


488<br />

Inter-site failover<br />

Connectivity and support for <strong>Service</strong> Consumer BC and DR technical solutions<br />

<strong>Service</strong> Management Offering<br />

The online storage service is hosted and managed via the CSOC. The <strong>Service</strong> Consumer Portal<br />

provides access to tools to view current capacity and storage usage and to manage additional storage<br />

requests, provision additional hosts and monitor service status.<br />

Security <strong><strong>Service</strong>s</strong><br />

Technical <strong>Service</strong> Offering<br />

For the purposes of describing the scope of the Security <strong>Service</strong>, Cassidian shall segment the service<br />

into the following two topic areas of offering:<br />

Security Management Capabilities;<br />

Technical Security Capability.<br />

Security Management Capabilities<br />

Cassidian’s CLAS Consultants and Security Engineers are proficient in providing advice and guidance<br />

across the full spectrum of HMG Cyber Security related management activities in support of the <strong>Service</strong><br />

Consumers requirements.<br />

Security Program<br />

ISO27000 series compliance assessment and gap identification<br />

ISO 27001 ISMS scoping, statement of applicability (SoA), implementation and improvement<br />

CESG IA Maturity Model (IAMM) assessment and audit<br />

<strong>Service</strong>/product/capability out-sourcing / procurement lifecycle support<br />

Security Policy<br />

Policy and procedure development (Security Operating Procedures, Acceptable Use Policies etc)<br />

Information exchange agreement or Code of Connection preparation<br />

Preparation of Privacy Impact Assessments<br />

Business Continuity Planning and Disaster Recovery strategies, plans and testing in accordance<br />

with BS 25999, Joint <strong><strong>Service</strong>s</strong> Publication (JSP) 503, etc


Compliance Audits<br />

Security policy compliance auditing and reporting<br />

Regulatory compliance auditing and reporting e.g.: Data Protection Act (DPA) and Freedom of<br />

Information (FoI) Act<br />

Information exchange and/or Code of Connection (CoCo) compliance auditing and reporting<br />

such as AIRWAVE CoCo compliance<br />

Risk Management<br />

Asset identification and valuation<br />

Threat identification and assessment<br />

Risk Assessment and Treatment - HMG IS 1, CRAMM, CITICUS 1<br />

Security Architecture<br />

Security requirements analysis and derivation<br />

Advice on infrastructure defence and protective monitoring solution design, deployment and<br />

operational management<br />

Advice on cryptographic standards, products, deployment and operational management<br />

Advice on component configuration, hardening and secure lockdown<br />

Advice on identity management solution design, deployment and operational management<br />

Advice on current industry best practice and trends e.g.: the Open Security Architecture (OSA)<br />

framework<br />

IT Security Health Checks<br />

Advice, support, assistance and planning of IT Security Health Checks under the CHECK scheme<br />

Advice, support, assistance and planning of compliance auditing, inspection and testing in<br />

accordance with Joint <strong><strong>Service</strong>s</strong> Publication (JSP) 480 System Coordinating Installation Design<br />

Authority (SCIDA)<br />

Security Certification and Accreditation Guidance<br />

Support of programmes through Accreditation lifecycles including RMADS development, in<br />

accordance with UK HMG IS 2<br />

Guidance of programmes in achieving compliance with governmental security polices such as UK<br />

HMG Security Policy Framework (SPF), Joint <strong><strong>Service</strong>s</strong> Publication (JSP) 440 and the Association of<br />

Chief Police Officers (ACPO) Community Security Policy (CSP)<br />

Guidance of programmes in achieving compliance with industry regulatory bodies such as the<br />

Payment Card Industry (PCI) Security Standards Council and their Data Security Standard (DSS)<br />

Technical Security Capabilities<br />

This sub-service encompasses the architecting, design, integration, roll-out, monitoring, reporting<br />

and on-going management of selected technical countermeasures within the framework of a <strong>Service</strong><br />

Consumer’s overall security architecture. These technical countermeasures include:<br />

489


490<br />

Managed Encryption<br />

Secure Remote Access (SRA)<br />

Managed Digital Identities<br />

Other technical countermeasures that would typically be bundled as a technical security capability<br />

such as Intrusion Detection <strong>Service</strong> – Cassidian Computer Network Defence and Malware Detection and<br />

Prevention <strong>Service</strong> – Anti-Virus, Patch Update and Prevention, have been described within their own<br />

individual service descriptions within this framework.<br />

Managed Encryption <strong>Service</strong><br />

All Cassidian Encryption <strong><strong>Service</strong>s</strong> are fully <strong>PSN</strong> compliant as defined within the <strong>PSN</strong> Technical<br />

Domain Description v2 and the <strong>PSN</strong> Cryptographic Framework v1.0.<br />

RESTRICTED Encryption <strong>Service</strong><br />

Deployment Models<br />

This service is delivered using a suite of PEPAS, Common Criteria, FIPS and CAPS approved<br />

products. To support the flexibility for the <strong>Service</strong> Consumer this service provides a number of<br />

scaled Secure <strong>Service</strong> Delivery Points (SSDPs). The following types of SSDPs are available for<br />

implementation:<br />

10Gb High Availability(HA) SSDP<br />

10Gb Non Critical(NC) SSDP<br />

1Gb HA-SSDP<br />

1Gb NC-SSDP<br />

100Mb HA-SSDP<br />

100Mb NC-SSDP<br />

10Mb HA-SSDP<br />

10Mb NC-SSDP<br />

The SSDP delivers the following technical functionality:


491<br />

Support to the <strong>Service</strong> Consumers LAN side routing<br />

Provision of boundary security enforcing functions (on both the encrypted and unencrypted<br />

SSDPs interface points<br />

Provision of a boundary monitored IDS function (optional)<br />

Centralised VPN community and VPN association management<br />

Centralised key management including key generation and automated key distribution services<br />

All Quality of <strong>Service</strong> (QoS) markings will be reflected in the IP header presented to the<br />

underpinning GCN network.<br />

Provision of a WAN side routing service<br />

Provision of a tunnel encryption service as required from a security gateway device.<br />

The availability and status of the SSDPs can be visualised on the Technical Customer Web Portal via a<br />

secure <strong>Service</strong> Consumers Interface.<br />

In addition to the SSDPs functionality the service also supports the configuration of a <strong>Service</strong><br />

Consumer encryption and routing hub(s) thus optimising bandwidth utilisation within the DNSP zone<br />

and (an optional) onward connectivity gateway to other external RESTRICTED domain secure<br />

communities via the DNSP HA Gateway service.<br />

The following SSDP Extensions are available if required by the <strong>Service</strong> Consumer:<br />

When the <strong>Service</strong> Consumer’s Network does not currently support the <strong>PSN</strong> QoS markings the<br />

SSDP shall apply QoS marking where applicable or requested.<br />

For high capacity SSDPs (e.g. at the <strong>Service</strong> Consumer’s Hub Sites) a bandwidth optimised IDS<br />

correlation appliance can be included - thus reducing the TCO for this service whilst maintaining<br />

the required level of monitoring.


492<br />

The SSDP’s IDS capability can be enhanced to provide application level monitoring.<br />

Capacity and Performance Metrics<br />

The SSDPs are designed to provide the required capacity and performance required for the<br />

delivery of this service to the <strong>Service</strong> Consumer. This capacity is further enhanced by the high<br />

availability nature of this service.<br />

Resilience<br />

The core services have been designed and implemented in accordance with the relevant<br />

availability and resilience capabilities where delivered. This resilience has been extended to the<br />

SSDP’s with the HA and NC <strong>Service</strong> Consumer options.<br />

CONFIDENTIAL Encryption <strong>Service</strong><br />

Technical Functionality<br />

The Cassidian CONFIDENTIAL Encryption <strong>Service</strong> builds on the functionality of the Cassidian<br />

RESTRICTED Encryption service, by using CAPS approved encryptors to provide a service which includes<br />

the ability to support remote access. The encryption is transparent; QoS bits as set by the services are<br />

passed and therefore all services are supported at CONFIDENTIAL. QoS prioritisation is also supported by<br />

means of the DiffServ Code Point (DSCP) classification.<br />

The CONFIDENTIAL encryption service is based on high grade encryption products from the CAPS<br />

approved encryptor list. This service will provide an encrypted IPv4 service, with the capability to permit<br />

tunnelling of IPv6, to CONFIDENTIAL for bandwidths to a maximum of 100Mbps.<br />

Encryption will be transparent, QoS will be fully supported. A management and key distribution<br />

VLAN network will be established in the Cassidian <strong>Service</strong> Operations Centre CSOC for the management<br />

of the encryptors and the distribution of keys to the encryptors, along with software/firmware


upgrades. The encryptors that are used to provide the service will be RED side connected to this<br />

management VLAN network by a separate management port, so that the encryptors can be keyed and<br />

configured remotely, whilst maintaining separation of management traffic from service traffic.<br />

The encryptors to be used are CESG certified to High Grade through the CAPS process, meeting the<br />

requirements for authentication and revocation using CESG approved IPSec profiles. Therefore these<br />

encryptors will comfortably meet the confidentiality and Integrity requirements for an CONFIDENTIAL<br />

service. The encryption service also runs across Common Criteria certified equipment’s as part of the<br />

connectivity service.<br />

Deployment Models<br />

To support the flexibility for the <strong>Service</strong> Consumer this service provides a number of scaled secure<br />

service delivery points (SSDPs). The following types of SSDPs are available for implementation.<br />

493<br />

100Mb HA-SSDP<br />

100Mb Non Critical (NC)-SSDP<br />

10Mb HA-SSDP<br />

10Mb NC-SSDP<br />

Each SSDP has the following technical functionality:<br />

Support to the <strong>Service</strong> Consumers LAN side routing<br />

Provision of boundary security enforcing functions (on both the encrypted and unencrypted<br />

SSDPs interface points<br />

Provision of a boundary monitored IDS function (optional)


494<br />

Centralised VPN community and VPN association management<br />

Centralised key generation and automated key distribution service<br />

QoS can be applied to the data-streams in line with the <strong>PSN</strong> Classes on behalf of the service<br />

consumer.<br />

All Quality of <strong>Service</strong> (QoS) markings will be fully supported and reflected in the IP header<br />

presented to the underpinning GCN network.<br />

Provision of a WAN side routing service<br />

Provision of a tunnel encryption service as required from a security gateway device.<br />

The availability of the SSDPs can be visualised on the Technical Customer Web Portal via a secure<br />

<strong>Service</strong> Consumers Interface.<br />

In addition to the SSDPs functionality the service also supports the configuration of a <strong>Service</strong><br />

Consumer encryption and routing hub(s) thus optimising bandwidth utilisation within the DNSP zone<br />

and (an optional) onward connectivity gateway to other external CONFIDENTIAL secure communities<br />

via the DNSP HA Gateway service.<br />

The following SSDP Extensions are available if required by the <strong>Service</strong> Consumer:<br />

The SSDP’s IDS capability can be enhanced to provide application level monitoring.<br />

Capacity and Performance Metrics<br />

Examples of the encryptors that are used to provide CONFIDENTIAL services are given as follows to<br />

illustrate the ability of the solution to meet the capacity requirements:


495<br />

ECTOCRYP ® Blue comes with 1000 Base SX/LX Optical Traffic Interface, LC Connectors and<br />

supports up to 900Mbps for 4kpackets and 500Mbps for an IMIX mixed traffic profile. Up to<br />

15,000 simultaneous security associations are supported.<br />

ECTOCRYP ® Small Form Factor (SFF) supports up to 80 Mbps for 4k packets and 10Mbps for an<br />

IMIX mixed traffic profile. Up to 256 simultaneous security associations are supported.<br />

As these encryptor appliances are based on multi-processor and multi-FPGA hardware, the latency<br />

introduced by the encryptors is of the order of 100µs. They introduce an encryption tunnel overhead of<br />

approximately 53 bytes regardless of packet size.<br />

Resilience<br />

To meet the availability requirement for the HA service at CONFIDENTIAL, HA routing nodes will be<br />

provided and the encryptor appliances will be configured in parallel pairs to offer in excess of 99.99%<br />

availability. The MTBF for ECTOCRYP ® Blue is 50,000 hours. The MTBF for ECTOCRYP ® SFF is 120,000<br />

hours. ECTOCRYP ® SFF will be available in April 2012, however in the interim; ECTOCRYP ® Blues will be<br />

used.<br />

Secure Remote Access (SRA)<br />

Technical Functionality<br />

The Cassidian SRA <strong>Service</strong> allows the <strong>Service</strong> Consumers to connect back to their host infrastructure<br />

via the Cassidian <strong>Service</strong> Operations Centre’s Gateway and their SSDP. The remote users establish<br />

validated and protected VPN tunnels back to the CSOCs which is then securely forwarded to the relevant<br />

<strong>Service</strong> Consumers SSDP.<br />

Deployment Models<br />

SRA has the following deployment models available for adoption by the <strong>Service</strong> Consumer:


496<br />

Access to PROTECT Networks – This <strong>Service</strong> is provided to connect to PROTECT level networks<br />

via remote clients and (pending the security target) mobile devices.<br />

Access to RESTRICTED Networks – This service is provide to connect to RESTRICTED level<br />

networks via remote clients<br />

RESTRICTED Gateway – This service is provided to connect from an PROTECT network access<br />

point to an RESTRICTED network via a remote client.<br />

The variation of the implementation in respect of each service level shall reflect the sensitivities and<br />

business criticality of the <strong>Service</strong> Consumer’s Information <strong>Service</strong> being protected.<br />

Security Model<br />

To achieve this connectivity the following technical and security aspects are provided:<br />

Two factor authentication following applicable CESG Good Practice Guides and UK HMG<br />

Information Assurance Standards<br />

TLS based secured connectivity within the session<br />

Role based access website<br />

Dedicated low impact client agents<br />

Integration into the <strong>Service</strong> Consumers existing LDAP or AD User directory<br />

On-line Client update service<br />

Certificate and Digital Identity Management <strong>Service</strong><br />

Cassidian currently provides a <strong>PSN</strong> compliant Certificate <strong>Service</strong> to support a number of different<br />

capabilities and functions for the <strong>Service</strong> Consumer:<br />

Organisational <strong><strong>Service</strong>s</strong><br />

o Issuing Organisational level Certificates to Sub-CA’s<br />

o Trust Anchors<br />

o Cross-signing<br />

o Trust Paths


497<br />

Consumer <strong><strong>Service</strong>s</strong><br />

Machine Based Certificate Authentication<br />

User<br />

o Authentication<br />

o Encryption<br />

o Signing<br />

<strong>Service</strong><br />

o Authentication<br />

o Encryption<br />

o Signing<br />

Messaging<br />

o Encryption<br />

o Signing<br />

This service is provides from the Cassidian <strong>Service</strong> Operations Centre’s (CSOC) and is made available<br />

to the relevant <strong>Service</strong> Consumer organisations via the <strong>PSN</strong>. This <strong>Service</strong> delivers the required Certificate<br />

Issuing Servers and Revocation Points at PROTECT, RESTRICTED and CONFIDENTIAL.<br />

Deployment Models<br />

Due to the nature of this service it will always be provided as a CSOC high availability hosted service<br />

for the Cassidian Trust Anchor(s). Where practicable, secure and efficient Cassidian may deploy Issuing<br />

CA’s to the <strong>Service</strong> Consumers site.<br />

Certificate Trust Path<br />

Cassidian will register all intermediate and subordinate CA’s with the relevant CESG Root CA (where<br />

available) and thereafter maintain this trust path to all <strong>Service</strong> Consumer and <strong>Service</strong> Offering CA’s<br />

within the Cassidian <strong>Service</strong> offering.<br />

Certificate Subscription Models<br />

Dependent upon the quality and security impact of the certificates being issued Cassidian support<br />

the following subscription methods:


498<br />

Manual request<br />

Electronic request with verification<br />

Auto-enrolment<br />

Each of these methods has a detail management and control policy associated with them.<br />

Certificate Storage<br />

Cassidian provides a secure key store for certificate recovery and a public x.500/LDAP based<br />

Directory <strong>Service</strong> for Certificate validation and revocation.<br />

Server Roles<br />

Cassidian supports the following server roles and functions:<br />

Policy CA<br />

Issuing CA (Basic, Medium and High Security instances)<br />

Intermediate CA<br />

Revocation<br />

Security Models<br />

The Cassidian certificate and identity management service has been designed and is implemented in<br />

accordance with the relevant <strong>PSN</strong> and CESG guidance and polices for these capabilities. Cassidian also<br />

provide the required level of proxy certificate capabilities to the cross-domain firewalls as required. This<br />

is achieved using the directory application firewall.<br />

<strong>Service</strong> Management Offering<br />

Security <strong>Service</strong> - Encryption<br />

The specialist Security Operations Centre (SOC), located within the CSOC provides remote key<br />

management and distribution services and remote supervision and management of all security endpoint<br />

and encryption devices. All Security Incident Management processes are delivered from the CSOC-SOC<br />

and accessed via the <strong>Service</strong> Consumer Web portal or via email.


Security <strong>Service</strong> – Secure Remote Access<br />

The Secure Remote Access service is delivered and hosted from the CSOC. <strong>Service</strong> Consumer Client<br />

software support is also available from the CSOC via the Consumer Portal or via email. The Client<br />

software will be distributed locally via CD or from the Consumer Portal. The service is initiated by the<br />

client software connecting to a dedicated web portal that will provide further authentication from the<br />

<strong>Service</strong> Consumer.<br />

Anti-Virus and Patch Update <strong>Service</strong><br />

Technical <strong>Service</strong> Offering<br />

The Cassidian Anti-virus (AV) and Patch update and review (PUR) <strong><strong>Service</strong>s</strong> provides the <strong>Service</strong><br />

Consumer with a complete end-point protection and review capability.<br />

Deployment Models<br />

The AV and PUR services are available in the following modes<br />

AV <strong>Service</strong><br />

499<br />

Fully Managed central service<br />

Fully Managed distributed service<br />

Distributed <strong>Service</strong> Consumer co-managed <strong>Service</strong><br />

Cassidian provides the <strong>Service</strong> Consumer either directly to the end-point or via an on-site<br />

distribution point, provided to improve network efficiencies, a fully managed AV client capability<br />

including and automatic signature and agent update service.<br />

The AV client capability is available for the following clients:<br />

Windows


500<br />

Linux<br />

MAC (OS-X)<br />

MS Exchange<br />

Cassidian provides near-real time signature and client agent updates from the CSOC either directly<br />

to the client or to a managed distribution point within the <strong>Service</strong> Consumers environment.<br />

Client Extensions<br />

Dependent upon the <strong>Service</strong> Grade selected the following additional features and capabilities are<br />

also available from this AV service:<br />

Additional AV Platforms<br />

o UNIX<br />

o Windows Mobile<br />

o MS SharePoint<br />

o Network Storage<br />

o Virtual Machine Environments<br />

Client Web Protection – This is the client-side capability delivering the same controls as defined<br />

within the Secure Web Gateway <strong>Service</strong> within the Internet <strong><strong>Service</strong>s</strong> Section. This capability<br />

integrates will all main client web browsers<br />

Device Network Access Control<br />

o Detect and fix managed endpoint vulnerabilities.<br />

o Make sure guest computers match your security requirements before they access your<br />

network.<br />

o Prevent unauthorised computers from accessing the network<br />

o Interoperates with the main 802.1x NAC implementations to provide a complete service<br />

offering.<br />

Policy based Client firewall<br />

Application Control – This provides client side white and black listing capabilities.<br />

Data Loss Prevention Agent<br />

Device Control – Find and block the unauthorised use of removable storage devices, optical<br />

media drives and wireless networking protocols (e.g., Wi-Fi, Bluetooth and infrared)<br />

Control and Management<br />

All of the above capabilities are managed via policies thus providing highly granular configurability,<br />

monitoring and reporting capabilities. These policy based capabilities are fully controlled by Cassidian


for the <strong>Service</strong> Consumer or in partnership with the <strong>Service</strong> Consumer via a shared Central Console<br />

capability.<br />

Reporting and Alerting<br />

All aspects of this AV service provide the <strong>Service</strong> Consumer with a real-time status via the Cassidian<br />

Customer Web Portal and can generate routine and exception reports as required for internal<br />

compliancy and incident management activities.<br />

<strong>Service</strong>.<br />

This service is also full compatible with the Cassidian Computer and Network Defence (CCND)<br />

PUR <strong>Service</strong><br />

The Cassidian PUR <strong>Service</strong> contains two discrete but interconnected capabilities:<br />

501<br />

Patch Update and Distribution<br />

Patch Review <strong>Service</strong><br />

Patch Update and Distribution Capability<br />

This service capability provides the <strong>Service</strong> Consumer with an ‘in domain’ near-real time<br />

authoritative update and distribution service for all patches within the Windows OS, Server and Client<br />

Application suites. The master service is located within the CSOC and provides the following distribution<br />

and subscription models:<br />

Selective replication to a local authorising distribution server<br />

Selective replication to a <strong>Service</strong> Consumers distribution Server<br />

Direct update of subscribing clients


Cassidian works with the <strong>Service</strong> Consumer to identify the required patching profile and either<br />

distribute these to their distribution server or maintains and authorising distribution and reporting<br />

server on the <strong>Service</strong> Consumer’s behalf. In the latter instance this server will be located based upon the<br />

most efficient and effective bandwidth and administration model.<br />

Patch Review Capability<br />

The Patch review is a provided as an extension to the AV <strong>Service</strong> (it is dependent upon the client)<br />

and monitors the current status of the <strong>Service</strong> Consumers patching status based upon the current and<br />

active threats detected on the Internet. It will identify the current <strong>Service</strong> Consumer’s vulnerabilities due<br />

to the clients current patch status. This is achieved via the following functions:<br />

502<br />

Scan finds unpatched computers vulnerable to threats<br />

Scans for Windows and other common application patches<br />

Prioritise patches based on threats and likelihood of exploit<br />

Identify computers missing critical patches<br />

Sort by patch vendor, threat and priority<br />

This status is reported either via the Cassidian Customer Web Portal or via the distributed console<br />

dependent upon the service model adopted within the AV <strong>Service</strong>.<br />

<strong>Service</strong> Management Offering<br />

The Anti-Virus update and Patching <strong><strong>Service</strong>s</strong> are provided from the CSOC and accessed via a<br />

dedicated link from the <strong>Service</strong> Consumer Portal. The service is available fully managed or co-managed<br />

and delivery of the service is direct to the client from a central point or to a locally placed server for<br />

further distribution to the client.


A patching deployment review will be undertaken to determine which patches will be deployed and<br />

deployment groups will be defined according to user role or platform type/version to enable targeted<br />

deployments.<br />

Reports detailing latest virus definition availability and critical patch recommendations form part of<br />

the service and are available from the <strong>Service</strong> Consumer Portal.<br />

Firewall<br />

Technical <strong>Service</strong> Offering<br />

Cassidian provides a suite of firewall capabilities within this <strong>Service</strong> offering. These service<br />

capabilities are described in two capability families:<br />

503<br />

Network Level Firewall <strong>Service</strong> (NLFS) – Within the NLFS Cassidian use either CEGS or Common<br />

Criteria (CC) approved appliances to augment this fully managed service capability<br />

Application Level Firewall <strong><strong>Service</strong>s</strong> (ALFS) – Within the ALFS Cassidian use application,<br />

releasability and payload inspection modules within an NLFS cradle to deliver this service.<br />

All NLFS capabilities support the following level of inspection:<br />

Purpose-built, high performance platforms deliver WAN connectivity and security, plus the<br />

muscle to protect the high-speed LAN against internal network and application-level attacks<br />

while simultaneously stopping content-based attacks.<br />

Shared Management through role based graphical Web UI central management system which is<br />

accessed via the Cassidian Customer Web Portal.<br />

Policy-based management to allow centralised, end-to-end life-cycle management.


The selection and combinations of both the NLFS and ALFS will be mainly dictated by the security<br />

domain and interworking requirements of the <strong>Service</strong> Consumers organisation. Using the combination<br />

of these two capabilities Cassidian can provide the following fully managed firewall services:<br />

504<br />

Port and Protocol Firewalls<br />

Messaging Firewalls – IPM and IOM<br />

Web and File Transfer (HTTP(S) and FTP) Firewalls<br />

Fixed Format Firewalls<br />

XML Firewall<br />

Directory Application Firewall<br />

Chat Application Firewall<br />

Deployment Models<br />

Cassidian supports the following implementation and deployment models for these service<br />

capabilities:<br />

Hosted <strong>Service</strong> within the Cassidian CSOC environment<br />

Remotely Managed <strong>Service</strong> deployed within the <strong>Service</strong> Consumers environment.<br />

Cassidian has designed the firewall service to be deployed either at the <strong>Service</strong> Consumers<br />

organisational edge with the <strong>PSN</strong> (e.g. at the point of ingress and egress with the DNSP) or at the <strong>Service</strong><br />

Consumers security boundary (e.g. between different security domains within the <strong>Service</strong> Consumers<br />

organisation.). All NLFS capabilities have an high availability mode<br />

Security Models<br />

For this particular <strong>Service</strong>, especially in an inter-domain configuration, Cassidian will work closely<br />

with the <strong>Service</strong> Consumer, Pan <strong>Government</strong> Accreditor and CESG to finalise the security design at<br />

RESTRICTED and CONFIDENTIAL. At PROTECT Cassidian has a standardised deployment model that


ensures the firewall elements are integrated in a secured environment with secure management,<br />

quarantined and administration interfaces. For the <strong>Service</strong> Consumer in a shared administration<br />

implementation the administration interface will be access via either a dedicated management terminal<br />

or the Cassidian secure Customer Web Portal.<br />

Exemplar Functionality<br />

As Cassidian has a number of different appliances available within this service from multiple vendors<br />

the following section describes representative examples of the available capability.<br />

Network Level Firewall <strong>Service</strong><br />

The Cassidian Network Level Firewall <strong>Service</strong> provides a number of enhanced level capabilities which<br />

can augment the conventional firewall approach. These include such capability enhancements as:<br />

505<br />

Comprehensive set of Unified Threat Management (UTM) security features including stateful<br />

firewall,<br />

PEPAS approved IPSec VPN,<br />

Intrusion Prevention Sensor (IPS),<br />

Network level antivirus (anti-spyware, anti-phishing, anti-adware), anti-spam, and Web filtering.<br />

Proven firewall security with integrated routing and a variety of LAN/WAN interface options<br />

provide the ability to consolidate devices and reduce IT expenditures.<br />

Application Level Firewall <strong>Service</strong><br />

The following provides two examples of the available Cassidian ALFS which can be deployed to<br />

support the <strong>Service</strong> Consumer.<br />

Web Application Firewall<br />

The Web Application Firewall scans all HTTP and HTTPS traffic and analyses it for both malware and<br />

inappropriate content. This includes inspection and alerting for all certificates that appear suspicious.<br />

Organisational Acceptable Use Policies


This capability allows the <strong>Service</strong> Consumer Organisation to set a comprehensive usage policy based<br />

upon a number of defining criteria:<br />

506<br />

A list of users, computers and/or groups to whom the policy applies<br />

A list of URL category and application filtering rules<br />

Destination site reputation risk analysis<br />

Malware scanning including real-time Javas emulation and analysis<br />

Enhances zero-day attack detection rates<br />

File type definitions and analysis<br />

Data loss mitigation<br />

Additional options that affect the user’s browsing experience.<br />

Advanced Detection Techniques<br />

The Web <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced technologies<br />

and techniques that have been designed to help reduce and mitigate the threats from:<br />

Anonomyzing Proxies detection – attack vectors launched from behind a proxy service<br />

Anonymous Call Home detection – Detects and identifies machine making unexpected or<br />

authorised web connections<br />

Deployment and Management<br />

This service can be deployed as either a physical or virtual appliance at a <strong>Service</strong> Consumers location<br />

or accessed from the CSOC. Irrespective of the deployment configuration this service will receive near<br />

real-time signature updates and ‘bad site lists’ from the CSOC over the <strong>PSN</strong> within the relevant security<br />

domain.


Cassidian will manage these gateways from the CSOC for the <strong>Service</strong> Consumer and can provide<br />

both shared view and shared management via role based delegation thus optimising the usability and<br />

responsiveness of this service within the approved implementation security parameters.<br />

Secure e-Mail Application Level Firewall<br />

The e-Mail <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced<br />

technologies and techniques that have been designed to help reduce and mitigate the threats from:<br />

507<br />

Pre-defined sensitive data types<br />

Automatic data protection Prevent the accidental or malicious loss of sensitive data.<br />

Protects sensitive data with automatic email encryption<br />

Reduces the risk of data loss with pre-packaged Data Loss Prevention (DLP) definitions<br />

Blocks known and zero-day threats with the built in AV engine<br />

Anti-spam management and mitigation<br />

Advanced Detection Techniques<br />

The e-Mail <strong>Service</strong> Gateway provides the <strong>Service</strong> Consumer with a number of enhanced<br />

technologies and techniques that have been designed to help reduce and mitigate the threats from:<br />

SPAM Campaigns – Eliminate over 99% of spam with Sender Genotype Technology and Live<br />

Anti-Spam real-time updates<br />

Proactively protect against evolving threats including viruses, phishing, and malware with<br />

Behavioural Genotype technology<br />

Deployment and Management<br />

This service can be deployed as either a physical or virtual appliance at a <strong>Service</strong> Consumer’s<br />

location or accessed from the CSOC. Irrespective of the deployment configuration this service will<br />

receive near real-time signature updates and ‘bad site lists’ from the CSOC over the <strong>PSN</strong> within the<br />

relevant security domain.


Cassidian will manage these gateways from the CSOC for the <strong>Service</strong> Consumer and can provide<br />

both shared view and shared management via role based delegation thus optimising the usability and<br />

responsiveness of this service within the approved implementation security parameters.<br />

Enhanced Capabilities<br />

These firewall services are fully interoperable and can be fully integrated with the Cassidian<br />

Computer Network Defence <strong>Service</strong>, further enhancing the security detection for the <strong>Service</strong> Consumer.<br />

This gateway is fully interoperable with the Cassidian HIDS and Anti-Virus <strong>Service</strong>; when integrated<br />

this service will combine to provide fully protection and control of remote users when suitable<br />

connected (e.g. via the Cassidian Secure Remote Access <strong>Service</strong>).<br />

<strong>Service</strong> Management Offering<br />

The specialist Security Operations Centre (SOC), located within the CSOC provides this service<br />

including remote supervision and management of all infrastructure elements that underpin the service.<br />

All Security Incident Management processes are delivered from the CSOC-SOC and accessed via the<br />

<strong>Service</strong> Consumer Web portal or via email.<br />

Intrusion and Spyware Detection <strong><strong>Service</strong>s</strong><br />

Technical <strong>Service</strong> Offering<br />

Cassidian provides the <strong>Service</strong> Consumer with an Intrusion and Spyware Detection <strong>Service</strong> in the<br />

form of the Cassidian Computer and Network Defence <strong>Service</strong> (CCND). This service provides threat<br />

detection, incident response and compliance services across the managed <strong>Service</strong> Consumer estate and<br />

includes additional optional defence enhancements as required by the <strong>Service</strong> Consumer.<br />

508


The CCND <strong>Service</strong> automates the collection, analysis, assessment, response and archiving of security<br />

related events in the customer’s ICT estate. It provides the <strong>Service</strong> Consumer with a reliable, central<br />

monitoring and escalation/response service, comprising a mixture of automated processing and expert<br />

analyst support, based at the Cassidian Security Operations Centres. It provides the foundation on which<br />

to build a coherent and responsive security compliance regime for all <strong>Service</strong> Consumers.<br />

The CCND core service provides the following capabilities to the <strong>Service</strong> Consumer:<br />

509<br />

Collection, filtering, normalisation and reporting of security events generated by network,<br />

server, workstation and security devices in a complex heterogeneous environment.<br />

Integration of event collection from a multitude of existing 3 rd party and legacy infrastructure<br />

devices through a combination of custom collection agents and standard interfaces such as<br />

Syslog or Microsoft WMI interface.<br />

Incident analysis and management by the Cassidian Secure Operation Centres through near realtime<br />

event correlation to group seemingly different individual events into valuable threat<br />

intelligence. This enables focused use of resources to respond to serious issues in a timely<br />

fashion.<br />

Reports based on key incident metrics to facilitate the visualisation and tuning of security<br />

policies and procedures.<br />

An archive of data for subsequent post incident re-analysis.<br />

The CCND optional enhancement services provide the following optional integrated security<br />

measures with integrated policy compliance reporting:<br />

Custom Log Retention


510<br />

Network Intrusion Detection <strong><strong>Service</strong>s</strong> (NIDS)<br />

Host Intrusion Detection <strong><strong>Service</strong>s</strong> (HIDS)<br />

Endpoint Device Control<br />

Endpoint Data Control<br />

Endpoint Web Filtering<br />

Endpoint Application White-Listing<br />

Endpoint Application Black-Listing<br />

Endpoint Firewall <strong><strong>Service</strong>s</strong><br />

Endpoint Patch Assessment<br />

Deployment Models<br />

The Cassidian CND service is based on a modular, scalable and flexible architecture. Both the core<br />

components and the optional enhancements can be deployed as a dedicated instance at the <strong>Service</strong><br />

Consumer premises, as part of a Managed Security <strong>Service</strong> Provider (MSSP) shared infrastructure service<br />

or as a hybrid deployment which enables <strong>Service</strong> Consumers to leverage key benefits of both<br />

approaches.<br />

At the centre, the CCND framework and the supporting optional services are based around four core<br />

technology components:<br />

Collectors<br />

Aggregators<br />

Correlators<br />

Threat Analysis Engine<br />

Each of these core technologies are available to the <strong>Service</strong> Consumer with the following<br />

deployment models:


511<br />

Full Central Managed <strong>Service</strong> delivery<br />

Local Instance – deployment of a local instance of the service(s) with a centralised management<br />

function<br />

Design and delivery of a fully distributed service deployment to support a multi-site instance<br />

with centralised and shared service management model.<br />

All service capabilities can be delivered as a high availability capability to support the required<br />

service availability.<br />

Core <strong>Service</strong> Capabilities<br />

Collectors<br />

The collectors act as the point of entry for events into the CCND framework. Collectors can either be<br />

agent-based or agent-less in the form of a remote appliance. The collectors are capable of supporting a<br />

wide range of third party products and additionally support a number of industry standard reporting<br />

formats as well as a configurable universal log collector.<br />

Aggregators<br />

The aggregators take feeds of information from multiple collectors, normalise the events into a<br />

standard schema, perform de-duplication and rule based filtering before forwarding to the correlation<br />

engines.<br />

Correlator<br />

The correlation engines used in the CCND framework group seemingly different individual events<br />

into potential incidents based on a combination of rules and priority based correlation.<br />

Threat Analysis Engine


Once a potential incident has been identified it is passed to the CCND threat analysis engine where<br />

the incident is examined, categorised and authenticated by a CCND analyst and the incident<br />

management chain is invoked.<br />

By combining these four technology components as either role based nodes, dedicated nodes or as<br />

a combination of multi-functional nodes, the CCND service shall be able to be deployed intelligently and<br />

subsequently grow and scale in line with the requirements of the <strong>Service</strong> Consumers network.<br />

<strong>Service</strong> Functionality and Scope<br />

The CCND <strong>Service</strong> provides the <strong>Service</strong> Consumer with a fully managed solution that will<br />

continuously and proactively monitor and detect anomalous behaviour across all monitored devices.<br />

This service provides the <strong>Service</strong> Consumer with the following capabilities:<br />

512<br />

Collection, normalisation and aggregation of security event data from a wide range of data<br />

feeds;<br />

System tuning to minimise false positive alerts thus providing most accurate threat picture;<br />

Identification, analysis and alerting of key security events;<br />

Incident management and handling inline with <strong>Service</strong> Consumer policies and industry best<br />

practises;<br />

Correlation against known asset profiles, vulnerabilities and other specialist threat intelligence<br />

such as the Cassidian operated Warning Advice and Reporting Portal (WARP);<br />

Near real-time alerting on the status and usage of any monitored IT component against a<br />

defined security policy;<br />

Provide data in support of the Compliancy and Security Audit process;<br />

Identify unauthorised change of any monitored device;<br />

Provide analysis reports over specific time periods to identify trend based threats;<br />

Reporting of key security metrics, capacity and performance tuning in-line with <strong>Service</strong><br />

Consumer requirements;<br />

Provide Anomalous behaviour detection;


513<br />

Provide the <strong>Service</strong> Consumer with security visibility across the estate via a managed customer<br />

portal;<br />

The CCND service is also capable of interfacing with a number of external systems. Alerting and<br />

notifications services in the form of SNMP, SMTP, Syslog or pager notifications allow for rule based and<br />

schedule based automated incident notification and escalation chains and a published API enables<br />

bidirectional communication with supported service desk products.<br />

This functionality enables the CCND service to be integrated with either a 3 rd party service supplier<br />

or 3 rd party system and allows for flexible interoperability.<br />

Optional Additional Security <strong><strong>Service</strong>s</strong><br />

Optional enhancement services are also available as part of the CCND service. These additional<br />

services enable additional levels of protection, detection and compliance reporting to provide a full<br />

defence in depth offering.<br />

Custom Log Retention<br />

Event data can also be archived in a searchable format for forensic purposes or regulatory<br />

compliance and subsequently stored either within a secured managed storage service deployed onsite<br />

or located on a SAN/NAS as identified within 0.<br />

The data can also be filtered for specific types of record prior to storage which may also be retained<br />

separately dependant on the <strong>Service</strong> Consumer requirements.


Network Intrusion Detection <strong>Service</strong><br />

The Network Intrusion Detection <strong>Service</strong> (NIDS) shall provide the <strong>Service</strong> Consumer with the<br />

functionality to detect threats and alert at key deployment points around the estate such as at network<br />

boundaries or on critical network segments.<br />

The NIDS shall be capable of supporting Span, Tap, In-line fail-open and In-line fail-closed<br />

deployment modes. Sensors are available with a variety of port densities and throughput capabilities<br />

from 10Mb Ethernet through to 10Gb Fibre connections and are fully capable of supporting high<br />

availability configurations.<br />

This service provides the <strong>Service</strong> Consumer with the following additional capabilities:<br />

514<br />

Detection, analysis and reporting of actual security events at key network entry points or critical<br />

network segments;<br />

Detection, analysis and reporting of attempted malicious activity occurring on the <strong>Service</strong><br />

Consumer network;<br />

Detected events shall then be fed into the CCND core framework and will contribute further to<br />

the overall security picture of the <strong>Service</strong> Consumer estate;<br />

Provide the <strong>Service</strong> Consumer with the optional functionality to prevent specific attacks and<br />

alter their security stance to a pro-active blocking mode (This is dependant on sensors being<br />

deployed in-line NIDS devices are deployed inline and based on <strong>Service</strong> Consumer<br />

requirements);<br />

Option for Cassidian to provide and deploy custom written signatures to detect targeted threats<br />

specific to the <strong>Service</strong> Consumer;<br />

The NIDS is also available as a stand alone service and is not dependant on the CCND framework in<br />

order to operate as a Network Intrusion Detection System. In the case of a stand alone service, the NIDS


system can be configured to provide a feed of events into a 3 rd party SIEM system or network<br />

monitoring tool.<br />

Host Intrusion Detection <strong>Service</strong><br />

The CCND Host Intrusion Detection <strong>Service</strong> (HIDS) is available on the Microsoft Windows platform<br />

and shall provide the <strong>Service</strong> Consumer with an additional layer of defence against known and unknown<br />

malware threats.<br />

This service shall provide the <strong>Service</strong> Consumer with the following additional capabilities:<br />

515<br />

Detection, analysis and reporting of host based security events across the <strong>Service</strong> Consumer<br />

Microsoft Windows estate;<br />

Pre-execution, behavioural and buffer overflow analysis to identify suspicious behaviour and<br />

minimise threats from new unidentified malware variants;<br />

Detected events shall then be fed into the CCND core framework and will contribute further to<br />

the overall security picture of the <strong>Service</strong> Consumer estate;<br />

Provide the <strong>Service</strong> Consumer with the optional functionality to prevent specific attacks and<br />

alter their security stance to a pro-active blocking mode;<br />

Option for Cassidian to define, provide and deploy custom policies specific to the <strong>Service</strong><br />

Consumers requirements;<br />

This service is supplied as an optional feature enhancement of our standard Antivirus service<br />

offering, however, this service is not reliant on the CCND service and can be offered as a separate layer<br />

of defence to the Cassidian antivirus service.<br />

Endpoint Device Control<br />

The CCND Endpoint Device Control enhancement shall provide the <strong>Service</strong> Consumer with the ability<br />

to enforce policies governing the use of specific hardware devices on Microsoft Windows endpoints.


This service shall provide the <strong>Service</strong> Consumer with the following additional capabilities:<br />

516<br />

Detection and reporting of the use of controlled devices across the <strong>Service</strong> Consumer Microsoft<br />

Windows estate;<br />

Controlled access to removable storage devices, optical media drives and wireless networking<br />

protocols;<br />

Meet key requirements of data protection policies;<br />

Minimise the impact of malware spreading via the use of unauthorised removable devices<br />

Detected events shall then be fed into the CCND core framework and will contribute further to<br />

the overall security picture of the <strong>Service</strong> Consumer estate;<br />

Option for Cassidian to define, provide and deploy custom policies specific to the <strong>Service</strong><br />

Consumers requirements;<br />

This service is supplied as an optional feature enhancement of our standard Antivirus service<br />

offering, however, this service is not reliant on the CCND service and can be offered as a separate layer<br />

of defence to the Cassidian antivirus service.<br />

Endpoint Data Control<br />

CCND Endpoint Data Control shall enable the <strong>Service</strong> Consumer to control the flow of sensitive data<br />

through a combination of pre-defined definitions and custom built policies.<br />

This service shall provide the <strong>Service</strong> Consumer with the following additional capabilities:<br />

Monitor and report of the movement of sensitive data across commonly used office formats as<br />

well as a wide range of other standard file formats;<br />

Monitor for predefined data types such as financial or personally identifiable data;


517<br />

Meet key requirements of data protection policies;<br />

Prevent the intentional or unintentional copying of data with a combination of blocking or<br />

alerting policies;<br />

Detected events shall then be fed into the CCND core framework and will contribute further to<br />

the overall security picture of the <strong>Service</strong> Consumer estate;<br />

Option for Cassidian to define, provide and deploy custom policies specific to the <strong>Service</strong><br />

Consumers requirements;<br />

This service is supplied as an optional feature enhancement of our standard Antivirus service<br />

offering, however, this service is not reliant on the CCND service and can be offered as a separate layer<br />

of defence to the Cassidian antivirus service.<br />

Endpoint Web Filtering<br />

CCND Endpoint Web Filtering is not intended to replace a gateway deployed web filtering solution<br />

but rather provides a ‘defence-in-depth’ approach to the problem.<br />

This service shall provide the <strong>Service</strong> Consumer with the following additional capabilities:<br />

Monitor, report and filter access to URL’s based on a feed of known malicious websites;<br />

Minimise the impact of new malware threats and reduce the effectiveness of unknown and new<br />

exploits specifically targeting common internet browser packages;<br />

Enforce essential policy compliance by controlling access to a selection of predefined categories<br />

of website such as adult sites or gambling;<br />

Detected events shall then be fed into the CCND core framework and will contribute further to<br />

the overall security picture of the <strong>Service</strong> Consumer estate;<br />

Option for Cassidian to define, provide and deploy custom policies specific to the <strong>Service</strong><br />

Consumers requirements;


This service is supplied as an optional feature enhancement of our standard Antivirus service<br />

offering, however, this service is not reliant on the CCND service and can be offered as a separate layer<br />

of defence to the Cassidian antivirus service.<br />

Endpoint Application White-Listing or Black-Listing<br />

With this service Cassidian shall be able to prevent or allow the use of specific applications as<br />

required by the <strong>Service</strong> Consumer.<br />

This service shall provide the <strong>Service</strong> Consumer with the following additional capabilities:<br />

518<br />

Define and enforce the use of standardised applications such as web browsers across the estate;<br />

Control use across the entire user community or simply enforce to specific groups as defined by<br />

the <strong>Service</strong> Consumer requirements;<br />

The <strong>Service</strong> Consumer shall additionally receive reports identifying the use of unwanted or<br />

unauthorised applications as part of this service;<br />

Detected events shall then be fed into the CCND core framework and will contribute further to<br />

the overall security picture of the <strong>Service</strong> Consumer estate;<br />

Option for Cassidian to define, provide and deploy custom policies specific to the <strong>Service</strong><br />

Consumers requirements;<br />

This service is supplied as an optional feature enhancement of our standard Antivirus service<br />

offering, however, this service is not reliant on the CCND service and can be offered as a separate layer<br />

of defence to the Cassidian antivirus service.<br />

Endpoint Firewall <strong><strong>Service</strong>s</strong><br />

The CCND Endpoint Firewall service offers the <strong>Service</strong> Consumer a fully managed client firewall<br />

service.


This service shall provide the <strong>Service</strong> Consumer with the following additional capabilities:<br />

519<br />

A fully managed endpoint firewall solution;<br />

Cassidian shall work with the <strong>Service</strong> Consumer to define an appropriate set of client firewall<br />

rules which shall reduce the available attack points for Internet Worms, hackers and other types<br />

of intrusion;<br />

Additional protection capability to reduce the threat of application hijacking and impersonation<br />

attacks.<br />

Block transmission of certain protocols which may be undesirable or in direction contravention<br />

of the security policy;<br />

The service shall be location aware and shall provide suitable functionality to keep remote<br />

computers or ‘Road Warriors’ protected either in the office or out of the office.<br />

Detected events shall then be fed into the CCND core framework and will contribute further to<br />

the overall security picture of the <strong>Service</strong> Consumer estate;<br />

This service is supplied as an optional feature enhancement of our standard Antivirus service<br />

offering, however, this service is not reliant on the CCND service and can be offered as a separate layer<br />

of defence to the Cassidian antivirus service.<br />

Endpoint Patch Assessment<br />

Cassidian shall supply the <strong>Service</strong> Consumer with a service to identify and locate assets which are<br />

unpatched to specific security threats, as identified through the CCND service.<br />

This service shall provide the <strong>Service</strong> Consumer with the following additional capabilities:<br />

Reporting on the patch status of assets as identified during incident investigations;


520<br />

Patches reported shall include Microsoft Windows, common application patches (Such as web<br />

browser or common office productivity patches) and other 3 rd party vendor patches;<br />

Reports shall prioritise missing patches based on real-world intelligence and the likelihood of<br />

exploit to ensure remediation efforts can be suitably targeted;<br />

This service is supplied as an optional feature enhancement of our standard Antivirus service<br />

offering, however, this service is not reliant on the CCND service and can be offered as a separate layer<br />

of defence to the Cassidian antivirus service.<br />

Security Aspects of the <strong>Service</strong><br />

The service incorporates the following security aspects;<br />

All core functional components of the CCND service include authentication, role-based access<br />

control and multi-domain organisation capabilities. These are implemented in a directory<br />

structure to allow easy federation of multiple systems with multi-level granular access controls;<br />

All events are time-stamped on entry into the CCND service based on a Cassidian supplied <strong>PSN</strong><br />

compliant time source which allows for accurate correlation and forensic analysis;<br />

Product selection has been based on a combination of factors. These include the suitability for<br />

deployment, current/past/future accreditation/certification awards (Such as CAPS or Common<br />

Criteria) and their existing use on UK government and UK military networks at equivalent<br />

classifications;<br />

All management communications shall utilise encrypted protocols between components;<br />

All <strong>Service</strong> Consumer event data will be encrypted once the event data has been received into<br />

the CCND framework.<br />

Event data that is archived and stored by the CCND core system for forensic purposes or<br />

regulatory compliance shall be encrypted and digitally signed to provide confidentiality and<br />

integrity of the event archives.<br />

All products which make up the CCND service framework shall be installed, configured and<br />

operated based on the vendor advised security best practices.<br />

All updates for the components of the CCND service framework issued from the CSOC shall be<br />

deployed from a secure repository hosted in the CSOC. These will only be issued following<br />

completion of an approved test and release procedure and will include signature files, software<br />

patches, and major upgrades;


<strong>Service</strong> Management Offering<br />

The specialist Security Operations Centre (SOC), located within the CSOC at Newport and the ASOC<br />

(Alternative Security Operations Centre) at Cheltenham provide this service including remote<br />

supervision and management of all infrastructure elements and security endpoints that underpin the<br />

service. All Security Incident Management processes are delivered from the CSOC-SOC and accessed via<br />

the <strong>Service</strong> Consumer Web portal or via email.<br />

Authentication and Access Control<br />

Technical <strong>Service</strong> Offering<br />

The Cassidian authentication and access management service has a number of discreet but<br />

complimentary capabilities. These capabilities support the following Authentication and Access<br />

Management requirements:<br />

521<br />

Authentication Capabilities<br />

o Machine Based<br />

� Certificate Based Authentication<br />

o User Based<br />

� Smartcard Authentication<br />

� Secondary Authentication – Certificate<br />

� Authenticating Directory <strong>Service</strong> (DS)<br />

DAP<br />

LDAP<br />

SLDAP<br />

Kerberos<br />

o <strong>Service</strong> Based<br />

� Certificate <strong>Service</strong><br />

� Authenticating DS<br />

Access Management Capabilities<br />

o Machine Based<br />

� Network Access Control (NAC)<br />

� Host Network Access Control (H-NAC)<br />

o User and <strong>Service</strong> Based<br />

o Role Management<br />

o Profile Management


Deployment Models<br />

For these service capabilities Cassidian provides a High Availability option for all Authentication<br />

<strong><strong>Service</strong>s</strong> and User/<strong>Service</strong> Access Control <strong><strong>Service</strong>s</strong> with auto fail-over option for all other Access Control<br />

capabilities.<br />

Due to the nature of these service capabilities distributed models are available to ensure integrity<br />

and availability with the <strong>Service</strong> Consumer having limited delegated rights as required by the <strong>PSN</strong><br />

derived Security Architecture.<br />

Security Models<br />

Due to the nature of this service offering all aspects of this service are under the most stringent<br />

configuration and change control with a target security architecture internally defined as that required<br />

for IL5. Thus any access and delegation will be fully logged to provide an audit trail.<br />

Certificate Authentication <strong>Service</strong> Capabilities<br />

Cassidian currently provides a <strong>PSN</strong> compliant Certificate <strong>Service</strong> to support a number of different<br />

capabilities and functions for the <strong>Service</strong> Consumer:<br />

522<br />

Organisational <strong><strong>Service</strong>s</strong><br />

o Issuing Organisational level Certificates to Sub-CA’s<br />

o Trust Anchors<br />

o Cross-signing<br />

o Trust Paths<br />

Consumer <strong><strong>Service</strong>s</strong><br />

Machine Based Certificate Authentication<br />

User<br />

o Authentication<br />

o Encryption<br />

o Signing


523<br />

<strong>Service</strong><br />

o Authentication<br />

o Encryption<br />

o Signing<br />

Messaging<br />

o Encryption<br />

o Signing<br />

This service is provided from the Cassidian <strong>Service</strong> Operations Centres (CSOC) and is made available<br />

to the relevant <strong>Service</strong> Consumer organisations via the <strong>PSN</strong>. This <strong>Service</strong> delivers the required Certificate<br />

Issuing Servers and Revocation Points at PROTECT, RESTRICTED and CONFIDENTIAL.<br />

Deployment Models<br />

Due to the nature of this service it will always be provided as a CSOC high availability hosted service<br />

for the Cassidian Trust Anchor(s). Where practicable, secure and efficient Cassidian may deploy Issuing<br />

CA’s to the <strong>Service</strong> Consumers site.<br />

Certificate Trust Path<br />

Cassidian will register all intermediate and subordinate CA’s with the relevant CESG Root CA (where<br />

available) and thereafter maintain this trust path to all <strong>Service</strong> Consumer and <strong>Service</strong> Offering CA’s<br />

within the Cassidian <strong>Service</strong> offering.<br />

Certificate Subscription Models<br />

Dependent upon the quality and security impact of the certificates being issued Cassidian support<br />

the following subscription methods:<br />

Manual request<br />

Electronic request with verification<br />

Auto-enrolment


Each of these methods has a detail management and control policy associated with them.<br />

Certificate Storage<br />

Cassidian provides a secure key store for certificate recovery and a public x.500/LDAP based<br />

Federated Directory <strong>Service</strong> for Certificate validation and revocation.<br />

Server Roles<br />

Cassidian supports the following server roles and functions:<br />

524<br />

Policy CA<br />

Issuing CA (Basic, Medium and High Security instances)<br />

Intermediate CA<br />

Revocation<br />

Security Models<br />

The Cassidian certificate and identity management service has been designed and is implemented in<br />

accordance with the relevant <strong>PSN</strong> and CESG guidance and polices for these capabilities. The relevant<br />

guidance includes the <strong>PSN</strong> Cryptographic Framework, <strong>PSN</strong> Technical Domain Description, CESG Manual T<br />

and HMG IS7.<br />

Cassidian also provide the required level of proxy certificate capabilities to the cross-domain<br />

firewalls as required. This is achieved using the directory application firewall.<br />

Network Access Control<br />

For a mobile workforce, alternative security mechanisms are possible and recommended, although<br />

they do have reliance on other applications areas including having a suitable Authentication,<br />

Authorisation and Accounting (AAA) systems in place. The security capabilities in the Cassidian solution<br />

enables checking of user identification within their own host information infrastructure (through the<br />

Cassidian Directory <strong>Service</strong>) and device compliancy before allowing further access onto the network.


This holds user devices away at the first point of entry to provide maximum security from rogue<br />

devices, or devices that may contain malware. Additionally users can be constrained to the parts of the<br />

network that they are intended to access providing a network level barrier to unauthorised actions.<br />

The Cassidian NAC solution shall enable such advanced security services, and is compliant with<br />

802.1x protocol for port based network security. This approach to securing the network also enables<br />

role based access, with all users from guests through to system administrators being provided with the<br />

appropriate levels of access<br />

Host Network Access Control<br />

This can be delivered either as a discreet service capability or be used to extend the NAC above to<br />

provide a more complete service. The H-NAC provides the following additional capabilities:<br />

525<br />

Detect and fix managed endpoint vulnerabilities.<br />

Make sure guest computers match your security requirements before they access your network.<br />

Prevent unauthorised computers from accessing the network<br />

Interoperates with the main 802.1x NAC implementations to provide a complete service<br />

offering.<br />

Authenticating Directory <strong><strong>Service</strong>s</strong><br />

The Cassidian Directory <strong>Service</strong> provides the <strong>Service</strong> Consumer with the ability via a single repository<br />

to store all of the relevant User and <strong>Service</strong> credentials required to support authentication, and rights<br />

management for any given application or data repository. Dependent upon the <strong>Service</strong> Consumers<br />

existing infrastructure capabilities Cassidian has the following capabilities available:


526<br />

Organisational Single Instance DS<br />

Organisational Distributed DS<br />

Federating DS<br />

This service has a two Tier model thus allowing the <strong>Service</strong> Consumer to maintain their security<br />

boundaries whilst still maintaining interoperability and interworking with other <strong>PSN</strong> DS’s or service<br />

provided via other means.<br />

Tier 1 – Federating DS<br />

The Federating DS Tier is provided to ensure that all <strong>PSN</strong> subscribers within the Cassidian Sphere<br />

and via other providers have a reciprocal service that is capable of sharing their ‘contact’ information in<br />

a secure and meaningful way.<br />

This DS is based upon a x.500 architecture and has been designed for scalability, resilience and<br />

security. Within this DS Cassidian can publish the Users public attributes such as:<br />

Contact Name<br />

Phone Number<br />

E-Mail Address(s)<br />

x.509 Certificates<br />

As this directory contains the x.509 certificates for the Users (and services) any requesting service<br />

can now obtain a strong authentication channel for a requestor with published credentials in this<br />

directory.


Tier 2 – Organisational DS<br />

The Organisational DS Tier is provided as the primary <strong>Service</strong> Consumers Authentication DS. All<br />

instances of this DS will be federated for resilience and externally authenticated with the Tier 1<br />

Federating DS.<br />

The Organisational DS will provide the following capabilities:<br />

527<br />

Registration of Users<br />

Registration of Computers<br />

Group Management<br />

Access Control Lists<br />

Role and Personal Management<br />

Kerberos Integration with external services<br />

Definition of Password Policies<br />

Certificate Repository<br />

Cross Instance trusts<br />

Domain Security Policies<br />

Enterprise Security Policies<br />

Delegated Administration Roles<br />

Deployment Models<br />

Cassidian provides the following deployment models for these capabilities:<br />

Master Federation Directory will be located with the CSOC in HA mode.<br />

Full Central Managed <strong>Service</strong> delivery<br />

Local Instance – deployment of a local instance of the service with a centralised management<br />

function<br />

Design and delivery of a fully distributed service deployment to support a multi-site instance<br />

with centralised and shared service management model.


All service capabilities can be delivered as a high availability capability to support the required<br />

service availability.<br />

Delegated Administration Models<br />

Cassidian support the following Delegated Administration Models:<br />

528<br />

Full Delegation with 3 rd and 4 th line support and back-ups – Available for any <strong>Service</strong> Consumer<br />

instance<br />

Limited Delegation – Provision of limited administrative accounts to the <strong>Service</strong> Consumer for<br />

such activities as:<br />

o Add or remove Users Objects<br />

o Add or remove Computers Objects<br />

o Add objects to a Group<br />

o Assign permissions to a group or User<br />

o Change Attributes<br />

o Reset Account<br />

o Reset Password<br />

o Disable Users<br />

Fully Managed – The complete directory environment is managed and controlled by Cassidian<br />

with all change requests being initiated via the Customer Web Portal.<br />

Integration Options<br />

The instance of the Organisational DS allows the <strong>Service</strong> Consumer to provide an unified<br />

management directory by integration at the authentication and directory level for the provisioning and<br />

control of such additional services as the:<br />

Messaging <strong>Service</strong><br />

Voice <strong>Service</strong><br />

Collaboration <strong><strong>Service</strong>s</strong><br />

Anti-Virus <strong>Service</strong><br />

Video Conferencing <strong>Service</strong>


<strong>Service</strong> Management Offering<br />

The service is managed from the CSOC where a Directory <strong>Service</strong> is provided to enable <strong>Service</strong><br />

Consumer account management. <strong>Service</strong> provision is initiated via the <strong>Service</strong> Consumer Portal which<br />

also provides tools for service Consumer account management requests by authorised administrator.<br />

Real-time Information <strong><strong>Service</strong>s</strong><br />

Technical <strong>Service</strong> Offering<br />

Cassidian provides a real-time information service via our security aware instant messaging service.<br />

This service has been designed and is provided for use within all <strong>PSN</strong> security domains. This IM service<br />

and its associated client supports the following capabilities and functionality:<br />

529<br />

On-to-One Chat<br />

Multi-User Chat (XEP-0045)<br />

Publish and Subscribe and Personal Eventing<br />

Archiving and Audit<br />

Directory Based Authentication<br />

User Migration (XEP-0227)<br />

Ad-hoc Commands (XEP-0114)<br />

Integration with non-XMPP IM <strong>Service</strong> (XEP-0114)<br />

Presence Aware (XEP0060)<br />

BOSH (XEP-0124)<br />

Peering Control<br />

Clustering<br />

Security labelling<br />

Search (XEP-0055)<br />

Message Filtering (XEP-0191)<br />

Client for Windows, MAC, LINUX<br />

Deployment Models<br />

This service can be deployed in the following configurations:<br />

Fully Managed Centralised <strong>Service</strong> (inc HA)


530<br />

Fully Managed Distributed <strong>Service</strong> (inc HA option)<br />

Distributed <strong>Service</strong> Consumer co-managed <strong>Service</strong> (inc HA option)<br />

Core <strong>Service</strong> Components<br />

XMPP Server<br />

The high-performance XMPP server supports 1:1 chat, multi-user chat (MUC), Personal Eventing<br />

(PEP) and other XMPP services. These servers are deployed to support Wide and Local Area clustering.<br />

Archiving, Security Labels and other security features.<br />

Directory for Configuration and Authentication<br />

This <strong>Service</strong> integrates with the Cassidian Directory <strong>Service</strong> to hold authentication and configuration<br />

information. It can also be configured to use an independent directory for these functions if the <strong>Service</strong><br />

Consumers configuration requires this option. The configuration directory holds information on<br />

configuration and permanent MUC rooms. The authentication directory holds information on users,<br />

which will often use an existing enterprise directory, such as Active Directory.<br />

Gateways to non-XMPP IM <strong><strong>Service</strong>s</strong><br />

Connections to non-XMPP instant messaging services (such as AIM, ICQ, and Windows Lynx) via<br />

support for XEP-0114 (Jabber Component Protocol) is an capability option and is enabled by use of an<br />

XMPP Gateway.<br />

Security Aspects of the <strong>Service</strong><br />

These features include support for security labels according to XEP-0258 (Security Labels in XMPP),<br />

data confidentiality using TLS and support for SASL authentication, Kerberos authentication and Strong<br />

Authentication (based on X.509 Public Key Infrastructure), for client/server and for server/server<br />

connections.<br />

Resilience and Clustering


The XMPP <strong>Service</strong> is scalability and support for both Wide and Local Area Clustering make it the<br />

natural choice for deployments supporting large and growing user numbers and concerned about<br />

service interruptions due to server or network failure, support for Disaster Recovery and for military<br />

organisations needing a survivable deployment<br />

Cross Domain Connectivity<br />

This is a capability option delivered using the XMPP Boundary Proxy. Whilst peering decisions are<br />

the simplest way to apply boundary controls, use of an XMPP Boundary Proxy enables controls to be<br />

applied and checks made separate to the XMPP server(s). This proxy is then integrated with the Chat<br />

Application Firewall to provide a High Assurance Boundary.<br />

Management Tools<br />

This service provides both GUI and web-based management tools the <strong>Service</strong> Consumer can<br />

securely access these tools via the Cassidian Customer Web Portal.<br />

Client Interface and Application<br />

Cassidian provides an IM client that supports all of the standard feature required but also provides<br />

the following specific capabilities required for operations within a secure environment:<br />

531<br />

Easy room joining and bookmarking.<br />

XEP-0258 Labelling for secure environments.<br />

Stream compression for bandwidth-saving.<br />

Support for the new SCRAM authentication mechanism.<br />

<strong>Service</strong> Management Offering<br />

The real-time information service is delivered and hosted from the CSOC. The service is initiated by<br />

client software which allows one to one connectivity for private communication or options to log in to a<br />

secure hosted area for group conversation. <strong>Service</strong> Consumer Client software support is available from


the CSOC via the Consumer Portal or via email. The Client software will be distributed locally via CD or<br />

using ftp direct from the Consumer Web Portal.<br />

532


Daisy Communications Ltd<br />

Daisy Communications <strong>Service</strong> <strong>Descriptions</strong> - Communications <strong><strong>Service</strong>s</strong><br />

Daisy shall provide the following Communications <strong><strong>Service</strong>s</strong>:<br />

- Traditional and IP Based Voice <strong><strong>Service</strong>s</strong><br />

- DDI <strong><strong>Service</strong>s</strong><br />

- Premium Rate <strong><strong>Service</strong>s</strong><br />

- Inbound <strong><strong>Service</strong>s</strong><br />

- Audio and Web Conferencing <strong><strong>Service</strong>s</strong><br />

- PBX Supply and Maintenance<br />

- Hosted IP Telephony<br />

- Email Scanning and Filtering<br />

- Web-access Management <strong>Service</strong><br />

- Internet Intrusion Detection <strong>Service</strong> (IDS)<br />

- Managed DDOS Prevention <strong>Service</strong><br />

- Co-Location <strong><strong>Service</strong>s</strong><br />

- Enterprise and Application Hosting<br />

- Storage and Operational Recovery<br />

- Messaging<br />

TRADITIONAL AND IP BASED VOICE SERVICES<br />

Daisy shall supply a range of Traditional and IP based voice services.<br />

These shall include outbound call routing via CPS or IDA. These calls shall be routed over BT<br />

Openreach WLR lines.<br />

Daisy shall supply a Fixed Line Telephony service utilising the BT Openreach infrastructure.<br />

Daisy shall install, repair and maintain lines for the Public Sector and transfer lines from other<br />

<strong>Service</strong> Providers. A range of calling and network features shall be supported for each of the line types<br />

provided.<br />

Analogue Lines: Two options shall be provided for analogue lines - single lines (for fax, ADSL,<br />

individual handsets) and multi-lines (for multiple lines sharing the same telephone number).<br />

Lines shall also be provided to support the Redcare service.<br />

Basic and Primary Rate ISDN exchange lines: Basic Rate ISDN or ISDN2 shall provide Customers with<br />

two 64Kbps channels via a single line and ISDN2 Standard and System access types shall all be<br />

supported.<br />

533


Primary Rate ISDN or ISDN30 shall deliver a minimum of 8 and up to 30 x 64kbit/s channels to the<br />

Customer’s premise equipment. Two termination types shall be supported; ISDN30e (ETSI) and ISDN30<br />

(DASS).<br />

Daisy shall provide outbound local, regional, national, non-geographic, international calls, calls to<br />

mobile networks and all other standard call types.<br />

Daisy shall supply a range of Voice & Fixed Line Telephony products that shall allow access to a<br />

variety of tailored call plans - Metered Call Plans charging only for calls used by the second; Bundled<br />

Minutes Packages that shall provide a fixed rate of charges, Call Capping and a Fixed Mobile Rate across<br />

the four main mobile networks.<br />

Daisy shall on Customer request supply its Call Capping Package offering capped call charges to UK<br />

local & national and mobile calls for up to one hour duration. Bundled calls shall also be provided for<br />

chosen destinations if requested by the Customer. There shall be no minimum customer spend<br />

commitment for Customers to qualify for the packages. Daisy shall apply an increased discount for<br />

volume spend thresholds.<br />

Daisy shall work with the Customer to provide the best call plan dependent on the Customer’s call<br />

profile.<br />

Daisy shall provide a comprehensive range of call features and network services to complement its<br />

Fixed Line and Voice Telephony <strong><strong>Service</strong>s</strong>.<br />

Daisy shall transfer existing services from other providers on a like for like basis ensuring continuity<br />

of service at all times.<br />

Porting, new provision and reconfiguration of DDIs shall be provided. DDI shall be supplied and be<br />

available on ISDN2e, ISDN30e and ISDN30 DASS line installations. DDI ranges and SNDDI (Single Number<br />

DDI) shall be supplied up to a maximum of 5 numbers/ranges per installation.<br />

Daisy shall provide a voicemail product as a feature of their Intelligent Network Platform for<br />

translated numbers called Voice Mail to Email (VME). This shall be similar to standard voicemail facilities<br />

and the Customer can record a greeting that is played when a call cannot be taken. The service shall<br />

record a message from the caller and be sent as a wav or mp3 file to a pre-determined email account.<br />

VME is associated with a translated number.<br />

External prefix dialling is provided for all line types and shall allow the Customer to charge homeworkers<br />

for business related calls<br />

Call back shall be provided over single PSTN lines.<br />

Caller Identification shall be made available through subscription to the CLIP (Caller Line Identity<br />

Presentation) service. CLIP shall be available on all ISDN line types.<br />

Daisy shall supply a network based messaging product. Call Minder shall be a product available on<br />

single PSTN lines.<br />

Daisy shall provide a Call Diversion facility to allow calls to be diverted to another number anywhere<br />

in the UK, overseas or to a mobile phone. Call Diversion shall be available on single and multi line<br />

auxiliary PSTN lines. Daisy shall also provide Administration Provided Diversion for ISDN30 DASS lines.<br />

Daisy shall provide Administration and Customer Controlled Call Forwarding options for ISDN2E and<br />

ISDN30E line types.<br />

534


Daisy shall supply a call waiting facility that shall allow the Customer the option to end their original<br />

call and take the new call, swap between both calls or continue with their current call. Call Waiting shall<br />

be available on Single PSTN and ISDN2E line types.<br />

Daisy shall offer a range of Call Barring options to provide flexible options for call cost control. Call<br />

Barring shall be available across all fixed line types PSTN, ISDN2E and ISDN30 and can be applied to<br />

incoming and outgoing calls. Options available shall include National / International calls and Premium<br />

Rate <strong><strong>Service</strong>s</strong>. Call Barring shall be provided as Customer controlled or Admin controlled options if<br />

requested.<br />

Daisy shall supply a chargeable fully automated interactive and integrated Audio and Web<br />

Conferencing <strong>Service</strong>. The <strong>Service</strong> shall be available in the UK and cover overseas calls.<br />

Daisy shall provide inbound numbers network services and all non- geographic number types to the<br />

Customer.<br />

Daisy shall supply free call (e.g. 0800 ), local call (e.g. 0845 and 0844), national call (e.g. 0870) and 03<br />

number facilities for inbound calls and provide inbound call plans offering flat rate competitive ppm<br />

tariffs without volume commitments.<br />

Daisy shall provide platform independent, network based IVR solutions which shall allow the<br />

Customer to manage these services.<br />

The IVR solutions provided by Daisy shall use scripting interfaces which shall allow Customers to<br />

design, test and deploy new IVR services integrating them into the application environment.<br />

Daisy shall provide a range of traditional TDM, IP and Hybrid, telephony solutions to the Public<br />

Sector.<br />

Daisy shall provide impartial advice on the individual merits of leading <strong>PSN</strong> compliant telephony<br />

platforms in the UK and ensure provision of the optimal solution for the Customer.<br />

Daisy shall provide these solutions under a nationwide support network which includes proactive<br />

monitoring, managed services and flexible on site support services.<br />

Daisy shall offer constituent parts of a Customer business continuity plan and consultancy as to how<br />

these parts may be combined to produce an effective plan for the Customer’s particular circumstance.<br />

Daisy shall provide, maintain and update a Business Continuity Plan which ensures availability of<br />

PSTN lines, calls and the contracted <strong>Service</strong> at all times with minimal disruption to the Customer’s<br />

operation.<br />

This shall include: Basic diversion for Voice & Data calls - Change of network for outbound calls using<br />

IDA - Fault on Line - Customer Controlled Divert - Site Assurance Option 1 / Site Assurance Option 2 /<br />

Alternative routing / Diverse routing / DDI Dual parenting / Diversion to Non Geo with Simple IVR<br />

Implementation of Voice <strong><strong>Service</strong>s</strong><br />

Daisy shall provide the Customer with a single number to contact the Managed <strong>Service</strong> Helpdesk<br />

(MSH) which shall operate to meet the Customers contracted <strong>Service</strong> Levels.<br />

The MSH shall operate as the first level interface between Daisy and the Customer.<br />

The <strong>Service</strong> Desk shall operate as an overflow for the MSH desk if required.<br />

The MSH team shall perform the following key functions:<br />

535


- call receipt<br />

- call ownership<br />

- incident management updates<br />

- request transfer to internal departments for moves and changes<br />

- escalation control and interaction to internal departments<br />

- Customer satisfaction of task completion<br />

- reporting of performance statistics versus SLA targets<br />

The Customer shall be able to contact the <strong>Service</strong> Desk (telephone or email) at any time 24/7/365<br />

for any type of fault or other activity requests.<br />

Daisy shall provide detailed project planning and management to ensure minimal interruption to the<br />

Customer’s services during any migration activities or if physical interruption of the lines and services is<br />

required.<br />

Daisy shall ensure that any PSTN line transfers and/or new line installation are conducted in<br />

accordance with a program which reflects the requirements of the Customer.<br />

Daisy shall project manage the management of any <strong>Service</strong> transition. Daisy shall create an<br />

inventory of all telecom lines and equipment and identify each fixed line in terms of line rental and call<br />

costs and any other associated charges. Daisy shall also identify all contracts involved in the provision of<br />

the above and any maintenance and support costs involved.<br />

All lines, services and charges shall be identified by budget manager/cost centre/site and<br />

department and the Customer shall be provided with a spreadsheet and schedule of lines and charges<br />

that includes the account number, line number, postcode where the line is situated, line type and any<br />

relevant cost centre information.<br />

Daisy’s Project Planning shall include:<br />

First Stage<br />

Implementation meeting with the Customer<br />

Identification of all telecom lines and equipment,<br />

Contractual status<br />

Porting limitations<br />

Identify correct business continuity options for requirements<br />

Identify billing reports to be enabled<br />

Desired billing format<br />

Second stage<br />

Meeting of Transition Group<br />

Check for line plant issues on all addresses<br />

536


Place orders for new circuits<br />

Submit porting applications<br />

Third stage<br />

Meeting of Transition Group<br />

Identify numbers for bulk upload WLR3 transfers<br />

Place orders<br />

Fourth stage<br />

Ensure all relevant information is placed on Daisy billing system<br />

Enable Customer access to e-secure and carry out training as necessary<br />

Test new installations<br />

Bring new installations into service<br />

Fifth stage<br />

Provision cps on all transferred and newly installed lines<br />

Daisy shall carry out maintenance acceptance tests on all telephony equipment.<br />

Daisy shall take full responsibility for the management of the migration and implementation of<br />

services.<br />

Billing and reporting of Voice <strong><strong>Service</strong>s</strong><br />

Daisy shall provide raw call data and bespoke billing and reporting options to reflect the<br />

requirements of the Customer.<br />

Project Management of Voice <strong><strong>Service</strong>s</strong><br />

Daisy shall provide a team of pre-sales personnel to provide consultancy to the Customer regarding<br />

technical architecture, network,system and solution design.<br />

Daisy shall assign a dedicated project team for the Customer.<br />

A Project Plan shall be prepared encompassing timescales, resources and hardware. Microsoft<br />

Project shall be used as the planning tool.<br />

The Plan shall be provided to the Customer for sign off as part of the overall project delivery.<br />

The Project Management process shall be divided into four phases:<br />

Project Initiation Phase – project deliverables shall be agreed between Daisy and the Customer.<br />

Planning Phase –resources shall be allocated and the project schedule approved by the Customer.<br />

537


Transition/Implementation Phase – the project shall be implemented according to the schedule<br />

defined in agreement with the Customer at the planning phase.<br />

<strong>Service</strong> Transition Phase – the project shall be signed off by the Customer and Daisy <strong>Service</strong> Delivery<br />

teams prepared for the successful transition to maintenance.<br />

During the Project Initiation Phase, Daisy shall appoint a Project Manager shall work with the<br />

Customer and the Daisy Project Team to define and agree the scope of work and technically validate the<br />

proposed solution. Upon completion of the Initiation Phase, the Daisy Project Manager shall take<br />

ownership of the project and manage the Planning, Transition/Transformation, and <strong>Service</strong> Transition<br />

phases.<br />

The Daisy Project Manager shall:<br />

Assist in the sales process<br />

Arrange Initial Project Meeting<br />

Secure understanding of project roles and responsibilities<br />

Ensure the proper flow of communications between the various project members<br />

Manage project scope, cost and time elements<br />

Escalate issues<br />

Manage Change Control<br />

Manage transition to service<br />

Customer Project Manager<br />

The Customer shall appoint a single point of contact for all project issues. These nominees shall be<br />

identified during the Initial Project Meeting. The Daisy Project Manager shall work with the Customer<br />

nominated project team to assure project success.<br />

The Project Initiation Phase shall consist of all tasks related to securing an understanding of the<br />

proposed solution and the commitment to proceed. The proposed solution shall be articulated in an ITQ<br />

Response or Statement of Requirements (SOR).<br />

The Planning Phase shall establish a clear process for the identification and management of project<br />

scope changes with the Customer.<br />

Roles shall be defined and assigned<br />

Project control and reporting processes shall be established<br />

Project risk and dependencies shall be reviewed<br />

Change management processes shall be identified and approved by the Customer<br />

Project schedule shall be approved by the Customer<br />

The key milestones for the Planning Phase shall include the completion of the roles and<br />

responsibilities, review of the contract terms, review of change management process, approval of<br />

changes and the project schedule. Upon approval of the project schedule the Planning Phase shall be<br />

deemed complete.<br />

538


The Transition/Implementation Phase shall consist of all tasks related to the delivery, design and<br />

installation and shall be carried out in accordance with the outcomes of the planning phase.<br />

The Project Manager shall advise the Customer of the transition to service. A transition / Project<br />

Review meeting shall be scheduled with the Customer. The service process and escalation procedures<br />

shall be reviewed and responsibilities outlined.<br />

The Post Transition/Implementation Review shall provide the Customer with the opportunity to give<br />

feedback to the Daisy Team on the overall project experience.<br />

Daisy shall adopt PRINCE2 methodology throughout the Implementation and Transition Process.<br />

When a project risk is identified the Project Manager shall record the risk in the RAID Log and assign a<br />

risk owner. The risk shall then be evaluated by the project manager and its probability and impact<br />

identified. Daisy categorises risk probability as High, Medium or Low and impact is defined as above.<br />

The Project Manager shall then propose suitable options to the Customer for reducing the likelihood of<br />

the risk occurring.<br />

Engineering<br />

Daisy shall maintain an independent engineering workforce in the UK, including rural and remote<br />

parts of Scotland, with over 165 field based engineers, national coverage and 24/7/365 availability.<br />

Incident / Fault Management of Voice <strong><strong>Service</strong>s</strong><br />

Daisy shall provide a fault reporting service that is available to take fault reports on a 24 / 7 basis<br />

including Bank Holidays.<br />

Daisy shall respond to all network and switch faults affecting service to the customer as per the<br />

agreed SLA.<br />

Daisy shall require certain information from the Customer when a fault is reported. This shall<br />

include:<br />

539<br />

the telephone number(s)/circuit(s)/serial number(s) affected.<br />

symptoms of the fault.<br />

details of any on-site tests carried out in attempting to rectify the fault.<br />

availability of access to the site for engineering staff<br />

whether services affected can be suspended, if necessary, for testing.<br />

sample calls and details of faulty calls<br />

Faults shall be reported to Daisy by email or on a dedicated 0330 telephone number.<br />

Each incident shall receive a unique tracking number which shall be quoted by the Customer when<br />

seeking an update from the <strong>Service</strong> Desk or Account Manager. The fault shall be automatically tracked<br />

from start to end.<br />

When the Customer reports a fault to Customer <strong><strong>Service</strong>s</strong> Daisy’s target shall be to answer 98% of all<br />

calls within 20 seconds.


When the Customer reports a fault to Customer <strong><strong>Service</strong>s</strong> a unique Fault Reference number shall be<br />

provided. This number must be quoted by the Customer at all times when requesting progress updates<br />

or confirming fault clearance.<br />

The time taken to respond to any fault shall be governed by the <strong>Service</strong> Level assigned to each line.<br />

Daisy shall always respond to faults as quickly as possible irrespective of the <strong>Service</strong> Level.<br />

Fault progress and response times shall be automatically measured against the service levels of<br />

individual lines.<br />

Daisy shall ensure regular updates are passed to the Customer via email or telephone.<br />

Once a fault is resolved Daisy shall validate the fix with the customer and only close the fault ticket<br />

in agreement with the Customer.<br />

Daisy shall always notify Customers of actual, predicted or potential faults and problems at the<br />

earliest available opportunity.<br />

Daisy shall contact the Customer directly either by email or telephone a minimum of five days in<br />

advance of any planned maintenance that affects service delivery. Notification shall be given to the<br />

Customer as soon as the information is received by Daisy.<br />

Escalation Procedures<br />

Daisy shall maintain a formal escalation procedure using a matrix of fault severity and the time a<br />

fault has been open.<br />

Daisy shall operate three tiers of automatic escalation:<br />

Priority 1: Complete loss of service at a site. Stage One escalation shall commence after 30 minutes;<br />

Stage Two after four hours and Stage Three after eight hours.<br />

Priority 2: Partial Loss of <strong>Service</strong>. Faults that cause the Customer to lose some but not all of their<br />

telephony services at a site. Stage One escalation shall commence after two hours: Stage Two after eight<br />

hours and Stage Three after twenty-four hours.<br />

Priority 3: Quality Impairments. Poor speech quality to a specific site. Stage One escalation shall<br />

commence after twelve hours; Stage Two after twenty-four hours and Stage Three after seventy two<br />

hours.<br />

Daisy shall reconfirm the applicable service level and the standard priority level for the fault to the<br />

Customer when the fault is logged.<br />

Daisy shall agree the frequency and communication method of updates with the Customer until the<br />

fault is resolved.<br />

Daisy shall update the Customer immediately with any change in the fault status or progress, during<br />

which the Customer shall be free to request interim updates.<br />

Daisy shall log for investigation any discrepancy between update information and Customer<br />

information.<br />

Customers may request escalation at any time during the life of the fault outside of the automatic<br />

escalation process.<br />

Daisy shall provide reports into the customer of all escalations.<br />

540


Daisy shall not close a fault without the agreement of the Customer.<br />

Escalation Timetable<br />

Repair<br />

<strong>Service</strong> Levels<br />

541<br />

Initial<br />

Telephone<br />

or Email<br />

Response<br />

15<br />

minutes<br />

1 hour<br />

1 Hour<br />

1 Hour<br />

Fix SLA<br />

Update<br />

Intervals*<br />

See Note 2<br />

6hrs 2 Hours<br />

24hrs if<br />

raised by<br />

13:00<br />

End of<br />

next<br />

working day<br />

End of<br />

next<br />

working day<br />

+ 1 day<br />

4 Hours<br />

8 Hours<br />

8 Hours<br />

Escalation<br />

Level 1 - Support<br />

Technician, Level 2 - Support<br />

Team leader, Level 3 - Customer<br />

Operations Manager, Level 4 -<br />

<strong>Service</strong> Delivery Manager, Level<br />

5 - Customer Experience<br />

director<br />

Level 1 - Support<br />

Technician, Level 2 - Support<br />

Team leader, Level 3 - Customer<br />

operations Manager, Level 4 -<br />

<strong>Service</strong> Delivery Manager, Level<br />

5 - Customer Experience<br />

director<br />

Level 1 - Support<br />

Technician, Level 2 - Support<br />

Team leader, Level 3 - Customer<br />

operations Manager, Level 4 -<br />

<strong>Service</strong> Delivery Manager, Level<br />

5 - Customer Experience<br />

director<br />

Level 1 - Support<br />

Technician, Level 2 - Support<br />

Team leader, Level 3 - Customer<br />

operations Manager, Level 4 -<br />

<strong>Service</strong> Delivery Manager, Level<br />

5 - Customer Experience<br />

director<br />

Level 1- The working hours for this service shall be 0800-1800 hours Monday-Friday excluding Public<br />

and Bank Holidays. Daisy (through Openreach) shall respond to a fault report received before 1800 hrs


on one working day by the end of the next working day. Where a fault is reported outside of the working<br />

hours for this service the fault shall be treated as if it has been reported at the beginning of the next<br />

working day.<br />

Level 2 – The working hours for this service are 0800-1800 hours Monday–Saturday excluding Public<br />

and Bank Holidays. Where a fault is reported outside of the working hours for this service the fault shall<br />

be treated as if it has been reported at the beginning of the next working day. Daisy (through BT<br />

Openreach) shall respond within 4 working hours of receipt of a fault report. If the fault is not cleared<br />

during this period BT Openreach shall advise Daisy’s nominated contact of the progress being made to<br />

clear the fault.<br />

Level 3 – The working hours for this service are 0700 – 2100 Monday to Friday and 0800 – 1800<br />

Saturday and Sunday including Bank Holidays.Where a fault is reported outside of the working hours for<br />

this service the fault shall be treated as if it has been reported at the beginning of the next working day.<br />

Daisy (through BT Openreach) shall respond within 4 working hours of receipt of a fault report. If the<br />

fault is not cleared during this period BT Openreach shall advise Daisy’s nominated contact of the<br />

progress being made to clear the fault.<br />

Level 4- This service operates 24 hours a day, 7 days per week including Bank and Public Holidays.<br />

Daisy (through BT Openreach) shall respond within 4 hours of receipt of a fault report. If the fault is not<br />

cleared during this period BT Openreach shall advise Daisy’s nominated contact of the progress being<br />

made to clear the fault.<br />

<strong>Service</strong> Desk – Daisy shall operate a manned 24 hour UK based <strong>Service</strong> Desk 365 days a year.<br />

Level Description/SLAs Engineering Working Times<br />

1 – WLR<br />

Basic Analogue<br />

Lines<br />

542<br />

End of next working day + 1 working<br />

day<br />

Monday – Friday (excluding<br />

Bank Holidays*)<br />

08:00-18:00<br />

2 End of next working day(EoNWD) Monday – Saturday<br />

3 In by 13:00 fix same day, in after<br />

13:00 fix by 13:00 next working<br />

day(EoNWD)<br />

08:00-18:00 (excluding Bank<br />

Holidays*)<br />

Monday – Sunday (including<br />

Bank Holidays)<br />

07:00-21:00 Mon-Fri (via FA in<br />

tariff)<br />

08:00-18:00 Sat-Sun<br />

4 6-Hour repair Monday – Sunday (including<br />

Bank Holidays)


Daisy shall provide the capability to expedite the fault resolution process by raising the service level<br />

of lines if required.<br />

Account Management<br />

The Customer shall have a dedicated service team within Daisy.<br />

The Account Manager and Team shall be responsible for running all aspects of the Customers<br />

account 24/7, 365 days of the year and shall be the primary interface for all matters between Daisy and<br />

the Customer.<br />

Direct dial telephone numbers, mobile numbers and email addresses shall be provided for each<br />

member of the account management team. Daisy shall provide a single contact number for all services<br />

and direct dial numbers for the Account Manager (and team) shall be provided so that any urgent issues<br />

the Customer may have can be acted on immediately.<br />

This single point of contact shall be for all issues including fault resolution, ordering/cancelling lines,<br />

quotations, moves and changes, billing and any general account queries.<br />

Security Accreditation<br />

Daisy shall ensure that the management of the ISDN services shall be linked to the ISO27001<br />

requirements and, where practicable, the enhanced CESG requirements for telecommunications shall be<br />

applied both within Daisy and its third parties (BT). As part of the Customer/Consumer engagement<br />

process the security requirements shall be the subject of formal risk assessment with<br />

Customer/Consumer organisations to ensure that the integrity of the Customer’s/Consumer’s security<br />

model is not compromised and that compliance with the <strong>PSN</strong> codes can be maintained.<br />

VOICE CALLS – packages and minutes<br />

Daisy shall provide outbound local, regional, national, non-geographic, international calls, calls to<br />

mobile networks and all other standard call types.<br />

Customer lines shall be connected via concentrators onto digital local exchange switches. The reach<br />

and distribution of the concentrators shall be governed by the technical limitations and economics of<br />

the access network. The local exchanges provide the intelligence to route calls according to Customer<br />

profiles and destination numbers.<br />

Access shall be via carrier preselect (CPS) or indirect access (IDA) where the routing code is<br />

programmed locally.<br />

Where a call is routed by CPS, the originating operator shall prefix the Customer’s dialled digits with<br />

the ‘CPS access code’ before passing the call across the Point of Interconnection. The CPS access code<br />

ensures routing through the originating operator’s network to the Point of Interconnection. Where a<br />

pre-selected call is dialled using the local dialling format, the originating operator shall insert the leading<br />

zero and area code between the CPS access code and the dialled number.<br />

CPS facilities shall not apply to operator controlled calls, including transfer charge calls. Operator<br />

and other special services of CPS Operators shall be accessed using the appropriate indirect access code.<br />

A CPS access code shall be a 4 digit non-diallable prefix.<br />

543<br />

24/7


The Customer shall be able to override the CPS facility by dialling the indirect access code of another<br />

operator in the event of the failure of the chosen network by using a diallable prefix.<br />

Options<br />

Daisy shall provide a range of Voice Telephony products that shall allow access to a variety of<br />

tailored call plans.<br />

Features shall include: Metered Call Plans charging only for calls used by the second; Bundled<br />

Minutes Packages that shall provide a fixed rate of charges, Call Capping and a Fixed Mobile Rate across<br />

the four main mobile networks.<br />

On Customer request Daisy shall supply Call Capping Packages offering capped call charges to UK<br />

local & national and mobile calls for up to one hour duration. Bundled calls shall also be provided for<br />

chosen destinations if requested by the Customer.<br />

There shall be no minimum customer spend commitment for Customers to qualify for the packages.<br />

Lead times<br />

Where the line is in contract with Daisy the lead time for CPS provisioning shall be 24 hours from<br />

acceptance of the completed order.<br />

Where the line is new or not in contract with Daisy the lead time for provision of CPS shall be 10<br />

working days from acceptance of completed order. This procedure is concurrent with the provision of<br />

the new line.<br />

<strong>Service</strong> Level, Support and Maintenance<br />

Daisy’s services shall be operational 365 days per year, 24 hours a day and shall be available 99.97%<br />

of the time within these service hours (with the exception of scheduled service downtime).<br />

99.99% of calls shall be successfully connected on the first attempt.<br />

<strong>Service</strong> availability is affected by both line and core network availability. Daisy shall measure and<br />

report on performance against targets for both. Daisy shall aim to provide a mean service performance<br />

across all services to all Customers equivalent to ‘five nines’ availability (99.999%).<br />

SLA shall be agreed with the Customer<br />

Supply Options<br />

Daisy shall supply options for supply including:<br />

- Select <strong><strong>Service</strong>s</strong> which are a function of the access network used to provide the telephony service.<br />

- Operator Connected Calls<br />

- Fixed Line Text <strong>Service</strong>: this service shall enable Customers with landlines to send and receive text<br />

messages to mobile phone users and other landline users.<br />

- Call barring products which include PRS (Premium Rated <strong><strong>Service</strong>s</strong>), MOB (Mobile only) and INT<br />

(International).<br />

DDI SERVICES<br />

DDI services,support and maintenance shall be provided as part of a Wholesale Line Rental package.<br />

544


Supply Options:<br />

Daisy’s DDI service shall provide 10 or more directory numbers on ISDN30. A maximum of five Direct<br />

Dialling In (DDI) ranges are provided on the ISDN30 access. All numbers in all ranges shall have the same<br />

service profile for ISDN30e. ISDN 30 DASS channels shall have individual service profiles.<br />

The Network sends digits to the Integrated <strong><strong>Service</strong>s</strong> Private Branch Exchange (ISPBX) to identify the<br />

terminal/extension that the call is for. The ISPBX then uses this number as routing information to<br />

connect the call to the correct terminal.<br />

It shall be possible for the ISPBX to be configured so that multiple calls can be delivered via one<br />

number to one device. This shall mean that a main switchboard number and operator function can<br />

answer calls.<br />

The ISPBX (if it supports the capability) shall provide digits to the network on each outgoing call for<br />

identification purposes. If the ISPBX does not send identification digits, the network shall use the default<br />

billing number of the ISDN30 access as its source of identification information.<br />

A single number direct dialling in (SNDDI) shall be provided as an individual number DDI range. For<br />

incoming calls the network shall send, as default, six routing digits to the Customer equipment so that it<br />

shall be possible for calls to be directed to the correct channel. SNDDI is not applicable to ISDN30 DASS<br />

installations.<br />

The numbering options shall allow a mixture of SNDDI and DDI ranges on the same ISDN30e access<br />

with all numbers using any of the available channels.<br />

It is possible for a maximum of five SNDDIs – including the main number – to be provided on<br />

ISDN30e access.<br />

The Customer’s terminal equipment shall be required to support DDI to recognise the single<br />

numbers.<br />

DDI on ISDN30e - Direct Dialling In (DDI) shall allow incoming calls to an ISPBX to be routed directly<br />

to an extension without going via the ISPBX operator. The service provided on digital exchanges shall<br />

allow up to six digits to be forwarded from the exchanges to the ISPBX. Outgoing calls for DDI lines shall<br />

be provided on separate outgoing trunks connected to the ISPBX. The ISPBX shall be configured to route<br />

outgoing calls to these trunks.<br />

It is not possible for DDI number ranges on ceased installations to have call forwarding services. It<br />

shall be possible to have Caller Redirect.<br />

It is necessary for the first number of the DDI range to be the first number on Caller Redirect.<br />

It shall be possible for up to five DDI ranges or a mixture of DDI and single number direct dialling in<br />

(SNDDI) to be configured on a European Telecommunications Standards Institute (ETSI) access.<br />

ISDN30e shall support the following DDI numbering options.<br />

1 Number<br />

2 Single Numbers<br />

3 Single Numbers<br />

4 Single Numbers<br />

Up to 5 DDI Ranges<br />

545


1 Single Number and max of 4 DDI ranges<br />

2 Single Numbers and max of 3 DDI ranges<br />

3 Single Numbers and max of 2 DDI ranges<br />

4 Single Number and max of 1 DDI range<br />

An SNDDI shall be provided as an individual number DDI range. For incoming calls the network shall<br />

send, as a default, 6 routing digits to the Customer equipment so that calls can be directed to the<br />

correct channel.<br />

The numbering options shall allow a mixture of SNDDI and DDI ranges on the same ISDN30 access<br />

with all numbers using any of the available channels.<br />

It shall be possible for a maximum of four SNDDI to be provided on an ISDN30e access.<br />

DDI <strong><strong>Service</strong>s</strong> on ISDN 30 DASS - DASS supports the following numbering options.<br />

It shall be possible for one number with up to five DDI ranges to be applied across the same<br />

channels. If the Customer requires more than one DDI range across the same channels it shall be<br />

necessary for the last six digits of all the numbers to differ but the digits in front of the last six shall have<br />

to stay the same.<br />

DDI <strong><strong>Service</strong>s</strong> on ISDN2 - These shall be available on an ISDN2e System installation, in a point to point<br />

configuration, and shall operate on a single main billing number.<br />

This product variant shall support the following DDI options using BT numbers and ranges:<br />

BT numbers (5 max):<br />

1 number<br />

2 single numbers<br />

3 single numbers<br />

4 single numbers<br />

5 single numbers.<br />

BT ranges (5 max):<br />

1 SNDDI + 4 DDI ranges max<br />

2 SNDDIs + 3 DDI ranges max<br />

3 SNDDIs + 2 DDI ranges max<br />

4 SNDDIs + 1 DDI range max.<br />

Where import number is required to provide ISDN2e, this product variant shall support the<br />

following DDI options using non-BT numbers and ranges:<br />

Non-BT numbers (10 max):<br />

1 number<br />

2 single numbers<br />

3 single numbers<br />

546


4 single numbers<br />

5 single numbers<br />

6 single numbers<br />

7 single numbers<br />

8 single numbers<br />

9 single numbers<br />

10 single numbers.<br />

Non-BT ranges (10 max):<br />

1 SNDDI + 9 DDI ranges max<br />

2 SNDDIs + 8 DDI ranges max<br />

3 SNDDIs + 7 DDI ranges max<br />

4 SNDDIs + 6 DDI ranges max<br />

5 SNDDIs + 5 DDI ranges max<br />

6 SNDDIs + 4 DDI ranges max<br />

7 SNDDIs + 3 DDI ranges max<br />

8 SNDDIs + 2 DDI ranges max<br />

9 SNDDIs + 1 DDI range max.<br />

PREMIUM RATE SERVICES<br />

Daisy shall provide Premium Rate <strong><strong>Service</strong>s</strong> on application depending on availability and Ofcom and<br />

PhonePayPlus restrictions and guidelines on number selection. All number types can be routed on all<br />

products subject to Ofcom and PhonePayPlus restrictions and guidelines. Undue delaying in answering<br />

Premium Rate numbers is not acceptable.<br />

Daisy shall provide a number translation service that routes premium rate numbers in a variety of<br />

configurations and reports on the delivery of the calls.<br />

Daisy shall provide a web portal which shall be available for use 24 hours per day 7 days per week.<br />

This portal shall allow configuration changes to be made, numbers to be brought into service and<br />

reports to be generated.<br />

The portal is accessed via Internet Explorer or Mozilla Firefox and shall require simple login and<br />

passwords. Different levels of access shall be provided to cater for different roles within the Customer<br />

organisation.<br />

The following Routing Options shall be made available:<br />

One to One routing - This service allows the Customer to translate the non-geographic number to<br />

any fixed geographic, international or mobile number of their choice. The destination number can be<br />

changed in real-time on the web based portal.<br />

547


One to One routing plus voice to email - This product provides the same call routing functionality as<br />

Inbound Connect, but with the option to forward calls as a wav file to an email address.<br />

One to One routing - This service shall allow the Customer to translate the non-geographic number<br />

to any fixed geographic, international or mobile number of their choice. It shall be possible for the<br />

destination number to be changed in real-time on the web based portal.<br />

One to One routing plus voice to email - The Customer shall be able to forward calls as a wav file to<br />

an email address.<br />

One to One with Divert on Busy - Routed calls that ring with no reply shall be diverted to voicemail<br />

or an alternative destination number.<br />

Time of Day Routing with Voicemail - This service shall route calls according to the time of day and<br />

day of the week. It shall be possible to programme special days/dates into the routing configuration. Out<br />

of active hours calls shall be diverted to an alternative number or voicemail.<br />

Time of Day Routing with Intro Audio and Voicemail - This service shall route calls according to the<br />

time of day and day of the week with a message delivered on connection.<br />

Call Hunt Group – It shall be possible for calls to be distributed across multiple destination numbers<br />

with divert available if no member of the hunt group picks up the call. Ring duration, sequencing and<br />

destinations shall all be configurable.<br />

Inbound Hunt Group Manager - It shall be possible for calls to be distributed across multiple<br />

destination numbers with divert available if no member of the hunt group picks up the call. Calls shall be<br />

distributed according to time of day. 3 time zones shall be available and up to 6 destination numbers per<br />

time zone. Each time zone shall have a configurable greeting message.<br />

Time of Day, Call Hunt Group and Whisper - The call whisper product shall allow the called party to<br />

hear an announcement specific to the dialled number before answering the call.<br />

Simple IVR (Interactive Voice Response), Time of Day and Voicemail - 12 DTMF options shall be<br />

made available to the caller and it shall be possible for the service to be configured for Time of Day. Out<br />

of hours calls shall be diverted to an alternative number, voicemail or a greeting and then disconnected.<br />

Multi-Level IVR - This service shall allow multiple options to be configured on three levels. It shall be<br />

possible for the service to be configured for Time of Day. Out of hours calls shall be diverted to an<br />

alternative number, voicemail or a greeting and then disconnected.<br />

Fax to Email - Faxes are received via an NTS number shall be delivered to the Customer’s email<br />

inbox. A choice of file formats shall include .pdf or .tif.<br />

Reporting options available via the web portal shall include -<br />

548<br />

· Call Summary (shows total calls and duration).<br />

· Call Records (shows individual call records)<br />

· Call Summary By Outcome (shows total calls split by call outcome (answered,<br />

unanswered, engaged, etc) along with total duration.


549<br />

· Call Summary By Period (shows total calls split by call period (day, evening, weekend,<br />

etc.) along with total duration.<br />

On the Web portal Home screen a number of reports shall be shown in a dashboard format.<br />

This shall include: - Total calls - Total minutes - Total by outcome - Total by period - Longest Call -<br />

Busiest location - Call Origin (pie chart) - Daily calls/current month or hourly- Calls/current day (bar<br />

chart)<br />

Lead times and Implementation Process<br />

Daisy shall provide service within 48 hours of the accepted order provided Ofcom and PhonePayPlus<br />

registration is complete.<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer.<br />

Daisy shall provide access to the Network IVR platform 24 hours a day throughout the year.<br />

INBOUND SERVICES<br />

Daisy shall provide a number translation service that shall route NTS numbers in a variety of<br />

configurations and report on the delivery of the calls.<br />

Daisy shall provide 0800, 0844, 0845, 0871, 03, and geographic NTS numbers depending on<br />

availability. It shall be possible for all number types to be routed on all products. Daisy shall provide<br />

inbound call plans offering flat rate competitive tariffs without volume commitments.<br />

Daisy shall provide a web portal which will be available for use 24 hours per day 7 days per week.<br />

This portal shall allow configuration changes to be made, numbers to be brought into service and<br />

reports to be generated.<br />

The portal shall be accessed via Internet Explorer or Mozilla Firefox and requires simple login and<br />

passwords. Different levels of access shall be provided to cater for different roles within the Customer<br />

organisation.<br />

The following Routing Options shall be available:<br />

One to One routing - This service shall allow the Customer to translate the non-geographic number<br />

to any fixed geographic, international or mobile number of their choice. It shall be possible for the<br />

destination number to be changed in real-time on the web based portal.<br />

One to One routing plus voice to email - The Customer shall be able to forward calls as a wav file to<br />

an email address.<br />

One to One with Divert on Busy - Routed calls that ring with no reply shall be diverted to voicemail<br />

or an alternative destination number.<br />

Time of Day Routing with Voicemail - This service shall route calls according to the time of day and<br />

day of the week. It shall be possible to programme special days/dates into the routing configuration. Out<br />

of active hours calls shall be diverted to an alternative number or voicemail.


Time of Day Routing with Intro Audio and Voicemail - This service shall route calls according to the<br />

time of day and day of the week with a message delivered on connection.<br />

Call Hunt Group – It shall be possible for calls to be distributed across multiple destination numbers<br />

with divert available if no member of the hunt group picks up the call. Ring duration, sequencing and<br />

destinations shall all be configurable.<br />

Inbound Hunt Group Manager - It shall be possible for calls to be distributed across multiple<br />

destination numbers with divert available if no member of the hunt group picks up the call. Calls shall be<br />

distributed according to time of day. 3 time zones shall be available and up to 6 destination numbers per<br />

time zone. Each time zone shall have a configurable greeting message.<br />

Time of Day, Call Hunt Group and Whisper - The call whisper product shall allow the called party to<br />

hear an announcement specific to the dialled number before answering the call.<br />

Simple IVR (Interactive Voice Response), Time of Day and Voicemail - 12 DTMF options shall be<br />

made available to the caller and it shall be possible for the service to be configured for Time of Day. Out<br />

of hours calls shall be diverted to an alternative number, voicemail or a greeting and then disconnected.<br />

Multi-Level IVR - This service shall allow multiple options to be configured on three levels. It shall be<br />

possible for the service to be configured for Time of Day. Out of hours calls shall be diverted to an<br />

alternative number, voicemail or a greeting and then disconnected.<br />

Fax to Email - Faxes are received via an NTS number shall be delivered to the Customer’s email<br />

inbox. A choice of file formats shall include .pdf or .tif.<br />

Queue, One to One, time of Day with Voicemail - This service shall be configurable to allow up to 99<br />

calls to queue at network level, based on destination, engaged status and destination call count. The<br />

maximum number of call connections can be set up to 200. These calls shall be routed according to time<br />

of day with three options for out of hours call handling. Queue reporting shall include configurable ‘time<br />

in queue’ alarms. There shall be a choice of six settings for music on hold plus 5 apology modes including<br />

cycle, repeat and queue position notification. It shall be possible for a number of messages to be<br />

uploaded via the portal including a welcome message, up to 3 apology messages, next to connect<br />

message and a voicemail greeting for the out of hours voicemail option.<br />

% distribution - This service shall allow calls to be distributed across up to 6 destination numbers by<br />

percentage.<br />

Multi Out Dial - This service shall allow up to 7 destination numbers to ring simultaneously on<br />

receipt of a call via the NTS number. The first destination to answer ceases the call on all other numbers.<br />

Multi-Plan for single service numbers – The Customer shall be able to switch between four<br />

configurable plans for individual service numbers. The Customer shall be able to select which of the four<br />

plans is active using the portal or Multi-Plan service IVR.<br />

• It shall be possible to configure up to four plans per service number.<br />

• It shall be possible for each plan to be associated with any available product pages except Fax-to-<br />

Email.<br />

• It shall be possible for the pre-defined plans to be switched either via the Portal or the Multi-Plan<br />

<strong>Service</strong> IVR<br />

550


Multi-Plan service number groups - The Customer shall be able to form a group of service numbers<br />

that can be switched individually or as a group to one of four specific, configurable plans.<br />

• This shall allow the Customer to group service numbers with individual pre-defined plans.<br />

• It shall be possible for all the numbers within this group to be switched as a group to a specific<br />

plan number.<br />

• It shall be possible for the pre-defined plans to be switched either via the Portal or the Multi-Plan<br />

<strong>Service</strong> IVR.<br />

<strong>Service</strong> number assignment group – It shall be possible for the Customer to associate multiple<br />

service numbers to a set of up to four plans. Once assigned, all the service numbers within this group<br />

shall have the same call flow as defined by each of the four plans.<br />

• This facility shall allow the Customer to associate multiple service numbers to a maximum of four<br />

plans.<br />

• It shall be possible for each of the plans to be a different product page – with the exception of Faxto-Email<br />

or Audio Conferencing.<br />

• It shall be possible for the Customer to assign numbers to the plans via the number assignment<br />

section.<br />

• It shall be possible for the Customer to switch the plans via the Portal or the <strong>Service</strong> IVR using one<br />

of the service numbers within the number assignment group.<br />

Reporting - Reports shall be made available via the web portal.<br />

Report Options available shall include:<br />

551<br />

· Call Summary (shows total calls and duration).<br />

· Call Records (shows individual call records)<br />

· Call Summary by Outcome (shows total calls split by call outcome (answered,<br />

unanswered, engaged, etc) along with total duration.<br />

· Call Summary by Period (shows total calls split by call period (day, evening, weekend,<br />

etc.) along with total duration.<br />

On the Web portal Home screen a number of reports shall be shown in a dashboard format<br />

including : Total calls / Total minutes / Total by outcome / Total by period / Longest Call / Busiest<br />

location / Call Origin (pie chart) / Daily calls/current month or hourly calls/current day (bar chart)<br />

Lead times and Implementation Process<br />

Daisy shall provide these <strong><strong>Service</strong>s</strong> within 48 hours of the accepted order dependent upon number<br />

availability.<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer<br />

Daisy shall provide the <strong><strong>Service</strong>s</strong> 24 hours a day throughout the year.


Dependencies<br />

Porting of existing NTS numbers onto the Daisy NTS service is subject to porting agreements being in<br />

place with the range-holder (s).<br />

AUDIO AND WEB CONFERENCING SERVICES<br />

AUDIO CONFERENCING Product Features<br />

· Auto Continuation - participants shall be able to stay on the conference call without the<br />

Customers attendance. The conference ends once the last participant disconnects.<br />

· Auto Record - Automatically records all calls without prompting to start a recording via a<br />

telephone keypad and eliminates the ability for anyone within the conference to stop the recording.<br />

· Conference Breakdown – shall prevent conference calls that have not been disconnected<br />

properly from continuing indefinitely by automatically ending the conference once it has reached the<br />

duration and/or number of participants that have been specified by the Customer.<br />

· Conference Code-Level Custom Greeting – the Customer shall be able to set up a custom<br />

greeting to play after participants enter the conference code.<br />

· Conference Entry Mode - prior to participants joining the call, it shall be possible for the<br />

Customer to select one of the following entry mode options: un-muted , group mute or lecture mode.<br />

· Consecutive Interpretation – the Customer shall be able to utilise a dial-out option to instantly<br />

connect an interpreter to the conference allowing participants to listen in two languages. It shall be<br />

possible through the use of a pausing to allow the interpreter time to render any remarks into whatever<br />

language is required.<br />

· Custom/Branded Greetings – The Customer shall be able record a custom welcome message to<br />

be played to the participants who join the conference using a chosen toll-free or toll dial-in numbers.<br />

· Custom Entry – A facility shall allow the Customer to quickly enter a conference and turn<br />

specified prompts off that are played after entering the conference code or leader PIN.<br />

· Dial-Out – The Customer shall be able to dial out directly from the conference to domestic<br />

participants and bring them into the call. It shall also be possible to contact the operator to dial-out to<br />

international participants.<br />

552


· Disconnect Grace Period - A grace period shall allow the Customer to rejoin the conference in<br />

the event that Auto Continuation is disabled and the Customer has been disconnected.<br />

· Entry Announcement Limit – The Customer shall be able to reduce the number of entry tones<br />

played when the call has started.<br />

· Entry/Exit Options – The Customer shall have the facility to decide how participants are<br />

announced when they join or leave the audio conference call - tone, name announce, name and tone or<br />

silence.<br />

· Force Disconnect – The Customer shall have the facility to clear the conference by<br />

disconnecting all participants from the call while remaining connected.<br />

· Group Mute/Unmute – The Customer shall have the ability to silence all participants’ lines by<br />

pressing a keypad command on the telephone.<br />

· Leader Express Entry – The Customer shall be able to start the conference by consecutively<br />

entering the conference code followed by * and the leader PIN followed by #.<br />

· Leader Smart Entry – The Customer shall be able to store a phone number so that when that<br />

number is used to dial into the call, the system shall recognise that number and join the Customer to the<br />

conference without the need for inputting the conference code and leader PIN.<br />

· Leave and Join a Conference - Participants shall have the ability to leave the conference they<br />

are attending and join a new conference without hanging up and redialing the same dial-in number.<br />

· Lecture Mode – The Customer shall have the facility to mute all participants during the<br />

conference to reduce background noise. Participants shall not have the capability to unmute their lines,<br />

allowing the Customer to deliver the message uninterrupted.<br />

· Lock/Unlock – The Customer shall be able to lock the conference call to prevent additional<br />

participants from joining the call, with the exception of dialling out.<br />

· Mobile Assistant – The Customer shall be able to control and access the conference call from a<br />

large selection of mobile phones.<br />

553


· Multiple Leaders – The Customer shall have the ability to have multiple leaders on the<br />

conference call that allows them to have access to all leader controls.<br />

· Online Management – The Customer shall be able to manage the call online by scheduling,<br />

starting, presenting and archiving the conference.<br />

· Operator Assistance – The Customer shall be able, at any time during the call, to request an<br />

operator simply by pressing *0 to join the conference or 00 to speak to the operator privately.<br />

· Outlook Plug-In – The Customer shall be able to create, edit and schedule meetings with predetermined<br />

conferencing information from an Outlook toolbar.<br />

· Personal Greeting – The Customer shall have the facility to record a personal message for<br />

participants to hear when joining your conference.<br />

· Phone Commands – The Customer shall have the ability to mute lines, lock the conference,<br />

and request operator assistance through the use of touch button on the telephone keypad.<br />

· Post-conference Emails – The Customer shall be able to keep an attendance roster of the<br />

participants with an email record of which participants were on the phone and/or web. The Customer<br />

shall also be able to keep track of the total conferencing minutes.<br />

· Private Participant Count – The Customer shall have the ability to privately announce the<br />

number of participants on the conference call at any participant's request.<br />

· Quick Start - The Customer shall have the ability to select Quick Start to immediately begin<br />

the conference call by allowing participants to enter the conference and start speaking before the call<br />

officially begins.<br />

· Record & Playback - The Customer shall have the ability to digitally record the Reservationless<br />

- Plus call for participants who were unable to attend or for participants who would like to listen to the<br />

conference call again. The recording is available 24/7/365 and can be accessed on the Internet or by<br />

dialling a toll-free number. The Customer shall be able to purchase a CD, downloadable link and/or a<br />

transcription of the recording.<br />

· Record Pause/Resume - The Customer shall have the ability to pause the recording in progress<br />

and resume the recording when ready to continue.<br />

554


· Roll Call - The Customer shall have the ability to prompt participants to record their names as<br />

they join the audio conference call. It shall be possible at any time during the conference for the names<br />

to be replayed privately to any conference participant.<br />

· Security Passcode - The Customer shall have the facility to provide an added level of security<br />

for the Reservationless - Plus conference by having control over who joins the conference. It shall be<br />

possible to select and distribute the security pass code for every conference that is hosted by the<br />

Customer. The Customer shall also have the ability to add a security pass code to an active conference<br />

by returning to the leader account menu.<br />

· Self-Mute/Unmute - The Customer shall have the ability to allow participants to silence their<br />

own lines by pressing a keypad command on their telephones.<br />

· Sub-conference - The Customer shall have the ability to allow pre-selected guests to join a<br />

private discussion during the conference call. Sub-conferencing shall allow the Customer to discuss side<br />

issues and other non-public information.<br />

· Third-Party Conference Start – It shall be possible for a participant to bypass the hold music<br />

and start the conference as the leader if the Customer’s leader is late or unable to host the call.<br />

· Waiting Room - The Customer shall have the ability to place participants on music hold until<br />

such time as the Customer is ready for them to join the conference call.<br />

WEB CONFERENCING Product Features<br />

· Microsoft Outlook and Lotus Notes Integration – It shall be possible for the Customer to send<br />

invites from Outlook or Lotus Notes Calendar for one-click access to the meeting.<br />

· Reservation-less Meeting Room - It shall be possible for the Customer to host remote meetings<br />

without the need to make reservations. All moderators shall have their own, secure meeting room.<br />

· Easy Participant Access - Participants shall be able to join the meeting without the need of<br />

plug-ins or downloads. It shall be possible to join from all major browsers and Operating Systems.<br />

· Integration with Reservation-less Plus Conferencing – An audio feature shall automatically dial<br />

out to the Customer and all participants when the conference begins if required.<br />

555


· Audio Broadcasting – This shall allow participants to listen to the audio conference using their<br />

computer speakers, headsets or telephone.<br />

· Customisable Meeting Interface – The Customer shall have the ability to control their user<br />

interface. It shall be possible for the “panels” that are displayed in the meeting interface, to be<br />

expanded, collapsed and resized.<br />

· Full Screen – The Customer shall the facility to set participants to Full Screen to maximise<br />

viewing space for sharing applications.<br />

· Recording – The Customer shall be able to create a synchronised archive that replicates the<br />

live meeting including all visuals, annotation, polling, audio and video.<br />

· Show Power Point Presentations - The Customer shall be able to show uploaded PowerPoint<br />

presentations to their audience via a presentation mode.<br />

· Application Sharing - The Customer shall be able to share any application from a computer and<br />

grant control to authorized participants to edit shared documents while in the meeting.<br />

· Web Tour - The Customer shall be able to conduct a web tour in the meeting, which shall allow<br />

participants to navigate and click on the live web site that is being shared.<br />

· Desktop Video - Customers and participants shall be able to view and broadcast live video in a<br />

meeting using a standard desktop video webcam.<br />

· Participant Interaction and Management - The Customer shall be able to chat/send instant<br />

messages to an individual or a group without interrupting the meeting.<br />

· Survey, Quiz, Poll - The Customer shall be able to gain feedback from participants using polling<br />

questions or creating surveys and quizzes that can be displayed in the meeting. The Customer shall be<br />

able to publish the results so that the results are visible to all participants.<br />

· Instant Messenger Quick Invite - The Customer shall be able to invite participants to the<br />

meeting, after it has started, using MSN Live Messenger, Lotus SameTime Instant Messenger or<br />

Microsoft Office Communicator Instant Messenger.<br />

556


· Participant List - The Customer shall be able to view the voice and web connectivity status of<br />

the participants using the Participant list in the online web meeting interface.<br />

· Emoticons – It shall be possible for the participants to provide instant feedback to the<br />

Customer using a variety of emoticons included in the participant meeting interface.<br />

· SSL Encryption - Enhanced meeting security shall be provided via 128-bit SSL encryption.<br />

· Security Passcodes – The Customer shall have the ability to add an additional layer of security<br />

with moderator-created security codes unique to each meeting.<br />

· Close Meeting Room Door - The Customer shall have the ability to prevent unauthorised<br />

access to the conference and limit disruptions by “closing the door” to the meeting.<br />

· Stored Documents - The Customer shall have the ability to upload and access PowerPoint<br />

Presentations, Surveys, Quizzes, Polls, Images, Web Tours and Files that can be used during the<br />

meetings.<br />

· Online Reporting - The Customer shall have the ability to view detailed reports from the<br />

meetings with information on duration of the meeting, number of participants, participant names and<br />

survey or quiz results.<br />

· Archived Recordings - After the meeting the Customer shall have the ability to access and<br />

playback hosted or zip archives. The Customer shall be able to send participants archive email links and<br />

choose to password protect them. Detailed reports shall show who has accessed the recorded<br />

conference and how long it was viewed.<br />

Lead times and Implementation Process<br />

Daisy shall provide an initial account and login set up within 5 working days. An email shall be sent<br />

to the Customer with account details, portal login, PIN and a software link. The Customer shall be able<br />

to download the host software and launch a conference immediately. Conference users do not have to<br />

download software. The Customer shall be able to request extra hosts once the account is active and<br />

these will be set up within 48 hours. Where the request is for 100 or more extra hosts the lead time shall<br />

be extended to 5 working days.<br />

<strong>Service</strong> Level, Support and Maintenance<br />

557


SLA shall be agreed with the Customer.<br />

In the event of a fault, Customers shall call the Daisy conferencing support line.<br />

This Customer support function in the event of a fault shall be available 24 hours a day, 365 days a<br />

year through the Daisy Conferencing Support Line.<br />

Customers shall be able to access the Daisy Conference Manager to view information and make the<br />

following changes:<br />

558<br />

Schedule audio & visual calls<br />

Send email invitations and reminders<br />

Review, edit or delete scheduled meetings<br />

View, edit, delete and set up host details<br />

Access reporting tools<br />

User guides for Customers shall be made available.<br />

The Daisy Conference <strong><strong>Service</strong>s</strong> shall have the following SLAs<br />

<strong>Service</strong><br />

Platform<br />

Audio<br />

Platform<br />

Operator<br />

Assisted<br />

Platform<br />

Serv<br />

ice Level Definition<br />

%<br />

%<br />

99.9<br />

99.9<br />

Availability of the<br />

Reservationless platform<br />

through the dial-up<br />

network.<br />

Availability of the<br />

Operator Assisted<br />

platform through the<br />

dial-up network.<br />

Measurement<br />

Automated continuous<br />

periodic access attempts to<br />

audio conference bridge.<br />

Automated continuous<br />

periodic access attempts to<br />

audio conference bridge.


Web<br />

Conferencing<br />

SLAs include:<br />

559<br />

%<br />

99.9<br />

Availability of the<br />

document conferencing<br />

platform through the<br />

Internet.<br />

Resolve fault/issue – shall be within 24 hours<br />

Automated continuous<br />

server health and status<br />

monitoring.<br />

Email Response Times – 98% of all emails shall be responded to within 2 hours<br />

New user set up – 98% of all new users shall be set up within 24 hours<br />

Operator Calls – 98% shall be answered within 20 seconds.<br />

Supply Options<br />

The Daisy Conferencing <strong>Service</strong> shall consist of the following services:<br />

Reservation-less Plus –Customers shall have an always available audio conferencing service. The<br />

Customer shall not need a reservation or an Operator. The service shall provide for a maximum<br />

of 125 participants.<br />

Operator Assisted – Daisy shall provide a reservation based service that shall offer Customers an<br />

audio conferencing service with an operator and support personnel who manage high-touch<br />

features.<br />

Unified Meeting – Daisy shall provide a Web Conferencing service that shall allow audio<br />

integration and audio conferencing users to manage their audio calls. No download shall be<br />

required for participants.<br />

PBX SUPPLY AND MAINTENANCE<br />

Daisy shall provide a wide range of systems with full functionality able to be incorporated into a<br />

single traditional voice, IP based or hybrid network.<br />

This functionality shall include:<br />

Integrated voice mail<br />

A range of digital and analogue handsets from POTs to Operator Consoles


560<br />

Automatic Call Distribution<br />

Teleworking<br />

Conferencing and Collaboration<br />

Paging and Door Opening facilities<br />

Phonebook access<br />

Message Waiting indicators<br />

Music on Hold<br />

Dynamic Extension<br />

Auto Attendant<br />

Daisy shall supply systems with ‘five 9s’ availability.<br />

Daisy shall supply resilient systems with the options of hardware redundancy, automatic failover<br />

and geographic redundancy across the network.<br />

Supply Options<br />

Daisy shall supply traditional TDM and IP based telephony systems.<br />

Daisy shall offer the Customer the choice of outright purchase or lease subject to acceptance.<br />

Daisy shall supply a full installation, design and project management service using fully qualified<br />

engineers, pre-sales personnel and PRINCE2 project managers.<br />

Daisy shall supply a range of standard maintenance services with bespoke options for critical sites<br />

and applications.<br />

Daisy shall undertake to provide a fully managed service through integral management tools, alarms<br />

and pro-active health monitoring of the pbx network. This service shall be provided through the 24/7<br />

systems management centre at the Daisy Centre of Systems Excellence.<br />

All systems upgrades, back-ups, time synchronisation, adds , moves and changes shall be carried out<br />

on a daily basis as requested from the Customer. All access to Customer pbx networks shall be via<br />

approved, encrypted connections as agreed with the Customer.<br />

Options for the service shall include but are not limited to:<br />

System choice from manufacturers such as Mitel, Avaya, Siemens, LG etc.<br />

Choice of analogue or digital handsets<br />

Full installation including cabling<br />

System only, Handsets etc.<br />

Telephony applications specific to the chosen supplier<br />

As part of its PBX supply service Daisy shall provide access to technologies such as mobility solutions,<br />

unified technologies, collaboration, virtualisation, basic contact centre technology and advanced<br />

management and reporting.


Daisy shall provide a full range of additional equipment to complement the pbx service including but<br />

not limited to<br />

Call logging<br />

Call recording<br />

End user management applications<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer.<br />

Daisy shall offer a range of standard service levels agreements on the telephony service.<br />

Daisy shall provide customised SLA packages on application.<br />

Daisy’s standard <strong>Service</strong> Levels shall be:<br />

Bronze Cover – Complete hardware cover available Monday to Friday (excluding bank Holidays)<br />

between the hours of 08:30 and 18:00. Faults that results in 50% system crash will receive a response<br />

within 8 working hours, all other system faults will receive a response within 16 working hours.<br />

Silver Cover - Complete hardware cover available Monday to Friday (excluding bank Holidays)<br />

between the hours of 08:30 and 18:00. Faults that results in 50% system crash will receive a response<br />

within 4 working hours, all other system faults will receive a response within 8 working hours.<br />

Gold Cover - Complete hardware cover available Monday to Friday (excluding bank Holidays)<br />

between the hours of 08:30 and 18:00. Faults that results in 50% system crash will receive a response of<br />

a man to site within 4 working hours, all other system faults will receive a response within 8 working<br />

hours.<br />

Platinum Cover - Complete hardware cover available Monday to Sunday (including bank Holidays)<br />

24 hours per day. Faults that results in 50% system crash will receive a response within 4 hours, all other<br />

system faults will receive a response within 8 hours<br />

Platinum Plus Cover - Complete hardware cover available Monday to Sunday (including bank<br />

Holidays) 24 hours per day. Faults that results in 50% system crash will receive a response of a man to<br />

site within 4 hours, all other system faults will receive a response within 8 hours<br />

Handsets - All of the above services exclude support of handsets which will be covered on a Next<br />

Business Day post out service<br />

<strong>Service</strong> Levels:<br />

Cove<br />

r Level<br />

Cove<br />

r Type<br />

561<br />

Bro<br />

nze<br />

Sil<br />

ver<br />

ld<br />

Go<br />

Plati<br />

num<br />

Plati<br />

num<br />

Plus<br />

Complete (parts & labour inclusive) Hardware<br />

Cover


Avail<br />

able<br />

Syste<br />

m Crash<br />

Tech<br />

nical<br />

Response<br />

Resp<br />

onse to<br />

Site<br />

Othe<br />

r Faults<br />

Tech<br />

nical<br />

Response<br />

Hand<br />

set Faults<br />

System Faults<br />

562<br />

Monday to Friday<br />

(excluding bank Holidays)<br />

08:30 - 18:00<br />

<strong>Service</strong> Levels (working hours)<br />

Monday to<br />

Sunday (including<br />

bank Holidays) 24<br />

hours per day<br />

8 4 --- 4 ---<br />

--- --- 4 --- 4<br />

<strong>Service</strong> Levels (working hours)<br />

16 8 8 8 8<br />

Next Business Day post out service*<br />

It shall be possible for system faults to be logged 24 hours a day, 7 days a week.<br />

These shall be subject to the appropriate SLA response to site by a Daisy engineer as agreed in the<br />

service description to be agreed with the Customer. “Other system faults” are determined to be any<br />

other maintenance call which falls outside of the clearly stated system crash parameters.<br />

Daisy shall operate a 24x7 ITIL certified Technical <strong>Service</strong> Desk (TSD) operation within the Customer<br />

<strong><strong>Service</strong>s</strong> department. The TSD shall be responsible for logging calls and automatically escalating them<br />

against pre-defined Operational Level Agreements to the correct area within Daisy or third party.<br />

HOSTED IP TELEPHONY<br />

Daisy shall provide a fully hosted and managed telephony solution.<br />

The Telephony platform shall be hosted in an enhanced ISO27001 certified, secure and resilient data<br />

centre. The onsite premise equipment required shall be a managed router, suitable cabling and a choice<br />

of handsets. The platform shall be monitored 24/7 by qualified UK based engineers.


The system shall be modular and it shall be possible for the number of seats or users to be increased<br />

and decreased with additional handsets and licences on the assumption that sufficient bandwidth is<br />

available.<br />

System features shall be controlled via a dedicated web portal on an individual user or administrator<br />

basis. It shall be possible for the Customer to invoke disaster recovery plans via a web portal accessed<br />

from any web enabled device.<br />

The service shall be delivered over Ethernet or DSL services directly into the Daisy core network. The<br />

service shall not use the public internet.<br />

When the service is provided over Ethernet then Quality of <strong>Service</strong> shall be configured with the<br />

option of a separate vLAN.<br />

The Customer shall be able to integrate the Daisy Hosted Telephony Solution into MS Outlook,<br />

Explorer and Firefox.<br />

Bandwidth and Codec<br />

The following Codecs shall be available:<br />

563<br />

G.711a<br />

G.729<br />

IP Configuration<br />

The voice vLAN will need to be built with sufficient bandwidth to support the required number of<br />

calls using the desired voice codec.<br />

The components of the platform shall be:<br />

BroadSoft BroadWorks Soft Switch<br />

Acme Packet Session Border Controllers<br />

Access Network (Daisy Data / Daisy Wholesale)


564<br />

Daisy managed CPE Router<br />

Customer Switches<br />

Customer IP phones<br />

Supply Options<br />

Daisy shall provide the Customer with three levels of functionality - Lite, Business and Premier.<br />

A Mobility Package shall also be available to add to any other functionality level.<br />

Lite <strong>Service</strong> Pack - Call Forwarding Busy / Authentication / Basic Call Logs / Call Forward Always /<br />

Call Forward No Answer / Call Forward Not Reachable / Calling Line ID Delivery Blocking / Calling Line ID<br />

Blocking Override / Calling Name Retrieval / Call Return / Call Transfer / Call Waiting / Connected Line<br />

Identity Presentation / External Calling Line ID Delivery / Flash Call Hold / Internal Calling Line ID Deliver<br />

/ Last Number Redial / Three Way Calling / Hunt Groups / Call Capacity Management / Intercept Group<br />

Business <strong>Service</strong> Pack shall include all features in the Lite <strong>Service</strong> Pack plus the following features:<br />

Anonymous Call Rejection / Automatic Call-back / Diversion inhibitor /Do Not Disturb /Speed Dial 100<br />

/Call Park / Call Pickup<br />

Premier <strong>Service</strong> Pack shall include all features in the Lite and Business <strong>Service</strong> Pack plus the<br />

following features:<br />

Alternate Numbers / Barge-In Exempt / Call Forwarding Selective / Call Notify / Custom Ring back<br />

User / Directed Call Pickup / Directed Call Pickup With Barge-In (DPUBI) / N-Way Call / Priority Alert /<br />

Privacy / Push to Talk / Selective Call Acceptance / Selective Call Rejection / Shared Call Appearance<br />

(Multiple Appearance Directory Numbers) / Account Authorisation Codes / Custom Ring back Group /<br />

Instant Group Call / Music On Hold / Personal Mobility Package<br />

Personal Mobility Package features shall include: Remote Office / Daisy Anywhere / Simultaneous<br />

Ring Personal / Sequential Ring / Multiple Call Arrangement Description (MCA)<br />

Handsets - A choice of either Cisco or Polycom handsets is available to the Customer for use with<br />

the Daisy Hosted Telephony Solution.<br />

Daisy Softphone - The Daisy Softphone application shall allow the Customer to make and receive<br />

calls from their PC/Laptop when connected to the internet. Daisy shall supply a Sennheiser USB headset<br />

with each softphone ordered. The softphone shall have a Premier license. As an alternative the<br />

Customer shall be able to install the softphone on an iPhone/Pad or Android device. This shall allow the


Customer to make and receive calls on their main number or DDI when they are connected to Wifi. The<br />

Customer will appear to be calling from their business phone number not the mobile phone number. It<br />

shall be possible for this service to be used anywhere in the world where the Customer has access to<br />

Wifi.All calls from the softphone to any other user in the Customer organisation are classed as “on net”.<br />

Headsets, analogue devices and digital DECT devices<br />

Daisy shall provide a range of headsets and analogue devices: Sennheiser DW Office Wireless HD<br />

Headset / Cordless Analogue DECT phone / SLT (Single line analogue telephone). Wireless digital DECT<br />

phones with full feature access shall also be available for areas where analogue signals are limited.<br />

Options<br />

Daisy shall provide the following optional features:<br />

Auto Attendant – This feature shall field inbound calls and deliver them to the intended destination<br />

through interactions with the caller. Auto Attendant is reached by dialling an associated phone number<br />

or an extension. Once connected to the Auto Attendant, the caller shall be played a greeting that<br />

provides a menu of options to complete call routing. The maximum recording length for Auto Attendant<br />

shall be five minutes. The menu is configured by the Customer and shall provide up to nine options to<br />

the caller. These include:<br />

565<br />

One-Key Dialling<br />

Operator Dialling<br />

Name Dialling<br />

Extension Dialling<br />

Immediate Extension Dialling<br />

Holiday Schedule<br />

Enhanced Business Hour Support<br />

Daisy Toolbar: The Customer shall have access to this desktop communications management<br />

product. The Customer shall be able to make and accept telephone calls, and change telephone settings,<br />

from within Microsoft Outlook, Internet Explorer and Firefox.<br />

The Customer shall be able to manage incoming and outgoing messages, maintain up-to date<br />

connection information, and configure controls on calls and voice mail. The Customer shall be able to<br />

view basic history and contact directories. The service shall provide click to dial capabilities and screen<br />

popping of incoming calls.


Daisy Receptionist Console: The Customer shall have access to a web tool that screens inbound<br />

calls.<br />

Call Centre: The Customer shall be able receive incoming calls from a central phone number. This<br />

facility allows the Customer to establish technical assistance lines, customer support numbers and<br />

order-taking centres. Multiple call centres are also supported.<br />

Voice Messaging –This service shall enable the Customer to record messages from callers for calls<br />

that are not answered within a specified number of rings or for calls that receive a busy condition. The<br />

maximum number of rings for the no-answer timer is 20 (inclusive).<br />

Fax to Email – This service shall enable the Customer to retrieve and manage fax messages from<br />

voice mailboxes and/or e-mail accounts.<br />

Call Recording – This hosted service allows Customers to retrieve call recordings via a dedicated web<br />

page. The Customer shall be able to store calls for a 6 month period and export recordings to a remote<br />

machine or drive. The service is FSA compliant.<br />

Daisy Web Portal – The Customer shall be able to control their services through any internet<br />

enabled device. The user shall have access to four tabs:<br />

· Profile<br />

· Calling Features<br />

· My Calls<br />

· Utilities<br />

The Administrator Web Portal shall allow Customer administrators to control personal and group<br />

services through any internet enabled device. The Customer administrator shall have access to eight<br />

tabs:<br />

· Group Profile<br />

· Departments<br />

· Manage Users<br />

· Group <strong><strong>Service</strong>s</strong> – Management of hunt groups and users that allows unscheduled changes.<br />

· Policies & Utilities<br />

566


· Directory – The corporate directory is shared across all phones and users regardless of location.<br />

· Disaster Redirect -Automatically diverts calls to an alternate number should the data connection<br />

experience a fault.<br />

· Call Details – Full real time details of all calls made, received and missed per extension of the<br />

Customers main phone numbers.<br />

Lead times and Implementation Process<br />

The Customer shall be provided with a full Proof of Concept based on interoperability tests carried<br />

out on test numbers using the proposed architecture. A dedicated SIP engineer shall format a test plan<br />

to be carried out in conjunction with the Customer.<br />

Lead time for the provision of new Ethernet service shall be 60 working days.<br />

Lead time for a new DSL service shall be 10 working days.<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer. Remote maintenance is included as a standard service.<br />

Daisy shall offer a range of enhanced service levels agreements on the hosted telephony service.<br />

The Customer shall also be able to request customised SLA packages if required.<br />

Enhanced <strong>Service</strong> Levels:<br />

Bronze Cover – Complete hardware cover available Monday to Friday (excluding bank Holidays)<br />

between the hours of 08:30 and 18:00. Faults that results in 50% system crash will receive a response<br />

within 8 working hours, all other system faults will receive a response within 16 working hours.<br />

Silver Cover - Complete hardware cover available Monday to Friday (excluding bank Holidays)<br />

between the hours of 08:30 and 18:00. Faults that results in 50% system crash will receive a response<br />

within 4 working hours, all other system faults will receive a response within 8 working hours.<br />

567


Gold Cover - Complete hardware cover available Monday to Friday (excluding bank Holidays)<br />

between the hours of 08:30 and 18:00. Faults that results in 50% system crash will receive a response of<br />

a man to site within 4 working hours, all other system faults will receive a response within 8 working<br />

hours.<br />

Platinum Cover - Complete hardware cover available Monday to Sunday (including bank Holidays)<br />

24 hours per day. Faults that results in 50% system crash will receive a response within 4 hours, all other<br />

system faults will receive a response within 8 hours<br />

Platinum Plus Cover - Complete hardware cover available Monday to Sunday (including bank<br />

Holidays) 24 hours per day. Faults that results in 50% system crash will receive a response of a man to<br />

site within 4 hours, all other system faults will receive a response within 8 hours<br />

Handsets - All of the above services exclude support of handsets which will be covered on a Next<br />

Business Day post out service.<br />

Cove<br />

r Level<br />

Cove<br />

r Type<br />

Avail<br />

able<br />

Syste<br />

m Crash<br />

Tech<br />

nical<br />

Response<br />

Resp<br />

onse to<br />

Site<br />

Othe<br />

r Faults<br />

568<br />

Bro<br />

nze<br />

Sil<br />

ver<br />

ld<br />

Go<br />

Plati<br />

num<br />

Plati<br />

num<br />

Plus<br />

Complete (parts & labour inclusive) Hardware<br />

Cover<br />

Monday to Friday<br />

(excluding bank Holidays)<br />

08:30 - 18:00<br />

<strong>Service</strong> Levels (working hours)<br />

Monday to<br />

Sunday (including<br />

bank Holidays) 24<br />

hours per day<br />

8 4 --- 4 ---<br />

--- --- 4 --- 4<br />

<strong>Service</strong> Levels (working hours)


Tech<br />

nical<br />

Response<br />

Hand<br />

set Faults<br />

569<br />

16 8 8 8 8<br />

Next Business Day post out service*<br />

The Customer shall be able to log system faults 24 hours a day, 7 days a week subject to the<br />

appropriate SLA response to site by a Daisy engineer as agreed with the Customer. Daisy operates a<br />

24x7 ITIL certified Technical <strong>Service</strong> Desk.<br />

EMAIL SCANNING AND FILTERING<br />

Daisy shall provide a Software as a <strong>Service</strong> (SaaS) application - MailDefender This provides email<br />

protection which includes anti-spam and anti-virus. The service shall update every five minutes with new<br />

anti-virus information. The Mail Defender product shall be hosted in a <strong>PSN</strong> compliant data centre.<br />

The MailDefender product shall scan for trojans, worms, viruses and phishing emails and other<br />

malware.<br />

MailDefender shall use multiple methods to identify virus emails.<br />

Heuristic scanning shall analyse email payloads for suspicious signs that might indicate that an email<br />

is carrying a new form of virus.<br />

The email shall then be passed across to the Sophos Anti-Virus engine to be analysed for the<br />

presence of known viruses.<br />

The Sophos Anti-Virus engine shall check for the latest updates from Sophos every 5 minutes.<br />

The email shall then be passed to the Clam and Cloudmark Anti-Virus engines for further scanning.<br />

Zero-hour anti-virus protection includes:<br />

Polymorphic viruses whose fingerprints have been identified as a virus shall be blocked.<br />

Zero-hour anti-virus shall provide support for content disposition. Viruses shall be identified and not<br />

classed as spam. This classification and reporting shall be available to the Customer.


The following methods shall be used to identify spam email. The Customer shall have the ability to<br />

modify these methods.<br />

Allow and deny lists – The Customer shall have the ability to override the system to ensure that<br />

specific email addresses are always blocked or always allowed through the system.<br />

A Web content scanner shall check URL links database.<br />

Graphometric scanner - a filter is used to scan qualified databases for unique spam characteristics<br />

and URLs.<br />

A language scanner shall check the character-set used.<br />

Spam Assassin – This shall allow the Customer to make use of a plug-in service for Mail Defender.<br />

Block lists - This facility shall check sources of email against databases of known spammers and<br />

openrelay checks.<br />

Suspected spam shall be placed in a quarantined area separate to the local network.<br />

Web based management reporting shall also be available to the Customer.<br />

Lead times and Implementation Process<br />

A Project Implementation Meeting shall be held with the Customer to establish and agree the<br />

timescales for the project roll out to include:<br />

· Implementation of MailDefender<br />

· Available management reports<br />

· Required training<br />

· Deployment plan<br />

· Review of the project implementation and agreed further actions.<br />

570


<strong>Service</strong> Level, Support and Maintenance<br />

571<br />

ty<br />

n<br />

Severi<br />

Severity<br />

Description<br />

Definition<br />

1 Critical The service is totally<br />

unusable and having a<br />

major impact on the<br />

Customer<br />

2 Very<br />

Important<br />

3 Importa<br />

nt<br />

4 Non-<br />

Urgent<br />

Admi<br />

SLA shall be agreed with the Customer.<br />

WEB ACCESS MANAGEMENT SERVICE<br />

The whole service is<br />

severely degraded and is<br />

having a significant impact<br />

on the Customer.<br />

The service is degraded<br />

and is having an impact on<br />

the Customer.<br />

A problem is<br />

inconvenient, but Time Out<br />

business not severely<br />

impacted<br />

Ad hoc E.g. A routine<br />

parameter type change is<br />

requested, or an additional<br />

security data backup is<br />

required. Does not affect<br />

normal service operation.<br />

Target<br />

Response<br />

Time<br />

15<br />

minutes<br />

15<br />

minutes<br />

15<br />

minutes<br />

15<br />

minutes<br />

Not<br />

applicable<br />

Target<br />

Fix Time<br />

22<br />

Hours<br />

1 hour<br />

2 hours<br />

4 Hours<br />

1<br />

working day<br />

Daisy shall supply a managed Internet security and protection Web Management <strong>Service</strong>, known as<br />

WebDefender.


Daisy’s Web Defender shall have the following components:<br />

- Anti spyware detection<br />

- Desktop firewall<br />

- Intrusion prevention and detection<br />

- Application controls<br />

Daisy’s Internet Access policy shall allow the Customer to set, control, view and allow/prevent which<br />

websites users can access. Administrator access shall be given through a GUI interface to allow the<br />

Customer to administer and control their user group’s settings.<br />

It shall be possible for this policy to be adjusted according to the time of day.<br />

54 URL categories shall be provided.<br />

Websites containing malicious software shall be blocked.<br />

The Customer shall have the ability to block instant messaging and peer to peer applications.<br />

WebDefender filtering is approved by Becta and meets BSI PAS:74 2008 Internet Safety Standard.<br />

Daisy shall provide Global, Group and Per-User Filtering with full Active Directory synchronisation.<br />

Daisy shall provide Dynamic Web categorisation.<br />

Daisy shall provide hosted deployment– WebDefender shall operate within a <strong>PSN</strong> compliant data<br />

centre.<br />

A historical reporting function shall be made available.<br />

An exception reporting function shall be made available.<br />

A mobile option shall be available for Customers accessing the web via 3G.<br />

572


<strong>Service</strong> Level, Support and Maintenance<br />

573<br />

ty<br />

n<br />

Severi<br />

Severity<br />

Description<br />

Definition<br />

1 Critical The service is totally<br />

unusable and having a<br />

major impact on the<br />

Customer<br />

2 Very<br />

Important<br />

3 Importa<br />

nt<br />

4 Non-<br />

Urgent<br />

Admi<br />

The whole service is<br />

severely degraded and is<br />

having a significant impact<br />

on the Customer.<br />

The service is degraded<br />

and is having an impact on<br />

the Customer.<br />

A problem is<br />

inconvenient, but Time Out<br />

business not severely<br />

impacted<br />

Ad hoc E.g. A routine<br />

parameter type change is<br />

requested, or an additional<br />

security data backup is<br />

required. Does not affect<br />

normal service operation.<br />

INTERNET INTRUSION DETECTION SERVICE (IDS)<br />

Target<br />

Response<br />

Time<br />

15<br />

minutes<br />

15<br />

minutes<br />

15<br />

minutes<br />

15<br />

minutes<br />

Not<br />

applicable<br />

Target<br />

Fix Time<br />

22<br />

Hours<br />

1 hour<br />

2 hours<br />

4 Hours<br />

1<br />

working day<br />

Daisy shall provide a pro-actively managed 24x7x365 IDS security monitoring service provided by<br />

Daisy’s Network Operations Centre - NOC. This Security Monitoring shall be available for all hosted<br />

services within the Daisy data centres and for MPLS delivered network services. IDS shall be delivered in<br />

the areas of Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). IDS-based security<br />

surveillance utilises a sensor that monitors a mirrored copy of the Customer’s Internet traffic. The IDS<br />

sensor has extended functionality that includes storing of traffic data and analysis of program files. This


shall make it possible for the Customer to detect unknown malicious/compromising software – including<br />

targeted attacks.<br />

Daisy’s IDS service shall have the following functionality:<br />

· Traffic Storage:<br />

o All the “sniffed” traffic shall be stored in a buffer on the sensor. This shall allow an analyst to go<br />

back in time (hours/days) to see how an attack started, how it was performed, and what happened after<br />

it was finished.<br />

o Data that is not downloaded for further analysis shall be overwritten by new data when the<br />

buffer is full.<br />

o The storage capacity shall be 300 GB or 1,4 TB and shall be dependent on the type of sensor. The<br />

time the data is stored shall depend on the amount of network-traffic at the point the IDS monitors.<br />

o IDS sensor capacity: 250 Mbit/s. At bandwidths over 250 Mbit/s, load balancing and multiple<br />

sensors shall be applied.<br />

· Dynamic malware analysis<br />

o All potentially dangerous files that are downloaded by the Customer shall be analysed by Daisy<br />

NOC. Daisy NOC shall use two different methods on each file:<br />

o Daisy NOC shall run a copy of all program files that are downloaded to the Customer through a<br />

total of 11 different antivirus products. If one of these products mark the program file as a threat, an<br />

analyst shall continue with further analysis of the data traffic (as previously described) to determine if<br />

the threat is real.<br />

Daisy NOC shall use the following antivirus products:<br />

574<br />

antivir<br />

avg<br />

avast


575<br />

clamwin<br />

f-prot<br />

f-secure<br />

kav<br />

nod32<br />

norman<br />

symantec<br />

trend<br />

o The same program file shall also be run through CW sandbox by Sunbelt. This shall be a<br />

full Windows implementation. The analyst shall receive a report that shows all changes<br />

that are made by the program file if it gets installed on the users’ PC.<br />

o The report shall include information on the following: - Automatic execution of new<br />

programs at startup - Changes made to the Windows Registry - Files that are<br />

created/deleted - Drivers that are installed - Processes that are created/deleted -<br />

Connections to servers on the Internet.<br />

On the basis of this information, compiled with the traffic from both before, during and after the<br />

download, an analyst shall determine if the downloaded file is malware or a legitimate program. Daisy<br />

SOC shall detect malicious software that is specially designed for attacks against the Customer.<br />

UTM & IPS<br />

Daisy shall use Fortinet IPS for automated security monitoring. Fortinet IPS (Intrusion Prevention<br />

System) shall be installed at the network edge or at the network core to protect critical business<br />

applications from both external and internal attacks.<br />

Backed by the automatic, real-time updates delivered by the FortiGuard, FortiGate IPS technology<br />

combines a customisable database of thousands of known threats to stop attacks that evade<br />

conventional firewall defences. The system contains anomaly-based detection that enables the system<br />

to recognise threats for which no signature has yet been developed.<br />

- Combined signature and protocol anomaly detection shall protect against known and unknown<br />

threats, with support for more than 1000 protocols and applications.


- Automatic updates of attack signatures from FortiGuard Intrusion Prevention <strong>Service</strong><br />

- Per-device/unlimited-user licensing<br />

- Detailed logging and reporting aid in auditing and forensic analysis.<br />

- Centralised management and reporting.<br />

Fortinet UTM<br />

Daisy shall provide Unified Threat Management (UTM) which provides a combination of all security<br />

functionality, including IPS.<br />

There is no user licensing and no requirement for external servers or third party products.<br />

Fortinet shall be used as firewall with full security control of the content or in transparent mode<br />

with an existing firewall.<br />

Fortinet’s models shall include firewalls with up to 112 interfaces and 182 Gbps performance. In<br />

addition, there shall be a central management, log and reporting system.<br />

The service shall cover the following<br />

· Antivirus scan of SMTP, FTP, HTTP, POP3 and IMAP<br />

· Antivirus scan of IPSEC/SSL VPN traffic<br />

· Intrusion Detection & Prevention (IPS)<br />

· Data Loss Prevention (DLP)<br />

· Application Control<br />

· WAN Optimization<br />

· SSL Inspection (content control of encrypted connections)<br />

· AntiSpam for SMTP and POP3<br />

· URL filter with more than 30 million sites and over 48 categories<br />

576


· SpyWare filter<br />

· Instant Messaging (IM) filter, logging and monitoring<br />

· Peer-to-Peer (P2P) filter, logging and monitoring<br />

· SSL VPN enables clientless VPN for external users<br />

· Full support for VLAN/LDAP/AD RADIUS/BGP/OSPF directly in rulesets<br />

· Dual WAN ports for redundant Internet connections (2xISP)<br />

· QoS for all rules including VPN and SSL<br />

· Virtuall firewalls with up to 500 unique firewalls in one unit<br />

· Parallel firewalls for high availability (Redundant, active/active)<br />

· Supports Intel AdvanceTCA (ATCA) Chassis for blade models<br />

· Bandwidth up to 182 Gbps, 28 million simultaneous sessions and 112 physical zones<br />

The service is comprised of monitoring elements in a switched network with IDS systems connected<br />

on both sides of the firewall.<br />

The sensors shall be connected to their listening points by a network adapter operating in stealth<br />

mode.<br />

All traffic monitored by the sensor shall be stored in the sensor using a cyclical buffer.<br />

Older data shall be overwritten when the hard drive is filling up.<br />

Data categorised as illegal shall set off alarms on the sensor which shall then be transferred to Daisy<br />

Network Operations Centre for analysis. Analysts shall carry out a more in-depth analysis by transmitting<br />

raw data, related to the event, to Daisy NOC giving them a more complete overview before contacting<br />

the Customer. Data shall also be checked by consulting the firewall, router or application logs.<br />

Daisy’s network based sensor (NIDS) shall be capable of doing a real-time based traffic analysis and<br />

packet logging on IP-networks. It shall carry out protocol analysis, content search and detect several<br />

attack patterns including:<br />

· Probing<br />

· Buffer Overflows<br />

· Stealth Scanning<br />

· CGI Attacks<br />

· SMB Probes<br />

577


· OS Fingerprinting<br />

The Daisy signature database contains over 3000 known attack patterns. The database shall be kept<br />

updated by Daisy’s signature group, Sourcefire and other groups. The sensor shall also detect policy<br />

violations like P2P usage, IRC/MSN and Unauthorised fileservers<br />

The IDS-service shall contain the following on delivery:<br />

· Equipment<br />

o Sensor – 19” 1 or 2 U server installed on a sniffing point<br />

· Documentation<br />

o The Customer shall , before installation , fill out the necessary installation parameters in an<br />

installation document. This document shall also provide a description of the <strong>Service</strong><br />

· Software (included in the IDS sensor)<br />

o The sensor shall contain a complete system for gathering and raw sorting of data that shall be<br />

used by an analyst for further study.<br />

o Web server for use by authorised users within the Customer’s organisation. The web interface<br />

shall be used for distribution of reports and messages to the Customer.<br />

o A gateway for secure communication between Daisy NOC and SOC and authorised users.<br />

o Forensic tools<br />

Data collection and analysis<br />

Collected data shall be stored on the sensor. Alarm data is transferred automatically through an<br />

encrypted Open VPN tunnel from all sensors and agents to Daisy’s central database for study and<br />

analysis at DAISY NOC 24 hours a day.<br />

Daisy’s security analysts shall perform analysis and checks of both the alarm data and local data<br />

gathered over the same Open VPN connection.<br />

Reporting<br />

Characterisation of events:<br />

578


- Red events shall be defined as attacks or attempted attacks presenting an immediate danger<br />

to the Customer’s network or network services: systems that are already compromised or are in<br />

immediate danger of being compromised. Red events shall be reported according to table 1.<br />

- Orange events shall be defined as attacks or attempted attacks which may result<br />

in systems being compromised if no action is taken within a reasonable period of time.<br />

- Yellow events are less targeted surveys, scans, sweeps and probes. These events provide<br />

important early warnings, as well as the basis for continually enhancing security and preventive<br />

activities.<br />

The target groups for these reports shall be a) Operations and security personnel, and b) staff with<br />

responsibility for business services. The Customer shall define this target group and Daisy shall report<br />

only to the specified persons / functions.<br />

Two procedures for reporting shall be agreed upon; one for normal reports and one for serious<br />

incidents.<br />

Reporting of events shall be carried out as per the below table:<br />

Reporting per incident category<br />

Inci<br />

dent<br />

type<br />

Ora<br />

nge<br />

Yell<br />

ow<br />

579<br />

Type of contact<br />

Max. time from<br />

incident to report<br />

Red Phone, secure e-mail or SMS 0.5 hours 10<br />

Malware analysis<br />

Phone, secure e-mail or SMS 1 hour 5<br />

Web-based reporting 12 hours 0<br />

Max. number of<br />

repetitions<br />

Daisy has an advanced lab for the analysis of viruses and trojans on the machine code level. This lab<br />

shall allow the Customer to uncover hidden functionality in malicious code, such as mechanisms for selfreplication<br />

or destructive behaviour. The lab shall be combined with Daisy's IDS service, where data


packets are stored on the sensor for a limited time so that the trojans / viruses are available for<br />

immediate analysis in the event of an emergency.<br />

From the sensors web-interface, the Customer shall have the ability to access reports that are<br />

generated every hour. Historical, weekly reports shall also be made available.<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer<br />

Daisy shall provide a 99.97% SLA on network and power availability<br />

Daisy data centres shall be monitored by qualified engineering staff 24 hours per day, 7 days per<br />

week. Calls between 8am - 10pm, Monday to Friday (9am – 9pm Saturday and Sunday) shall be handled<br />

by the technical support team. Calls outside those hours shall be routed to the Network Operations<br />

Centre.<br />

Security Accreditation Considerations<br />

Where this service is provided to <strong>PSN</strong> customers at 2-2-X or greater levels of C, I and A, the service<br />

shall be logically separated from non-<strong>PSN</strong> clients and undertaken in accordance with the requirements<br />

of CESG’s GPG 13. The Protective Monitoring Controls shall therefore follow the respective<br />

Segmentation Model requirements for “Aware” and “Deter” and will form part of the <strong>PSN</strong> Accredited<br />

service.<br />

The management of the capability shall also be addressed within the ISO27001 ISMS and <strong>PSN</strong><br />

RMADS.<br />

Output from the service provided for legal/law enforcement purposes shall be compliant with the<br />

guidance in BIP 0008.<br />

MANAGED DDOS PREVENTION SERVICE<br />

580


Daisy shall provide a Managed DDoS Prevention <strong>Service</strong> which shall be a network based traffic filter<br />

that shall detect Distributed Denial of <strong>Service</strong> (DDoS) attacks and clean attack traffic before it reaches<br />

the destination address in sufficient volumes to cause disruption to the Customer’s network.<br />

The Customer shall be configured with their own unique profile/zone on the Detector.<br />

- The zone traffic threshold levels shall be specific to the Customer and shall be learnt over a seven<br />

day period<br />

- The zone shall be automatically protected<br />

- The zone shall be monitored 24x7x365<br />

- The Customer shall receive a courtesy call when an attack is detected<br />

- The Customer shall receive an attack report by email within 24 hours.<br />

- There shall be no rate-limiting on cleaned traffic toward the zone<br />

Proactive Customers shall be configured on the Guards immediately following installation for a<br />

period of 7 days. The Customer’s traffic profile shall be analysed and thresholds shall be set following<br />

this period.<br />

Attack traffic shall be defined as but not limited to<br />

• Spoofed and non-spoofed attacks<br />

• TCP (syns, syn-acks, acks, fins, fragments) attacks<br />

• User Datagram Protocol (UDP) attacks (random port floods, fragments)<br />

• Internet Control Message Protocol (ICMP) attacks (unreachable, echo, fragments)<br />

• Domain Name System (DNS) attacks<br />

• Client attacks<br />

• Inactive and total connections attacks<br />

• HTTP Get Flood attacks<br />

• Border Gateway Protocol (BGP) attacks<br />

• Session Initiation Protocol (SIP) voice over IP (VoIP) attacks<br />

This shall be monitored by the Detector by the use of a Multi Verification Protocol which shall look<br />

for anomalies in relation to traffic flows, connections and protocols against the thresholds learned.<br />

Increase in volume shall not be a trigger by itself.<br />

581


Once the Detector determines the presence of a potential malicious flow or anomaly, it shall alert<br />

the Guard via SSH.<br />

The Guard shall then make a routing announcement to its own up-stream routers, which shall divert<br />

all traffic destined for the victim’s IP address to be re-routed through the Guard as its next-hop. The<br />

Guard shall then begin its analysis phase, if the traffic is determined by the Guard to be malicious it shall<br />

begin to filter out the attack traffic based on the rules learned..<br />

Legitimate traffic shall continue to be delivered to the Customer’s protected zone unhindered.<br />

When the Guard determines that the attack has ceased, a further announcement shall instruct the<br />

Core Routers to resume normal routing.<br />

A report shall then be generated and collated, and then be made available to the Customer.<br />

Lead times and Implementation Process<br />

Proactive Customers shall be configured on the Guards immediately following installation for a<br />

period of 7 days. The Customer’s traffic profile shall be analysed and thresholds shall be set following<br />

this period.<br />

The enrolment process shall co-ordinate the activities of bringing a Customer into the Security<br />

Managed <strong>Service</strong> whilst meeting all Pre-Requisites. Enrolment activities shall be performed by Daisy.<br />

Security Policy Definition and Review<br />

Daisy shall gather information and requirements from the Customer to create and complete F1034-<br />

MDDP Proactive Questionnaire.doc, which shall define the Traffic Management rules that the MDDP<br />

Proactive service shall implement. Once agreed with the Customer, this policy document shall be used<br />

as the basis of the Customers’ traffic profile.<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer.<br />

582


Designated Security Contacts:<br />

The Customer shall provide two or more staff members to be the security contacts (CSC).<br />

Full contact and authentication details for each security contact shall be provided by the Customer.<br />

A Customer Security Contact (CSC) shall be accountable for:<br />

a) Making security decisions on behalf of the Customer<br />

b) Requesting and authorising changes to the MDDP Proactive security configuration.<br />

Monitoring<br />

Daisy shall monitor the Customer Zone 24 hours a day, seven days a week, 365 days a year. Alerts<br />

shall be generated automatically in real time at the Customer Site and shall be captured at the Daisy<br />

Network Operations Centre (NOC) and Operational Management Centre (OMC).<br />

Alert Escalation and Response<br />

Alerts sent from Detectors and arriving at the Daisy NOC/OMC shall be logged, acknowledged,<br />

analysed and then escalated as appropriate. Alerts that may impact Security and/or <strong>Service</strong> delivery<br />

shall be escalated to the Customer Security Contact.<br />

Attacks shall be handled according to specific Customer requirements.<br />

Security Accreditation Considerations<br />

Where this service is provided to <strong>PSN</strong> customers at 2-2-X or greater levels of C, I and A, the service<br />

shall be logically separated from non-<strong>PSN</strong> clients and undertaken in accordance with the requirements<br />

of CESG’s GPG 13. The Protective Monitoring Controls shall therefore follow the respective<br />

Segmentation Model requirements for “Aware” and “Deter” and will form part of the <strong>PSN</strong> Accredited<br />

service.<br />

The management of the capability will also be addressed within the ISO27001 ISMS.<br />

Output from the service provided for legal/law enforcement purposes shall be compliant with the<br />

guidance in BIP 0008<br />

CO-LOCATION SERVICES<br />

583


Daisy shall deliver a Co-Location <strong>Service</strong> through one of its ISO27001 accredited Data Centres.<br />

Daisy shall deliver Co-location facilities on a whole (40U) or half (20U) rack basis.<br />

Power shall be made available in units of 8 Amps or 16 Amps with redundant “commando” sockets.<br />

Daisy shall provide the following facilities to the Co-location Customer.<br />

- Metered power sockets<br />

- Single or multiple 100/1000 Mbps Ethernet switch ports<br />

- 16 Amps (40 Units) of electricity equalling 3.84kW of power draw and cooling (rates at 16 Amps)<br />

- 8 Amps (20 Units) of electricity equalling 1.92kW of power draw and cooling (rates at 16 Amps)<br />

Up to 5 shelves upon which the Customer Equipment must be placed - it shall be possible for the<br />

profile of the Rack mounting posts to be adjusted by the Customer to meet their requirements. Daisy<br />

shall perform checks to ensure that servers are not packed too tightly causing heat generation above the<br />

requirements for 3.84kW power draw.<br />

Options<br />

The following modules are available as additional “redundant” services<br />

· Additional Ethernet ports for resiliency.<br />

584<br />

Additional power strips or commando sockets of 16 amps of electricity (Rated at 16 Amps).<br />

Additional Shelves<br />

Daisy shall provide additional services in the form of “<strong>Service</strong> Modules”.<br />

Remote Hands <strong>Service</strong> Module<br />

The Remote Hands <strong>Service</strong> shall include;<br />

24x7x365 Power Cycling of equipment


585<br />

Re-starting a windows or Linux operating system service, process, application or daemon<br />

Cable organisation , ties or labelling<br />

Pushing a button<br />

Observing, describing or reporting on indicator lights or display information on machines or<br />

Consoles;<br />

Observing and reporting on return air temperature measurement within the Data Centre;<br />

Media insertion;<br />

Modification of cable layout between Customer Equipment;<br />

Managed reboot and file system check (fsck);<br />

Swapping hot swap disks in the event of a RAID array failure;<br />

Escorting third parties to and from customer racks<br />

Co-Location Tape Rotation <strong>Service</strong> Module.<br />

Daisy shall provide the service on a weekly, monthly or daily basis.<br />

The service shall be limited to a single tape swap per device per day. Multiple tape swaps shall be<br />

performed on the purchase of multiple modules.<br />

The tape swaps shall be carried out between the hours of 15.00 and 17.00 daily.<br />

Co-Location Operational Recovery <strong>Service</strong> Module for Harbour Exchange and Server Bank Data<br />

Centres.<br />

The Operational Recovery service shall back up specified content of a Customer’s server(s) onto a<br />

disc based storage platform. Daisy shall restore the data when requested by the Customer.<br />

The following data options shall apply to this service:<br />

File system<br />

Database


The Customer shall define the Server(s), the Directories or Databases to be backed up along with the<br />

backup schedule.<br />

Back-ups shall take place at regular intervals during regular daily windows, typically, but not always,<br />

this shall be out of office hours between 12:00am and 08:00am. The Customer shall be able to specify a<br />

preferred day for a full back up.<br />

Backup Solution<br />

File System Backup<br />

586<br />

Daily Full<br />

Backup<br />

Weekly Full<br />

Backup<br />

MS File System<br />

Agent P P P<br />

UNIX File System P P P<br />

LINUX File System P P P<br />

MS System State P x x<br />

Flatfile Backup of Databases<br />

MSSQL P P x<br />

Oracle P P x<br />

MySQL/DB2/Other P P x<br />

Retention - Backed up data shall be held on disc by Daisy for a period of 14 days.<br />

Weekly Full & Daily<br />

Incremental Backup<br />

Installation - Daisy shall install a File System backup client on the <strong>Service</strong> Equipment.<br />

Back-up File System - The data being backed up shall be in the format of closed, flat files. The<br />

Customer shall specify which directories should be backed up.<br />

The managed back-up routine shall only copy flat files. Open files or running databases shall not be<br />

backed-up.


For Windows users, any open files and running databases shall need to be dumped to a specified<br />

location. For Unix/Linux users if the file is being written to, then the back up shall be an arbitrary<br />

snapshot.<br />

The managed back-up service shall not copy data from ‘network shares’ outside the Daisy data<br />

centre.<br />

The amount of disc space required shall be estimated per server based on the amount of data to be<br />

backed up and the backup method.<br />

Encryption - Encryption shall be facilitated using the data agent installed as standard on the <strong>Service</strong><br />

Equipment. The data encryption algorithm used shall be AES with a 256 bit symmetrical key.<br />

Encryption and decryption shall be performed on the Customer server. All data in flight to the media<br />

and at rest on the media shall be encrypted.<br />

The encryption and decryption process shall use CPU cycles on the Customer server.<br />

The CPU overhead of encryption shall be between 20% to 40%. For Customers using a 100<br />

megabit/second connection to the admin LAN, there shall be no affect to the backup window.<br />

Encrypted data shall consume the same footprint on the storage platform as non-encrypted data.<br />

Growth - Backup volumes shall not be limited but shall be monitored monthly.<br />

Restore and Change - The Customer shall be able to request a restore of their data or change to<br />

their service by placing a call to the Daisy <strong>Service</strong> Desk and raising a ticket.<br />

The Customer may make requests for Data Restores for disk based storage.<br />

Operational Recovery service shall include 2 change requests by the Customer per calendar month.<br />

Data restores shall only be initiated when requested by the Customer.<br />

587


<strong>Service</strong> Level Agreements - Restore 2 hours to initiate in business hours (08:00 to 18:00, Monday to<br />

Friday, excluding public holiday), 4 hours to initiate outside of business hours.<br />

Lead times and Implementation Process<br />

Daisy shall deliver Co-location Space within 5 working days.<br />

Daisy shall allocate as many IP addresses as the Customer requires, subject to justification and any<br />

maximum limits imposed by Réseaux IP Européens (RIPE).<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer<br />

Daisy shall provide a 99.97% SLA on network and power availability<br />

Daisy Data Centres shall be monitored by qualified engineering staff 24 hours per day, 7 days per<br />

week. Calls between 8am - 10pm, Monday to Friday (9am – 9pm Saturday and Sunday) shall be handled<br />

by the technical support team. Calls outside those hours shall be routed to the Network Operations<br />

Centre (NOC) who will then engage appropriate support escalation paths within the Data Centres.<br />

ENTERPRISE AND APPLICATION HOSTING<br />

Daisy shall deliver an Application Hosting <strong>Service</strong> in one of its ISO27001 accredited Data Centres.<br />

Daisy shall provide the following facilities to the hosting Customer.<br />

- Pro-actively managed and supported Cisco ASA 5505 firewall<br />

- Remote administration facility<br />

Options<br />

Within Enterprise Hosting<br />

588


Daisy shall provide a choice of database MS SQL Sever 2003, 2008 Standard or Enterprise or MySQL<br />

2005 Workgroup Edition<br />

Daisy shall provide a choice of 2 or 4 GB DDR2 RAM<br />

Daisy shall provide an E5420 Quad Core chassis or HP DL360 Quad Core Chassis<br />

Daisy shall provide a choice of :<br />

2x160GB SATA RAID 1 HDDs<br />

3x147GB SAS RAID 5<br />

4x147GB SAS RAID 5/10<br />

Daisy shall provide MS Windows Server 2003 Standard Edition, MS Windows Server 2008 Web<br />

Edition or Data Centre Edition with IIS 6 or Redhat v5 with Apache.<br />

Within Application Hosting<br />

Daisy shall provide a choice of Monitoring and Management.<br />

Daisy shall provide a choice of three different HP server specifications – Web, Application, Database.<br />

Daisy shall provide a 99.97% <strong>Service</strong> Level Agreement (SLA).<br />

Daisy shall provide 4 hour Hardware replacement.<br />

Daisy shall provide 24/7x365 Support.<br />

Daisy shall provide a choice of Supported or Managed REDHAT Linux V4 or v5 with Apache, Lighty<br />

and PHP.<br />

Daisy shall provide a choice of Supported or Managed MS Windows Server 2003 or 2008 with<br />

Internet Information <strong><strong>Service</strong>s</strong> (IIS).<br />

589


Customer additional options shall include:<br />

• Operational Recovery (per server).<br />

• Enhanced Server Monitoring & Patching (per server).<br />

• Redundant Power Supply.<br />

• Managed Intrusion Detection System (IDS).<br />

• Software or Hardware Dedicated Load Balancing.<br />

• Managed Cisco or Juniper Firewall.<br />

• Offsite Tape Backup.<br />

• MS SQL 2005 or MySQL or Oracle 10g database.<br />

• Managed Layer 2 Switch.<br />

Daisy shall supply the following additional modules on request provided other qualifying modules<br />

are in place.<br />

For Enterprise Hosting - Enhanced Server Monitoring and Patching Module<br />

The service shall include Basic Server Monitoring.<br />

Daisy shall install, configure and test the system probe on the <strong>Service</strong> Equipment that shall monitor<br />

the following activities:<br />

Windows 2008 / Windows 2003: CPU - percentage used over a short and long cycle; File System<br />

Capabilities - warning and critical capacity thresholds; Memory Usage - percentage of physical memory<br />

in use; <strong>Service</strong> Monitor - reports on the status of a service as agreed with the Customer.<br />

Solaris / Linux Red Hat: CPU - 5 and 15 minute load average of the number of processes active /<br />

waiting for the CPU; File system Capabilities - warning and critical capacity thresholds; Swap Activity -<br />

Percentage of swap space used; Process Monitor - various processes as agreed with the Customer.<br />

The Customer shall be able to set up threshold management alerts through the SCAMP interface:<br />

590


The Daisy SCAMP system shall inform Customers when their server reaches pre-defined utilisation<br />

thresholds. Pre-defined thresholds are set within the SCAMP service. The thresholds cover the following<br />

criteria: CPU Utilisation; Hard Disk Capacity; RAM utilisation.<br />

Upon Customer request Daisy shall provide automated graphical reports on CPU, memory and disk<br />

usage.<br />

Daisy shall patch the Customer’s Operating System software: Daisy subscribes to vendor update<br />

mailing lists detailing patching requirements. These lists shall be the primary source of any security<br />

breach information. Daisy shall evaluate available patches and test the updates; Daisy shall then decide<br />

whether any advisory is a service affecting vulnerability.<br />

The vulnerabilities shall be broken down into 2 levels: Critical: Flaw that needs updating<br />

immediately; Non-Critical: Patch that shall enhance or optimise an application or service performance.<br />

Supported Customers shall be notified proactively, but patched reactively. Specifically Supported<br />

Customers shall be e-mailed for permission to patch the servers.<br />

Managed Customers shall be notified proactively, and patched proactively. Daisy shall seek<br />

confirmation before patching.<br />

Software Network Load Balancing Module<br />

The Customer must have a minimum of 2 nodes within the Network Load Balanced (NLB) Cluster.<br />

The maximum nodes in an NLB Cluster is 32.<br />

Network Load Balancing shall only be carried out on Web and Application Servers.<br />

Any Databases must use the specific technologies for that platform.<br />

Daisy shall configure the Network Load Balanced Cluster within the Operating System boundaries:<br />

- Runs on the server(s) to be load balanced<br />

- Presents a Virtual Internet Protocol (VIP) TCP/IP Address for the servers in the NLB Cluster.<br />

591


- Distributes incoming TCP connections and User Datagram Protocol (UDP) datagrams among the<br />

servers in the NLB Cluster.<br />

NLB session persistence (affinity) options shall be limited to ‘none’, ‘single host’ or IP address (s)<br />

only.<br />

Hardware Provision Module<br />

On installation Daisy shall: Install the <strong>Service</strong> Equipment in the Data Centre; Install the Customer’s<br />

Operating System; Physically configure <strong>Service</strong> Equipment; Connect the <strong>Service</strong> Equipment to the Daisy<br />

Data Centre & Network; Carry out end to end Connectivity testing.<br />

As required on an ongoing basis by the Customer, Daisy shall replace faulty parts or <strong>Service</strong><br />

Equipment.<br />

Managed Operating System Module<br />

Root Access shall be owned exclusively by Daisy and Daisy shall perform Operating System<br />

Management Tasks proactively. Daisy shall keep an audit trail of the patch status for each server;<br />

- Operating System Management Tasks: Common Operating System Management Tasks on both<br />

Linux / Solaris and Windows:<br />

- Base Operating System installation and configuration.<br />

- Customer Security policy implementation.<br />

- Disk, Logical Volume and File system configuration.<br />

- Adding Users and Groups to the system configuration.<br />

Server Network <strong><strong>Service</strong>s</strong> configuration shall include:<br />

Process and system resource configuration; Secure access configuration; Customer provided<br />

SSL Certificate installation; Disk fault-tolerance test and disk partition creation; Windows <strong>Service</strong> Pack<br />

592


and Hot-Fix Patch installation; Dump file creation; Log file creation; Removal or disabling of any<br />

unnecessary Operating System components; Operating System Security Hardening; Operating System<br />

vendor liaison; Response to Enhanced Monitoring System alerts; Tuning of Operating System.<br />

Linux / Solaris specific Operating System Management Tasks shall include Kernel configuration.<br />

Daisy shall manage faults proactively.<br />

Supported Database Module<br />

MySQL/Oracle specific: Database Administrator (DBA) Access shall be shared between Daisy and the<br />

Customer.<br />

MS SQL: Database Administrator (DBA) Access shall be given to the Customer.<br />

Common Database Support Tasks on SQL, MySQL and Oracle:<br />

Database installation and configuration; ‘Database’ creation (Oracle Specific); ‘Server’ creation (MS<br />

SQL/ MySQL specific) ; Creation of data files and disk structures; Customer Security policy<br />

Implementation.<br />

Daisy shall evaluate available patches and test the updates. Daisy shall advise the<br />

Customer if any advisory is a service affecting vulnerability. The vulnerabilities shall be broken down<br />

into 2 levels:<br />

Critical: Flaw that needs updating immediately;<br />

Non-Critical: Patch that shall enhance or optimise an application or service performance.<br />

Daisy shall install Non-Critical Database within 5 Working Days of the Customer confirming their<br />

consent to do so;<br />

Additional Database Support Tasks for Oracle Customers: Installation &<br />

configuration of Oracle*Net.<br />

Fault Management shall be triggered by Daisy under the ‘Standard Monitoring’ module.<br />

593


Supported Firewall <strong>Service</strong> Module<br />

Daisy shall install and configure the firewall in the data centre. The default firewall shall be without<br />

DMZ capability.<br />

The Firewall configuration:<br />

Supported Firewall <strong>Service</strong> standard configuration: Configuring the public IP range; Configuring the<br />

private IP range; By default, all inbound traffic shall be denied except http and https; By default,<br />

outbound traffic only over the following ports http, https, ftp, smtp and DNS.<br />

Firewall Maintenance:<br />

It shall be possible for the Customer to request the creation of 1 VPN tunnel.<br />

Routine Management shall include: Routine changes due to software update release. Changes shall<br />

be noted centrally by Daisy. Update software releases, updates and advisory notices as issued by the<br />

<strong>Service</strong> Equipment Supplier. Updated software releases of the firewall operating system shall be<br />

downloaded and installed to the firewall by the Daisy SOC if deemed necessary. Operating system<br />

updates shall not be installed until a maintenance window of at least 1 hour has been agreed with a<br />

Customer.<br />

Standard Backup and Recovery <strong>Service</strong> Module<br />

The Managed Backup <strong>Service</strong> shall back up the specified content of a Customer’s server(s) onto a<br />

disk based storage platform. Daisy shall restore the data when requested by the Customer.<br />

All back-ups shall be made to disk only.<br />

Backups shall take place between 00:01 and 07:59.<br />

Daisy shall install a File System backup client on the <strong>Service</strong> Equipment.<br />

Back-up File System<br />

Restore and Changes:<br />

594


The Customer shall be able to restore data to their server’s directories.<br />

Daisy shall initiate a restore within 4 hours.<br />

For Application Hosting<br />

Operational Recovery <strong>Service</strong> Module<br />

The Operational Recovery <strong>Service</strong> shall back up specified content of a Customer’s server(s) onto a<br />

disc based storage platform. Daisy shall restore the data when requested by the Customer.<br />

Off Site Tape Applicability:<br />

An off-site tape solution shall be provided by purchasing the optional module F12112 Off-Site.<br />

Tape Backup <strong>Service</strong> Module.doc.<br />

Data options Operational Recovery<br />

File System<br />

Database<br />

Scheduling<br />

Daisy Managed Traffic Manager or “Load Balancer”<br />

Daisy shall provide an optional “load balancing “service for the management of website traffic.<br />

The F5 Traffic Manager is a dedicated appliance using algorithms that allocate http and https traffic<br />

to multiple web servers within a Customer’s solution. Two BigIP 3400 Traffic Managers terminate and<br />

initiate SSL connections between the World Wide Web and the Traffic Manager appliance.<br />

595


The two primary functions of the service shall be:<br />

- The load balancing function which shall be allocated on a throughput basis. The base offering shall<br />

be 10Mbp where the throughput is upgradeable in 5Mbps increments up to a maximum limit of<br />

20Mbps.<br />

- The SSL acceleration which shall be measured in transactions per second (TPS) where the opening<br />

allocation is 25 TPS. The TPS shall be upgradeable in 25 TPS up to a limit of 100 TPS.<br />

Off Site Tape Backup <strong>Service</strong> Module<br />

It shall be possible for Customers to have their data stored on digital tape media at a secure location<br />

off-site if requested.<br />

Daisy shall be responsible for the scheduling and the write of the data to digital tape media, the<br />

swap of the tape from the tape drive, the hand off of the tape to go off-site to <strong>PSN</strong> Compliant Storage<br />

Partner, the initiation of restore from tape once the tape is returned by <strong>PSN</strong> Compliant Storage Partner.<br />

The data shall be written from the existing data set backed up onto disk on the operational recovery<br />

managed backup solution. This shall reflect the scheduling and retention period contracted to the<br />

Customer in the operational recovery module.<br />

Off-Site Tape Backup shall be scheduled as follows:<br />

596<br />

Daily<br />

Weekly<br />

Monthly<br />

A <strong>PSN</strong> Compliant Storage Partner shall provide Off-Site Tape Backup pickup drop off and storage.<br />

Back-ups shall take place at regular intervals during regular daily windows It shall be possible for the<br />

Customer to select a preferred day for a full back up.<br />

Retention: Backed up data shall be held on disk by Daisy for a period of 14 days.


Installation: Daisy shall install a File System backup client on the <strong>Service</strong> Equipment.<br />

<strong>Service</strong> Level Agreements<br />

SLA shall be agreed with the Customer.<br />

Restore: 2 hours to initiate in business hours (08:00 to 18:00), 4 hours to initiate outside of business<br />

hours (18:01 to 07:59).<br />

With storage platform failure, time taken to rebuild storage platform plus restore time, 2 hours to<br />

initiate in business hours (08:00 to 18:00), 4 hours to initiate outside of business hours (18:01 to 07:59).<br />

Restore for off-site tape backup shall be detailed in the Offsite Tape Backup Module.<br />

Lead times and Implementation Process<br />

Daisy shall deliver Enterprise Hosting Space within 10 working days.<br />

Daisy shall allocate IP addresses per server and an additional IP address for the firewall.<br />

• 2 IP addresses for the first server.<br />

• 2 IP addresses for the second server.<br />

• 2 IP addresses for the third server.<br />

• 1 IP address for firewall.<br />

• 1 IP address for Managed Backup service (when applicable).<br />

Each server needs 2 IP addresses, one for the uplink and one for the back-up LAN.<br />

Daisy shall take responsibility for the following aspects of the Application Hosting Implementation;<br />

- Technical design of the solution as appropriate<br />

- Configuration of all hardware<br />

- Provisioning of the solution with immediate 24/7 support<br />

597


<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer.<br />

Daisy shall provide a 99.97% SLA on network and power availability.<br />

Daisy data centres shall be monitored by qualified engineering staff 24 hours per day, 7 days per<br />

week. Calls between 8am - 10pm, Monday to Friday (9am – 9pm Saturday and Sunday) shall be handled<br />

by the technical support team. Calls outside those hours shall be routed to the Network Operations<br />

Centre (NOC) who shall then engage appropriate support escalation paths within the data centres.<br />

Daisy shall provide 4 hr hardware replacement.<br />

Daisy shall guarantee 100% uptime.<br />

Daisy shall provide up to 100Mbs bandwidth.<br />

Daisy shall maintain the following components:-<br />

Server Hardware<br />

Firewall<br />

Firewall management<br />

The Customer shall remain responsible for the maintenance of the Operating system and the<br />

Database.<br />

SNMP, ICMP and TCP/IP polls shall validate the availability of the following elements of each <strong>Service</strong><br />

as listed below.<br />

<strong>Service</strong><br />

598<br />

SNMP Poll<br />

and Trap of<br />

Switch Port on<br />

Data Centre LAN<br />

ICMP Poll of<br />

Server's Internet<br />

Facing IP Address<br />

TCP/IP Poll<br />

of Active*<br />

Ports on the<br />

Server<br />

Poll of a<br />

Running Instance<br />

of a Named<br />

<strong>Service</strong>**


Supported O/S<br />

Standard Monitoring<br />

Supported O/S<br />

Enhanced Monitoring<br />

and Patching<br />

599<br />

Yes No No No<br />

Yes Yes Yes No<br />

*Active Ports are defined as those that are configured to deliver the <strong>Service</strong> by Daisy Data Centre<br />

technical staff.<br />

**A Named <strong>Service</strong> is an Application or Database<br />

Daisy shall monitor the <strong>Service</strong> Elements via ICMP, SNMP or dedicated agent polls. The polling<br />

device polls every 5 minutes and if failure occurs shall attempt 2 further polls at 1 minute intervals. If all<br />

3 polls are unsuccessful, the <strong>Service</strong> Element shall be declared unavailable. The polling devices shall<br />

continue to poll the <strong>Service</strong> and shall declare the <strong>Service</strong> to be available when it responds to this polling.<br />

STORAGE AND OPERATIONAL RECOVERY<br />

Daisy shall offer four different back-up types for Storage and Operational Recovery:<br />

Daily Full - The entire defined data-set shall be fully backed up every day.<br />

Weekly Full and Daily Incremental File System* - The entire file system data-set shall be backed up<br />

weekly, followed by daily back-ups of data that has changed since the last full or daily incremental backup.<br />

* This shall not include the back up of flat file databases.<br />

Weekly Full and Daily Incremental of Databases** - The entire database data-set shall be<br />

dynamically backed up weekly, followed by daily backups of data that has changed since the last full or<br />

daily incremental back-up. ** Data agent shall be required for this option, incremental back-ups using<br />

data agents shall be performed using transaction logs.<br />

Weekly Full<br />

The entire data-set shall be backed up weekly.


Backup Solution<br />

File System Backup<br />

600<br />

Daily<br />

Full<br />

Backup<br />

Weekly<br />

Full Backup<br />

MS File System Agent P P P<br />

UNIX File System P P P<br />

LINUX File System P P P<br />

MS System State P × ×<br />

Dynamic Backup of<br />

Databases<br />

MSSQL Agent P P P<br />

Oracle Agent P P P<br />

Flatfile Backup of<br />

Databases<br />

MSSQL No Agent P P ×<br />

Oracle No Agent P P ×<br />

MySQL/DB2/Other - No<br />

Agent P P ×<br />

Weekly Full &<br />

Daily Incremental<br />

Backup<br />

Backed up data shall be held on disc by Daisy for a period of 14 days<br />

This service shall be available to Daisy hosted Customers<br />

Lead times and Implementation Process<br />

Daisy shall install a File System backup client on the <strong>Service</strong> Equipment<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer.


Restore 2 hours to initiate in business hours (08:00 to 18:00, Monday to Friday, excluding public<br />

holidays), 4 hours to initiate outside of business hours.<br />

MESSAGING SERVICES<br />

Daisy shall offer a bulk SMS service - Daisy Messaging. This service shall include access to a set of<br />

SMS tools delivered through the messaging platform.<br />

Short Codes / Keywords<br />

� An inbound number 5 digits long<br />

� A short code shall be used in combination with a keyword. It shall be possible to check keyword<br />

availability on shared short code (60006)<br />

� Daisy shall provide keywords as requested on the Customer’s Dedicated Short Code<br />

� Keywords shall be a minimum of 3 characters long (alphanumeric)<br />

� Use for data collection<br />

� Inbound messages shall respond on keywords of the Customer’s choice<br />

� The Customer shall be able to use the short code as the originator to initiate 2 way<br />

communications<br />

� Individual keywords shall allow reporting and onward tracking<br />

Long Numbers<br />

� Daisy shall provide dedicated long numbers<br />

� The Customer shall be able to set up as many keywords as required<br />

� A dedicated long number shall provide an additional two-way communication channel<br />

� Messages shall always arrive from the same number<br />

� Daisy dedicated long numbers shall enable both incoming and outgoing messages to be<br />

responded to instantly.<br />

601


� Incoming mobile numbers shall be automatically captured<br />

Number Validation<br />

Daisy’s Number Validation software shall enable the Customer to “clean” mobile data. The software<br />

shall test each number and return with a result of “On”, “Off” or “Dead” and what mobile network the<br />

number is using. This shall allow the Customer to send messages to only “On” numbers.<br />

Supply Options<br />

Client Portal - This is where Daisy Messaging products and offerings can be accessed. There are 4<br />

groups of products; Applications, APIs and Web <strong><strong>Service</strong>s</strong>, Widgets and Utility <strong><strong>Service</strong>s</strong>.<br />

The single interface shall allow the Customer to manage:<br />

§ The dashboard<br />

§ Applications<br />

§ Utility services<br />

§ Widgets (choose, configure, grab code)<br />

§ API’s/Web services/ Datafeeds (menu to configure)<br />

§ Reporting & Statistics<br />

§ Shop<br />

§ Support<br />

§ Account Settings<br />

§ News/Events<br />

Message Manager<br />

Message Manager shall allow Customers to send and receive messages from one interface.<br />

Functions:<br />

§ Ability to send out large scale broadcasts<br />

§ Ability to target specific users within the contact groups<br />

§ Create personalised messages through merged fields<br />

§ Create rules to manage inbound messages<br />

602


§ Create and manage messaging templates<br />

§ Detailed delivery reports<br />

§ Ability to target specific users, with personalised fields<br />

§ Intuitive ingestion technology for contact uploads<br />

§ Full contact management capability<br />

Campaign Manager<br />

Campaign Manager shall allow users to create customised mobile campaigns. The SaaS application<br />

shall enable multi-user, multi-business unit, and multi-department configuration, which includes<br />

multiple campaign deployment options, controls, rules and filters with full reporting.<br />

Customers shall have access to the following functions:<br />

§ Multiple users can log into one account<br />

§ Options for managing opt out lists and inbound messages<br />

§ Hierarchical access right options for administrators and users<br />

§ Allocation of message credits and multiple user options<br />

§ Import and Export of contacts<br />

§ Rules library for complex 2 way campaigns<br />

§ Ability to seed mobile numbers and schedule tests<br />

Txt Chat<br />

Txt Chat is a SaaS call centre solution that shall enable complete conversations to be held by<br />

Customers over text in a call centre management interface.<br />

Conversations are started by an inbound message which shall be queued for an operator to “pick<br />

up” and action. Txt Chat shall support an unlimited number of operators. It shall be possible to copy the<br />

conversation into any CRM. Txt Chat shall include full viewing rights for managers to evaluate messages<br />

queued, responded, opened and completed.<br />

The Customer shall have access to the following functions:<br />

603


§ Multiple user environments<br />

§ One-to-one communication between operator and Customer<br />

§ Chat history by contact so previous communications can be viewed even if they are with another<br />

operator<br />

§ Multiple simultaneous text conversations<br />

§ Web delivery<br />

§ Different permission levels so supervisors can monitor all conversations<br />

§ Instant messaging between PC and mobile via SMS<br />

Outlook Plug-in<br />

Daisy shall supply the Outlook 2007 Plug-in which shall allow Customers to send and receive SMS<br />

messages from within Microsoft Outlook. Customers shall be able to send text messages, receive text<br />

messages, review them in the message history and check the delivery status. It shall be possible for the<br />

Customer to send messages from contact records to individuals, groups or current look-ups. Customers<br />

shall be able to initiate immediate and direct communication to contacts. The SMSs shall be tracked and<br />

stored within Outlook with each delivery receipt available in the history record.<br />

Customers shall be able to<br />

� Send text messages to individuals and groups.<br />

� Receive responses or inbound texts directly to the Message Manager Inbox.<br />

� Synchronise contacts with Message Manager.<br />

� Store and track sent messages alongside sent emails.<br />

� Choose a unique individual sender ID for each SMS text message<br />

� Personalise messages by including merged fields<br />

� Create SMS text message templates for frequently used messages<br />

� Schedule communications by setting delivery times up to 12 months in advance<br />

� Deliver messages through dedicated UK mobile carriers.<br />

APIs / Web <strong><strong>Service</strong>s</strong><br />

Daisy shall provide all the functional process required to deliver all the other applications, widgets<br />

and utility services through a range of APIs. This shall allow any function to be integrated into third<br />

party technology.<br />

604


An application programming interface (API) is a source code based specification used as an interface<br />

by software components to communicate with each other. An API includes specifications for routines,<br />

data structures, object classes, and variables.<br />

Features:<br />

§ Capabilities delivered through APIs<br />

§ APIs include data feeds to directly access real-time information<br />

§ APIs delivered over all Standard codes (JSON, HTTP,SOAP, PHP, SMPP etc.)<br />

§ Integration into existing applications<br />

§ Integration options including web services, HTTP <strong><strong>Service</strong>s</strong> and SMP 3.4<br />

§ Technical Support -integration requirements and support documentation shall be provided<br />

§ Project managed by API specialist team<br />

Utility <strong><strong>Service</strong>s</strong><br />

Daisy shall provide Utility <strong><strong>Service</strong>s</strong> to carry out large scale specific tasks. They are accessed through<br />

the Customer portal. Daisy shall deliver its number validation, scoring and behavioural information<br />

service via the Utility <strong>Service</strong>. The Customer shall be able to request the Utility <strong>Service</strong> as a large widget<br />

object in order to place into an iframe within applications.<br />

The Customer shall be able to<br />

§ Upload files into the Utility<br />

§ Push/Pull via backend API connection.<br />

§ Access full report and export options export from the dashboard<br />

§ See results of number validation available for download for up to 3days.<br />

§ Demand historical reports..<br />

§ Integrate messaging into existing applications<br />

Widgets<br />

Daisy’s widgets are stand-alone pre coded functional applications that can be embedded into third<br />

party sites/ software. Widgets shall allow Customers to turn messaging functions into web applications<br />

that can be used internally or provide services to end users.<br />

605


Customers shall be able to:<br />

§ Grab code and drop widgets into their own website or internal web based portal<br />

§ Access Cloud services immediately<br />

§ Access a customisable GUI<br />

Lead times and Implementation Process<br />

All SMS Messaging Solutions are accessed through the Daisy Messaging Portal. Access to the Portal<br />

is through a public facing web interface.<br />

There shall be 4 groups of products:<br />

§ Applications<br />

§ APIs and Web <strong><strong>Service</strong>s</strong><br />

§ Utility <strong><strong>Service</strong>s</strong><br />

§ Widgets<br />

The SMS Text Messages shall be delivered according to the service level described below<br />

606<br />

Description Availability Target<br />

The delivery of mobile<br />

messages from Daisy <strong><strong>Service</strong>s</strong><br />

to third party suppliers<br />

Available 24 hours<br />

per day, 7 days per week<br />

99.5% availability<br />

and transfer rate of at<br />

least 50 messages per<br />

second.


Daisy shall publish performance statistics, including message processing times on a monthly basis.<br />

Scheduled Maintenance<br />

Daisy shall carry out maintenance work between Midnight and 4am GMT as set out below:<br />

607<br />

Description Target<br />

Minimum Notice Period prior to<br />

Scheduled Maintenance<br />

Maximum Number of Scheduled<br />

Maintenance action per month<br />

exceeding 15 minutes<br />

Maximum Duration of any<br />

Scheduled Maintenance action in any<br />

month<br />

<strong>Service</strong> Level, Support and Maintenance<br />

SLA shall be agreed with the Customer.<br />

3 Days<br />

2<br />

1 Hour<br />

The service shall be available 99.5% of 24 / 7 / 365.


Freedom Communications (UK) Ltd<br />

Freedom Communications (UK) Ltd shall provide Communications <strong><strong>Service</strong>s</strong>, which shall include, but<br />

not be limited to:<br />

· Consultancy<br />

· Technical architecture and system design<br />

· Project Management<br />

· Supply<br />

· Installation<br />

· Training<br />

· Maintenance including transitional services<br />

· Support for equipment, commodity and managed service.<br />

· Help Desk and incident management service services<br />

· Upgrade services<br />

We shall provide services that are capable of meeting, as a minimum, the ‘Protect’ data Business<br />

Impact Level 2-2-x and deliver the services to ‘best practice’ guidelines. We shall meet the Security<br />

policies and procedures that are agreed at the time of procurement and in accordance with our<br />

Information Security practices, accredited to ISOS27001.<br />

We shall continue to design and provide new products and services that are relevant to this Lot 1 on<br />

an ongoing basis.<br />

Within this Lot 1, we shall offer products from multiple vendors, including but not limited to Alcatel-<br />

Lucent, Cisco, Mitel, HP, Avaya, 3Com, Shoretel, Siemens, BT and Gamma Telecom<br />

We shall have the role of prime contractor and shall use subcontractors to provide some services.<br />

Our Operations Director and <strong><strong>Service</strong>s</strong> Managers shall closely manage our subcontractors and shall be<br />

the central points of contact with our subcontractors and suppliers.<br />

We shall have full <strong>Service</strong> Agreements in place with our premium business partners with defined<br />

SLAs for all aspects of the delivery they are responsible for.<br />

Our Account Managers and <strong>Service</strong> Managers shall be the central points of contact between<br />

ourselves and our customers.<br />

Contract management and helpdesk services shall be provided by our own dedicated in-house<br />

experts who are based in our dual resilient contact centre in Watford and Leeds.<br />

Provision of all elements of a complete solution<br />

Freedom Communications (UK) Ltd shall provide, as a minimum, all elements of Lot 1 –<br />

Communications <strong><strong>Service</strong>s</strong> within a complete service.<br />

608


Traditional and IP based voice services, audio conferencing<br />

We shall supply, as a minimum, Traditional and IP based voice services/ equipment suitable for all<br />

sizes of customer. System solutions shall combine traditional voice technology with an IP platform,<br />

providing an effective and complete communications solution.<br />

We shall offer solutions that improve productivity and enhance customer care, whilst reducing<br />

capital expenses and operational costs. The high-availability platform shall deliver communication tools,<br />

including business applications that simplify daily administrative tasks.<br />

The telephony equipment shall offer scaling up to a total of 15,000 endpoints from a single server<br />

and to 100,000 when transparently networked. There shall be the option to expand beyond this by<br />

combining multiple systems.<br />

Handsets shall be intuitive with a common look/feel with an option for an integrated QWERTY<br />

keypad for access to directories and other information deliverable in HTML/XML format.<br />

Solutions and services provided shall support industry standard protocols such as QSIG, DPNSS,<br />

H.323 and SIP.<br />

Control and management of the systems shall be via an LDAP compliant management application.<br />

Resilient solutions shall provide:<br />

1. Central Server redundancy – non-disruptive takeover<br />

2. Distributed servers with full transparency<br />

3. Passive survivable servers – remote takeover on central server(s) failure<br />

4. Remote signalling support over dial-up channel for WAN failure support<br />

5. Handset alternative gatekeeper support<br />

The solutions shall support:<br />

1. Softphones - both client and clientless (web accessible)<br />

2. Messaging – traditional messaging and Unified Messaging. Unified Messaging shall integrate<br />

with any IMAP4 compliant email system and shall offer both voicemail and email retrieval from<br />

the PC interface and the telephone, including text to speech. The Unified Messaging solution<br />

shall be Web accessible.<br />

3. Conference and Collaboration – the solution shall offer a highly scalable conference platform –<br />

including Instant Messaging and audio, data and video conferencing. It shall also offer<br />

multiparty Powerpoint sharing and recording for playback, application and desktop sharing, with<br />

clientless web access.<br />

4. Contact Centre – the solution shall offer all elements of contact centre operation from basic<br />

voice ACD to multi-channel multi-direction, with distributed deployment scalable from 5 to<br />

many thousands of agents.<br />

Voice call packages, Voice minutes, DDI, premium rate numbers, Non-geographic numbers, 118<br />

enquiries, Call preference services<br />

We shall supply, as a minimum, the following services:<br />

609


· PSTN/ISDN line rental<br />

· Carrier Pre Select (CPS) for Voice minutes<br />

· Call Billing<br />

· Non-geographic Numbers<br />

· SIP <strong><strong>Service</strong>s</strong><br />

· DDI<br />

· Premium rate numbers<br />

· 118 enquiries<br />

· Call preference services<br />

· VOIP <strong><strong>Service</strong>s</strong> – Hosted, Managed & Maintained<br />

· IP Virtual Private Networks (IPVPN)<br />

· Mobile, Mobile Data (PDA’s) & Blackberry<br />

· Inbound Numbering <strong><strong>Service</strong>s</strong> – 0800, 0844, 0845, 0870<br />

· Network IVR <strong><strong>Service</strong>s</strong><br />

· Internet Connections<br />

· Remote / Lone / Home Worker Solutions<br />

· CCTV over IP<br />

· Disaster Recovery <strong><strong>Service</strong>s</strong> (DR)<br />

Our solutions shall provide DDI functionality. DDI numbers shall be allocated at the time of ordering<br />

and where we can retain existing numbers, we shall do so. Resiliency shall be supported by:<br />

· Diverse Routing<br />

· DDI Dual Parenting<br />

The full range of Non-geographic Numbers(NGN) available from OFCOM for UK organisations shall<br />

be offered. We shall provide single numbers to complete ranges, with the different types outlined<br />

below:<br />

· 03XX<br />

· 0800/0808<br />

· 0844 (5 types)<br />

· 0845<br />

· 0870<br />

· Geographical 01/02<br />

610


Should OFCOM vary the NGN range, we shall offer the revised range. These numbers shall be<br />

delivered on a straightforward translation into a single telephone number, up to more complicated<br />

solutions, including IVR if required.<br />

All NGN numbers supplied by Freedom shall be supplied with web based access for management<br />

and the setting up of DR plans.<br />

Freedom shall supply SIP solutions which support full PSTN connectivity, available via DSL or<br />

Ethernet connection.<br />

Freedom’s billing platform shall provide over 300 summary reports providing information on usage<br />

of the service. A web based portal shall be available to access the information.<br />

Freedom shall provide a comprehensive on-line corporate reporting and provisioning tool called<br />

Voice Manager. The online system shall be available to those responsible for telephony and who wish to<br />

have more control over their telephony requirements. The system shall provide the ability to provision<br />

and allocate Number Translation <strong><strong>Service</strong>s</strong>, amend call barring options and provide traffic monitoring<br />

reports. Billing reports shall be detailed by site, cost centre and/or call type.<br />

Freedom shall provide 118 enquiry services already set up by others, via our Business Partnership<br />

and Whole sale Agreements with them.<br />

Desktop video conferencing and collaboration tools<br />

We shall provide, as a minimum, User Desktop services, supporting access to Telephony <strong><strong>Service</strong>s</strong>,<br />

One Number <strong><strong>Service</strong>s</strong> and Teamwork <strong><strong>Service</strong>s</strong> which include Instant Messaging, Presence Management,<br />

Audio and Video conferencing and collaboration.<br />

The features of the Telephony <strong>Service</strong> shall include:<br />

611<br />

Telephony<br />

Phone set management<br />

Call logging<br />

Phone book<br />

Nomadic<br />

Desktop integration<br />

Web conferencing<br />

We shall provide, as a minimum, Teamwork <strong><strong>Service</strong>s</strong> which enable knowledge sharing and<br />

collaboration through presence-aware, integrated voice and web conferencing. Audio conferencing shall<br />

be managed from a desktop client or web (HTML) interface. Web conferencing with Application Sharing<br />

shall allow users to share documents and presentations with other participants of the audio conference,<br />

through the desktop client.<br />

Internet services, Antivirus, Email scanning and filtering


We shall provide, as a minimum, Internet Access directly connected to the Internet, delivering a fast,<br />

reliable, scalable and cost effective connection. Freedom’s un-contended Direct Internet Access (DIA)<br />

shall deliver speeds of 1Mbps to 1Gbps, providing business-grade Internet Access. The solution shall:<br />

612<br />

Provide consistent, high speed access with unlimited upload & download<br />

Unblock performance bottlenecks for remote VPN sites & users<br />

Improve network security<br />

Provide Off-site Anti-Virus and spam filtering.<br />

Enable virtualisation & cloud migration<br />

Support simplification of adding on sites to evolve the network topology<br />

Firewall solutions shall support the following standards, as a minimum:<br />

EAL-4 Certification on Hardware<br />

EAL-4 Certification on Software<br />

FIPS 140-2<br />

ICSA V4.1 Certification for Firewall<br />

ICSA V1.oD Certification for IP Sec<br />

Email and website services<br />

We shall provide, as a minimum, Integration of voice mail into an e-mail environment<br />

(Integrated/Unified Messaging), achieved as follows:<br />

Unified Messaging by storing voice mails, providing full integration into the e-mail environment,<br />

resulting in a single ‘Inbox’.<br />

Integrated Messaging by storing voice mails and accessing the voice mail from IBM Lotus Notes,<br />

through IMAP (Internet Message Access Protocol).<br />

We cshall provide solutions that support:<br />

Connecting users with voice, email and web services wherever they are located.<br />

Email, text messaging and online collaboration such as web chat.<br />

Co-location and hosting<br />

We shall provide, as a minimum, Co-location and hosting services, secure housing and connectivity<br />

for businesses that wish to keep control of their web services and require space, bandwidth and security<br />

within the hosting services. Our managed hosting environments shall provide energy-efficient climate<br />

control, security access with CCTV, motion sensors and Intruder Detection Systems and eco-friendly fire<br />

detection and suppression systems<br />

On-line storage, Security services


We shall provide, as a minimum, Fibre channel or iSCSI SAN implementations. iSCSI technology shall<br />

offer enhanced file serving using an existing TCP/IP network without the high cost of fibre technology.<br />

Provisioning techniques shall be varied depending on requirements such as storage capacity, availability<br />

and budget.<br />

The solutions shall include entry level simple deployment processing, Application-Centric processing<br />

and management. RAID shall provide disk tolerance. Standard software shall allow disk-based snapshots<br />

to support rollback, offsite backup and archiving of all data.<br />

Mid-range systems based on Enterprise Virtual Arrays (EVA) shall provide redundant storage. The<br />

EVAs shall cater for faster fibre channel drives if required. In excess of 99.999% uptime shall be provided<br />

with redundant fibre-fabric SAN topology design. Being modular, EVAs shall provide exceptional upgrade<br />

capabilities and shall allow the upgrade of firmware without any disruption and secure interoperability<br />

within a multitude of operating systems and hardware platforms.<br />

High-end systems shall be based on Disk Arrays. This SAN level shall provide data technology that<br />

resolves exposure to downtime, disaster, error and exponential/unexpected data growth. Disk Arrays<br />

shall allow advanced business continuity protection and include the tailoring of the arrays to provide<br />

exceptional service, operational lifecycle management and a resilience program to ensure response to<br />

change, threat and opportunity.<br />

We shall offer a secure Telecoms environment through the deployment of both product and<br />

processes that meet industry recognised standards.<br />

The telephony solution shall be supported on a Linux-based platform which maintains only<br />

necessary programs. Security shall be multi-level across the system using the following policies:<br />

· Systems shall be encrypted using SSHv2<br />

· sftp (secure ftp) shall be used for file transfer<br />

· Http security shall be by SSH.<br />

· Passwords shall not be sent “in clear” nor stored in the password file, but shall be in coded format<br />

to prevent transfer and deciphering.<br />

· Client access shall be able to be authenticated using Radius and IEEE802.1x, including IP handsets.<br />

· Only defined trusted hosts shall have access to the system.<br />

· VLANs shall incorporate filtering in the underlying network.<br />

· Binary files downloaded from the Server to the Gateways shall have digital signatures based on the<br />

Elliptic Curve Cryptography (ECC) public key algorithm.<br />

· IP phone spoofing protection shall be incorporated.<br />

· Audio stream encryption shall use on-board software or security appliances and SRTP with AES<br />

(counter mode) algorithms.<br />

· Fax relay shall be supported on IPSec.<br />

· Call Control signalling shall be protected using IPSec ESP (transport mode) with AES encryption<br />

algorithm and integrity checked using HMAC SHA1 signature.<br />

613


Firewall <strong><strong>Service</strong>s</strong><br />

We shall provide, as a minimum, Managed Firewall services which shall secure against external<br />

cyber threats and unauthorised network access, at all times. Deployed in conjunction with Freedom’s<br />

Direct Internet Access (DIA), our Managed Firewall service shall provide a strong and secure ‘fence’ to<br />

protect sensitive data. Our Managed Firewall service shall provide a secure service, protecting any<br />

number of sites and combining data, voice and video into one, multi-service, private service. Pro-active<br />

support and monitoring with modular <strong>Service</strong> Level Agreements shall span from the desktop to datacentre.<br />

Firewall solutions shall support the following standards, as a minimum:<br />

614<br />

EAL-4 Certification on Hardware<br />

EAL-4 Certification on Software<br />

FIPS 140-2<br />

ICSA V4.1 Certification for Firewall<br />

ICSA V1.oD Certification for IP Sec<br />

Intrusion and spyware detection, Authentication and access management, Web and application<br />

sign on services<br />

We shall provide, as a minimum, a corporate wide compliance infrastructure for secure automated<br />

business processes.<br />

We shall provide solutions for AAA (Authentication, Authorization and Accounting), to include but<br />

not limited to RADIUS servers, Microsoft Active Directory, digital certificates and secure tokens.<br />

We shall provide solutions for controlled and secured access to web services, through a Web<br />

<strong><strong>Service</strong>s</strong> Gateway, which builds on an XML stateful firewall offering single sign-on and partner access,<br />

and supporting a multitude of web services standards such as W3C, SOAP and UDDI.<br />

We shall provide a scalable and reliable service oriented infrastructure for information systems in<br />

areas such as human resources, enterprise resource planning (ERP), customer relationship management<br />

(CRM), and finance with security and regulatory compliance (policy enforcement and audit trail) that is<br />

required for secure business process automation. The service shall be deployable within data centres to<br />

secure business processes within an organisation and in the DMZ for automating business processes<br />

with partners.<br />

The service shall provide:<br />

· Stateful (multi-transaction), run-time policy enforcement and consolidated audit trails to ensure<br />

and demonstrate compliance with government regulations. The service shall mitigate risk through<br />

consistent policy enforcement across information systems with a user contextual knowledge of<br />

system events.<br />

· Information access and change control as well as data encryption with digital signatures, enabling<br />

a single digital identity within an organization that accepts authentication from trusted partners.


· Security features such as the application firewall and auditing, tracking and control functions that<br />

can be used to monitor all partner activity, including access to information by partner employees<br />

when on-site.<br />

Messaging <strong><strong>Service</strong>s</strong>, Real time information services, Desktop messaging, Messaging via email,<br />

SMS, pager and mobile or fixed line telephone<br />

We shall provide, as a minimum, Messaging <strong><strong>Service</strong>s</strong> which shall allow users to manage their email,<br />

fax and voice mail at/or away from the office, via a PC, a PDA, Microsoft Outlook/IBM Lotus Notes e-mail<br />

client or a telephone handset The Messaging service shall also be available through XML Web <strong><strong>Service</strong>s</strong>.<br />

We shall provide infrastructure to support Real time information services, Desktop messaging and<br />

Messaging via email, SMS, pager and mobile or fixed line telephone<br />

We shall provide Voice mail and Unified Messaging facilities which shall be accessible through the<br />

telephone user interface from any telephone device, internal or external to the business. Users shall be<br />

able to manage their personal options by using the web-based graphical management interface. A visual<br />

voicemail interface shall provide a clear overview of all messages with the capability to listen to them in<br />

any order.<br />

615


Fujitsu<br />

Traditional Voice <strong><strong>Service</strong>s</strong><br />

The Contractor shall offer a range of standard TDM-based voice services, including:<br />

· Public Switched Telephony Network (PSTN) circuits:<br />

616<br />

· Direct Exchange Lines (analogue telephone line)<br />

· ISDN2 lines (2 x 64 kbit/s digital telephone line)<br />

· ISDN30 lines (30 x 64 kbit/s digital telephone line)<br />

· PSTN minutes and call packages<br />

· Non-Geographic Numbers:<br />

· 080x free calling<br />

· 087x revenue share<br />

· 084x revenue share<br />

· 03xx local rate<br />

· Access to 118 directory services<br />

· Call preference services<br />

IP Voice <strong><strong>Service</strong>s</strong><br />

The Contractor shall provide and manage an IP Telephony and Unified Communications service<br />

utilising Cisco or Mitel products and services. The service shall provide fully integrated capabilities for<br />

Customer users to communicate via a hosted platform delivered from a pair of Tier III UK data centres,<br />

with options for Customer-premises equipment or hybrid solutions.<br />

The Contractor’s standard Voice <strong>Service</strong> shall be a managed feature set per user, delivered from a<br />

hosted, multi customer environment or a Customer-dedicated environment including Private<br />

Cloud. The hosted solution offers physical data centre hardware components that shall be shared<br />

between Customers at the same Impact Level, but each Customer shall receive a dedicated virtual<br />

solution.<br />

Voice <strong>Service</strong> Features<br />

The Contractors Voice <strong>Service</strong> shall support the following features:<br />

· Direct Dial-In (DDI)<br />

· Short Code Dialling (between Customer sites)<br />

· Call Transfer<br />

· Centralised Operator <strong>Service</strong><br />

· Call Hold<br />

· Call Logging and reporting<br />

· Manual Diversion<br />

· Hot Desking<br />

· Memory Functions<br />

· Voicemail


· Call Pickup<br />

· Self <strong>Service</strong> Portal<br />

· Audio Conferencing Calls<br />

· Fax and Legacy Analogue Handsets<br />

· Group Working<br />

· Call recording<br />

· Listen and Monitor<br />

· Non-Geographic Numbers.<br />

The following shall also be available as optional extras:<br />

· Automatic Call Distribution (ACD)<br />

· Dynamic Extension.<br />

<strong>Service</strong> Features Summary<br />

The Contractor’s Voice <strong>Service</strong> feature sets shall be provided in four distinct tiers, each adding<br />

further capability, which are mapped to the service pricing scheme.<br />

· The “Essentials” feature set shall provide basic telephony features to the Customer, for either<br />

analogue devices such as fax and hallway phones, or basic Internet Protocol Telephony<br />

(“IPT”). The Contractor shall make available to the Customer appropriate handsets options<br />

where no additional functionality is required beyond dial tone and the ability to make calls<br />

· The “Foundation” feature set shall add enhancement of extension mobility, enabling users to<br />

log in to any physical endpoint within the service and use their own extension number. This<br />

capability shall fulfil the requirements for basic IPT in shared or communal areas, such as<br />

meeting rooms, warehouses or retail environments<br />

· The “Standard” feature set shall add Unified Communications capability, including presence,<br />

instant messaging, single-number reach and integrated voicemail services<br />

· The “Premium” feature set shall provide an end-to-end Unified Communications <strong>Service</strong><br />

consisting of telephony, Messaging, Native Video, Presence and mobile integration. This shall<br />

offer enhanced mobility integration for mobile and field-based employees.<br />

These Feature Sets are tabled below:<br />

Functionality Essentials Foundatio<br />

n<br />

617<br />

Standard Premi<br />

um<br />

IP Telephony Yes * Yes Yes Yes<br />

Full Voice Control No Yes Yes Yes<br />

Single Number Reach No Yes Yes Yes<br />

Native Video No Yes Yes Yes<br />

Messaging Opt Opt Yes Yes


Presence No Opt Yes Yes<br />

Soft Client No Opt Yes Yes<br />

Session Management No Opt Opt Yes<br />

Mobile client license No Opt Opt Yes<br />

Endpoint Limit 1 1 2 10<br />

Operator Opt Opt Opt Opt<br />

Audio Conferencing Opt Opt Opt Opt<br />

Premium Event <strong>Service</strong> Opt Opt Opt Opt<br />

Web Conferencing Opt Opt Opt Opt<br />

Mobility Opt Opt Yes Yes<br />

Yes: This item of functionality is included in this Feature Set.<br />

No: This item of functionality is not available in this Feature Set.<br />

Opt: This item of functionality is not included in this Feature Set as standard, but shall be available at<br />

an additional charge.<br />

* There are a limited number of compatible endpoints for this Feature Set.<br />

Voice <strong>Service</strong> Core Availability<br />

The Contractor recognises the importance of high availability for the service and shall offer each<br />

Customer solution-specific <strong>Service</strong> Level Targets that are measured and reported on monthly. The Voice<br />

<strong>Service</strong> shall have resilient connections to the Contractor’s <strong>PSN</strong>-connected core network at the primary<br />

data centre, with a single connection at the secondary data centre. The connections shall be configured<br />

such that each link at the primary data centre shall carry approximately 50% of the total voice<br />

traffic. Load balancing the traffic across two active connections shall provide resilience for external<br />

voice calls by:<br />

· Reducing the impact of a link failure to approximately 50% of the total calls in progress at the<br />

time of the failure<br />

· Reducing the network convergence time following a link failure<br />

· Allowing the Contractor flexibility to perform software and hardware upgrades on the core<br />

network routers and the Voice <strong>Service</strong> routers without complete loss of service.<br />

Voice <strong>Service</strong> Edge Availability<br />

The Contractor shall offer solutions to increase the availability of voice services at the Customer’s<br />

sites. These options shall include:<br />

· Provision of UPS for local power sources and LAN equipment.<br />

618


· Use of existing or new Direct Exchange Lines (DELs) into the Customer’s site. These DELs can be<br />

used to provide fallback capability for the site in the event of a failure of the Voice <strong>Service</strong> or a<br />

component supporting the service (e.g. the LAN/WAN)<br />

· The use of mobile phones at site; various option packages based on user type/profile are<br />

available.<br />

End to End Performance<br />

The Contractor shall design and maintain its Voice <strong>Service</strong> to achieve a minimum R-Factor<br />

(measurement of the subjective quality of voice) of 80 for 99% of calls.<br />

Handset Options<br />

The Contractor’s Voice <strong>Service</strong> shall support a range of Cisco and Mitel handsets as well as third<br />

party SIP-compliant handsets. Supplying users with a common phone handset provides consistency<br />

when using features such as hot desking, and therefore the Contractor shall offer the Customer<br />

standard handset options based on the features required. The Contractor shall also offer softphone<br />

options.<br />

Call Plans<br />

The Provider shall make available to the Customer a range of call-plan options, such as inclusive calls<br />

to mobile phone provider networks, UK PSTN, and overseas PSTN.<br />

Voicemail/Messaging<br />

Where the Voicemail <strong>Service</strong> is included in the feature set selected by the Customer, the Contractor<br />

shall provide a dedicated voicemail box that is secured with a PIN number and shall be accessible via an<br />

IP phone or by dialling in remotely. Once in the voicemail box, the user shall be able to listen, save,<br />

replay or delete their messages as well as change their configured personal greetings. The Voicemail<br />

<strong>Service</strong> shall also allow a user to record an active call, providing an ad-hoc call recording function. The<br />

Voicemail <strong>Service</strong> shall be configurable to send a voicemail to the users email address as an attachment<br />

if required or send a simple notification (this capability is sometimes referred to as ‘integrated<br />

messaging’).<br />

Operator <strong>Service</strong><br />

The Contractor shall offer the Customer a UK-located Operator <strong>Service</strong> to provide reception services<br />

whereby all external calls to nominated numbers are routed to central operators for answering, number<br />

look up and call forwarding. The operators shall answer the call with a pre-defined greeting. The<br />

operator shall also provide assistance to internal callers; for example, where an end user does not know<br />

an extension number. The Operator <strong>Service</strong> shall be manned by trained personnel 24x7.<br />

Audio Conferencing<br />

The Contractor shall offer the Customer an Audio Conferencing <strong>Service</strong> with access to a touch-tone<br />

dialling (DTMF) telephone, on-demand connectivity to an audio conference. No advanced booking shall<br />

be required and the service shall be available 24 x 7 to participants to join using a local dial-in number.<br />

Audio Conference users shall be allocated a bridge number and associated PIN. Call minutes for<br />

usage are chargeable.<br />

· Dial-Out Access – dial-out access to the Audio Conferencing <strong>Service</strong> shall be available as an<br />

optional feature. This feature is available to the chairperson only<br />

619


· Recording a call – the chairperson has the ability to start and stop a recording of a conference<br />

call, recordings are encrypted & stored securely.<br />

Premium Event <strong>Service</strong><br />

The Contractor shall offer the Customer a Premium Event <strong>Service</strong>, a booked conference-call service<br />

suitable for any conference with over 20 participants. Premium Event <strong><strong>Service</strong>s</strong> must be booked in<br />

advance and shall have the following feature options:<br />

· Event Management at no extra charge to help plan and manage conferences<br />

· Pre-registration, allows organisers to track conference registration and attendance<br />

· Security ensured by a unique Passcode for each conference<br />

· Pre-booking to guarantee availability of lines<br />

· Choice of dial-in phone numbers to select how participants are to be entered into a conference<br />

· Co-ordinator assistance, as required.<br />

Web Conferencing<br />

The Contractor shall offer the Customer a Web Conferencing <strong>Service</strong>, which shall provide a webbased<br />

meeting to share visual media. It shall have the following features;<br />

· Web Conferencing client software<br />

· Integrated audio conferencing<br />

· Dial-out function to invite participants to an established conference<br />

· Scheduling from Microsoft Outlook and Lotus Notes or directly from the Web Conferencing<br />

client<br />

· Instant feedback with real-time voting<br />

· Live Q&A sessions.<br />

Mobility<br />

The Contractor shall offer a Mobility <strong>Service</strong> that fully supports hot desking throughout the<br />

Customer estate, allowing a user to log onto any phone configured as a hot-desk phone. The following<br />

features shall be provided as part of the <strong>Service</strong>:<br />

· Callback for External Hot-Desk User - Disconnects the user's inbound call, and then calls the<br />

user back within a few seconds. On answering, the user is presented with a dial tone and can<br />

then dial the required number. The call is therefore charged at the rate for outbound calls from<br />

the <strong>Service</strong>, rather than the prevailing rate where the user is located (e.g. in a hotel)<br />

· Direct Inward Dial System Access (DISA) - Allows external callers to access the system by using a<br />

dedicated trunk. The system sees the DISA trunk as an extension with its own Class of <strong>Service</strong><br />

and Class of Restriction. Calls that enter the system on DISA trunks have access to a variety of<br />

system features. The DISA trunk can be assigned account codes to provide security or additional<br />

options.<br />

The Contractor shall also support a full external mobile desk solution as an additional <strong>Service</strong>. This<br />

<strong>Service</strong> shall allow hot-desk users to configure any external telephone number (e.g. mobile phone, home<br />

phone) as a hot-desk phone. When the hot-desk user is not logged into one of the system’s hot-desk<br />

handsets, the system automatically routes the call to the external telephone number. As a ‘virtual’<br />

extension, the external device user shall have access to extension dialing along with other system<br />

620


esources such as voicemail. The <strong>Service</strong> shall enable the ‘presence’ state of the external number to be<br />

treated the same as an internal number.<br />

Specialist Telephony<br />

The Contractor recognises that there is a wide range of specialist telephony devices required within<br />

a Customer telephony deployment, ranging from lift phones and phone lines used for alarms, fax<br />

machines, and accessibility phones. During site surveys, the Contractor shall gather the requirements<br />

for each of these specialist devices and propose an appropriate solution.<br />

There are a number of options available to:<br />

· Retain existing analogue Direct Exchange Lines, for lift phones, fax machines etc;<br />

· Retain existing digital ISDN lines, for BRENT phones;<br />

· Deploy analogue to IP gateways, to allow an analogue device to be connected to and managed<br />

by the hosted voice platform. Compatible devices include analogue phones (including specialist<br />

phones to support Assistive Technology requirements).<br />

Assistive Technology<br />

The Contractor shall make available to the Customer a range of solutions for users with particular<br />

telephony needs, including “big-button” phones and text-based telephones. The Contractor shall review<br />

specific requirements for these users at the time of the site survey and determine the most appropriate<br />

solutions.<br />

Ministerial “Listen and Speak”<br />

The Contractor’s Voice <strong><strong>Service</strong>s</strong> shall provide a Ministerial “Listen and Speak” capability. The<br />

features of this service shall include:<br />

· Join-in Parties (i.e. the aides to the minister) can join, in either “conference” or “listen” mode,<br />

through the use of a key<br />

· If the Principal Party (i.e. the minister) hangs up, then the conference is cleared<br />

· Single press of the “privacy release” key by the Principal Party is required to make the call nonprivate,<br />

so that all Join-in parties can easily participate in the conference.<br />

Reporting<br />

The Contractor shall provide the following to the Customer for each <strong>Service</strong> Level Period:<br />

· A consumption-based bill in a standard format<br />

· <strong>Service</strong> uptime report (availability of PSTN interconnect, Voice <strong>Service</strong> platform and<br />

applications)<br />

· Summary of Incidents (including root-cause analysis for Severity 1 Incidents upon request)<br />

· Summary of service requests for the period and associated charges<br />

· Schedule of planned work.<br />

Collaboration and Tools<br />

The Contractor’s Collaboration and Electronic Document and Record Records Management (EDRM)<br />

<strong>Service</strong>, based on Microsoft SharePoint, shall offer the following high-level features:<br />

621


· Secure Collaboration - Allows teams to collaborate on and publish documents, maintain task<br />

lists, implement workflows, and share information through the use of wiki and blogs<br />

· Records Management - Provides the ability for users to declare content as formal<br />

records. Once objects are declared as records, retention policies and audit trails shall be enabled<br />

to meet compliance requirements<br />

· Information Protection – Applies hierarchical control of who can access read and share<br />

documents and information. This shall permit a structured approach to document security by<br />

controlling access by groups rather than individual users<br />

· Metadata Management - Applies key business data terms and structures to content through<br />

the use of centralised services to all components of the SharePoint solution<br />

· Metadata and Content Search – search for people, expertise, and content within the EDRM<br />

environment.<br />

The <strong><strong>Service</strong>s</strong> shall be hosted in geographically separated Contractor data centres with redundant<br />

network architecture. Data centres shall act as mirror backups for each other: if one fails, the affected<br />

users shall be transferred to another data centre with limited interruption of service. The <strong>Service</strong> shall<br />

proactively monitor for faults in the environment, moving running instances to another location,<br />

transparently to the user.<br />

The Contractor shall also offer Collaboration and EDRM Professional <strong><strong>Service</strong>s</strong> which shall include:<br />

· SharePoint Exploitation. Advice and assistance in using an enterprise-scale Collaboration and<br />

EDRM <strong>Service</strong> to meet the Customer’s organisational needs, and building a roadmap for future<br />

exploitations. This <strong>Service</strong> shall also assist in making use of the Compliance Extender from<br />

Automated Intelligence included with the Collaboration and EDRM service to customise a set of<br />

templates, and in implementing a tailored Information Governance structure and process that<br />

complies with industry and government standards<br />

· Training <strong>Service</strong>. Customised and tailored SharePoint and EDRM training sessions for<br />

administrators, in-house developers and users, to suit the needs of each Customer<br />

· Data Migration <strong>Service</strong>. Specialist consultancy and technology to manage the migration of<br />

existing content both onto the Collaboration and EDRM system, and off it in the event of a<br />

migration to another service. This shall involve managing metadata transfer as well as raw<br />

content, handling of de-duplication, and management of additional elements such as retention<br />

policies and permissions<br />

· <strong>Service</strong> Integration <strong>Service</strong>. A validation and integration service for ‘add-ons’ such as third<br />

party Webparts. These may have been utilised on a Customer’s previous implementation of<br />

SharePoint, or to implement specific additional features not present in the Collaboration and<br />

EDRM <strong>Service</strong>. This <strong>Service</strong> shall include a security assessment to ensure that add-ons comply<br />

with appropriate guidance and to maintain the integrity of both the Customer’s and the overall<br />

<strong>Service</strong>.<br />

Internet <strong>Service</strong><br />

The Contractor is a Tier-2 Internet <strong>Service</strong> Provider, with peering to other UK ISPs via the London<br />

Internet Exchange (LINX) and transit connections to two global Tier-1 Internet providers. It shall offer<br />

Customers a range of Internet connections from 2 Mbit/s upwards, terminating in Customer sites or in<br />

Contractor hosting environments supplied under the Collocation and Hosting <strong><strong>Service</strong>s</strong>. It shall also offer<br />

622


Customers the option of protective measures such as firewalls, intrusion prevention and email content<br />

scanning, through the application of the Security <strong><strong>Service</strong>s</strong> described below.<br />

Email <strong><strong>Service</strong>s</strong><br />

Messaging as a <strong>Service</strong><br />

The Contractor shall offer Messaging as a <strong>Service</strong>, a Microsoft-based cloud email service, on a payper-use<br />

basis.<br />

The Contractor shall assess the impact and value of deploying the Messaging as a <strong>Service</strong> solution<br />

within the Customer’s business. During the planning phase, the Contractor’s consultants shall conduct a<br />

workshop to determine the Customer’s business objectives and existing infrastructure, licensing<br />

ownership and agreements. During the reporting phase, they will use the information gathered from<br />

the workshop and shall create an assessment report that describes the impact of deploying the<br />

Messaging as a <strong>Service</strong> solution.<br />

There shall be two platform options for Messaging as a <strong>Service</strong>: Enterprise and Dedicated:<br />

· Under the Enterprise option, Customers shall share email infrastructure with other Customers,<br />

benefiting from the lower costs of a shared platform<br />

· For Customers with specific requirements, the Dedicated option shall allow email to be<br />

customised and integrated within existing IT services. The dedicated email platform may be<br />

located in the Contractor’s data centres, or implemented as a private cloud service on Customer<br />

premises.<br />

Messaging as a <strong>Service</strong> shall offer a range of flexible mailbox options. Customers may select Gold<br />

and Silver options that include anti-virus protection, mailbox backup and also a range of optional addons<br />

such as archiving, compliance enforcement, BlackBerry and fax support. If required, data shall be<br />

stored and replicated across multiple data centres to ensure availability.<br />

Mailbox <strong>Service</strong><br />

The Contractor shall offer a Mailbox <strong>Service</strong>, providing Post Office Protocol and Internet Mail Access<br />

Protocol (POP3 and IMAP) mailboxes. These shall be accessible using standard email clients, a dedicated<br />

client and mobile devices, or via a Webmail interface with features including address book, calendar,<br />

task list and document sharing. The <strong>Service</strong> shall be available on both shared and dedicated<br />

infrastructure.<br />

Website <strong><strong>Service</strong>s</strong><br />

Simple Website <strong>Service</strong><br />

The Contractor shall offer a <strong>Service</strong> to allow Customers to create simple webpages that shall be<br />

available to other <strong>PSN</strong> users at the appropriate Impact Level.<br />

The web-authoring interface will help Customers to create web content; its features shall include:<br />

· Pre-written templates. A range of pre-built site designs to allow sites to be created more<br />

quickly<br />

· On-screen editor. A built-in WYSIWYG editor that works like a word processor, so users do not<br />

have to learn new skills. It includes drag-and-drop capabilities for adding images, text boxes,<br />

menu items, etc<br />

623


· Colour selector. With the colour selector, the user can change the template’s entire colour<br />

scheme to better match Customer corporate colours or style guidelines.<br />

Self-service control panels shall allow Customers to perform many operations (such as managing<br />

users, roles, passwords, and permissions) without Contractor intervention.<br />

Complex Website <strong>Service</strong><br />

The Contractor shall create web interfaces and infrastructure to meet complex Customer<br />

requirements. These bespoke <strong><strong>Service</strong>s</strong> may include elements such as:<br />

· Active content<br />

· Complex scripting and data validation<br />

· User authentication<br />

· Back-end databases<br />

· User personalisation<br />

· Integration with Messaging <strong><strong>Service</strong>s</strong><br />

· Integration with external Customer systems (see below).<br />

The Contractor shall provide Customers with any or all of the following <strong><strong>Service</strong>s</strong> for complex<br />

websites:<br />

· Design, build, implementation and test of software solution<br />

· Design, build, implementation and test of hardware infrastructure<br />

· Hosting of the infrastructure<br />

· Update and modification of existing software and/or infrastructure<br />

· Basic monitoring and health-checks<br />

· Full infrastructure and service management.<br />

Integration and Connectivity Server <strong>Service</strong><br />

The Contractor shall offer an Integration and Connectivity Server <strong>Service</strong> based on BizTalk Server, an<br />

integration and connectivity server solution. The <strong>Service</strong> can be hosted within the Contractor’s<br />

environment or the Customer’s. BizTalk Server-related <strong><strong>Service</strong>s</strong> shall include:<br />

· Technical Consultancy <strong><strong>Service</strong>s</strong>: Review of the overall estate of a Customer to produce a<br />

recommended roadmap for joining up Customer systems. This review shall assess the scale and<br />

scope of required integration and shall make recommendations on whether Point-to-Point<br />

integration is appropriate or whether a full Enterprise <strong>Service</strong> Bus is required<br />

· Architecture Design And Implementation <strong><strong>Service</strong>s</strong>:<br />

624<br />

· BizTalk Architecture – the Contractor shall design the overall structure of the system<br />

required to support the Customer’s strategic or tactical needs<br />

· BizTalk Design – the Contractor shall produce the detailed schema, mapping,<br />

transformation, pipeline and orchestration designs<br />

· BizTalk Implementation – the Contractor shall implement the solution based on the<br />

designs that have been produced. The finished solution shall be taken through an agreed<br />

test regime prior to roll out on the live environment


· Support and Monitoring <strong><strong>Service</strong>s</strong>: the Contractor’s BizTalk specialists shall provide first through<br />

to fourth-line support to Customers as well as monitoring of live systems.<br />

Collocation and Hosting <strong><strong>Service</strong>s</strong><br />

The Contractor shall offer a range of data centre <strong><strong>Service</strong>s</strong> from a basic managed Collocation <strong>Service</strong><br />

up to and including a fully managed Hosting <strong>Service</strong> depending upon the Customer’s<br />

requirement. These <strong><strong>Service</strong>s</strong> shall allow the Customer to host their servers and workloads in a secure,<br />

reliable and managed environment. The Contractor’s <strong><strong>Service</strong>s</strong> shall be compliant with ISO/IEC 20000<br />

standards and conformant with ITIL, and, where required by the Customer, conform to Uptime Institute<br />

Tier III level.<br />

The Contractor shall provide basic managed service plus a managed wrap (‘dark site service’), in the<br />

form of an SLA-governed managed service, which shall include some on-site proximity deliverables. This<br />

removes the need for the Customer to procure non-technical floor space for build, tape storage and<br />

general storage as the Contractor shall provide or manage all of this.<br />

The managed Collocation <strong>Service</strong> racks shall have a standard power and cooling provision of 4 kW<br />

per rack, which can be upgraded to 10 kW at an additional cost. There shall also be a module design of<br />

20 racks at a capability of 20 kW per rack for high-density solutions in one of the Contractor’s London<br />

data centres.<br />

Smart Hands <strong>Service</strong><br />

The basic managed service shall include Smart Hands <strong>Service</strong> supported by the 24x7 on-site<br />

operations teams in the Contractor’s data centres. The onsite staff shall be available to assist the<br />

Customer in performing the common day-to-day activities that require hands-on access to the systems.<br />

The Smart Hands Support shall include the following basic operations:<br />

· Power cycling of the Customer IT equipment<br />

· Pressing of reset or other readily accessible buttons or switches<br />

· Reconfiguration of non-restricted cables with push-on connectors<br />

· Visual verification of Customer IT Equipment status<br />

· Delivery of Third Party Escort <strong><strong>Service</strong>s</strong> in the Contractor’s Data Centres for emergency<br />

situations only<br />

· Delivery of Tape Handling <strong><strong>Service</strong>s</strong> in the Contractor’s Data Centres<br />

· Space and cooling assessments in the event of a request for change<br />

· Escort and expert supervision of authorised Customer, Contractor and third party staff as part<br />

of secure access control measures.<br />

Backup and Media Management <strong>Service</strong><br />

This <strong>Service</strong> shall include:<br />

· Tape/media handling in support of the backup timetable agreed with the Customer, comprising<br />

insertion and removal of tapes from the Customer’s hardware backup devices to an agreed<br />

offsite storage location.<br />

· Tape/media handling in support of data recovery comprising removal of relevant tapes from<br />

the offsite storage location and insertion into the Customer’s hardware backup devices<br />

· On and offsite media labelling, storage and fire-safe management<br />

625


· Archiving and recycling tape/media management to agreed timetable as described in the<br />

<strong>Service</strong> Schedule.<br />

Data Centre Administration – Space and Capacity Planning<br />

The <strong><strong>Service</strong>s</strong> shall include:<br />

· Asset/inventory and configuration management of the Customer’s hardware located on the<br />

Contractors premises<br />

· Data centre capacity and space planning, to ensure optimum use of space for the Customer’s<br />

requirements whilst meeting Uptime Institute good-practice guidelines with respect to weight,<br />

power and heat distribution<br />

· Use of the Aperture tool to maintain the configuration management database of collocation<br />

hosted servers.<br />

Managed Hosting <strong>Service</strong><br />

The Contractor’s Managed Hosting <strong>Service</strong> shall offer a range of capabilities, including design<br />

guidance, improvement programmes, individual managed services and full outsourcing of data centre<br />

infrastructure, operations and premises. The <strong>Service</strong> shall include, where required:<br />

· Management of the data centre environment<br />

· Incident and Problem handling for the data centre<br />

· Acceptance and service establishment of the Customer’s specified hardware configuration<br />

within the Contractor data centre<br />

· Operational support activities including operating system and application monitoring<br />

· Incident and Problem management for Customer systems through an appropriate Contractor<br />

<strong>Service</strong> Desk<br />

· Support of change, configuration, Problem and Incident management activities in relation to<br />

managed services<br />

· Media handling and storage management including tape loading, offsite storage and recycling<br />

of media.<br />

Data Centre Facilities<br />

The Contractor shall provide data centre facilities built to comply with HMG standards covering<br />

physical and personnel security measures such as:<br />

· Segregated data halls designed, built and designated for <strong>Government</strong> business<br />

· Physical security measures including cages<br />

· Access and control measures<br />

· Operational processes and audit<br />

· Staff security clearance.<br />

The systems that control these measures shall contain strong user authentication and access<br />

controls so that they cannot be easily compromised. The administration functions of the systems<br />

contained within the Contractor’s premises shall also have similar strong user authentication and access<br />

controls to provide further defence for the systems if the physical controls have been compromised.<br />

Security and resilience features at each data centre site shall include a minimum of:<br />

626


· 24 x365 security monitoring by specialist staff<br />

· Perimeter barriers, turnstile access and CCTV<br />

· Infra-red movement detectors<br />

· Internal access controls via swipe card or fingerprint controls<br />

· Standby power generators<br />

· Water leakage detection and control systems<br />

· Smoke detection and response systems.<br />

All sites shall have built-in resilience of key environmental features such as power and<br />

cooling. <strong>Service</strong> continuity within the data centres shall be managed through the planned preventative<br />

maintenance schedules for each data centre.<br />

On-line Storage <strong><strong>Service</strong>s</strong><br />

The Contractor shall offer its Storage Managed <strong>Service</strong> (SMS) to provide Customers with a flexible<br />

data storage system on a pay-as-you-go basis. There shall be four versions, designed for specific data<br />

storage types:<br />

· SMS Capacity - tiered storage in a Storage Area Network environment including SCSI and SATA<br />

drives in a standard RAID storage model accessed by Fibre Channel. The storage types can be<br />

blended to optimise storage tiering and cost performance. It is normally co-located in the same<br />

data centre as the servers to provide performance, availability and fault-tolerant configurations<br />

· SMS File <strong><strong>Service</strong>s</strong> - a standard solution for file-based storage requirements. File shares can be<br />

made accessible to users as networked drives<br />

· SMS Archive – a data archive service with records management, storage management, security,<br />

audit and search, tiered from bulk archive repository up to the top tier for high-speed records<br />

searching. Platform integrations for applications include; Microsoft Exchange, Lotus Notes, SAP,<br />

MOSS and imaging systems<br />

· SMS Data Protection - a disk-based backup and recovery service providing faster operation than<br />

tape-based systems and enabling data de-duplication to reduce the amount of stored<br />

data. Daily and weekly backups shall be retained for 28 days as standard, with options for longer<br />

periods.<br />

SMS shall offer the following standard features:<br />

· Data transfer shall be free of charge (uploads & downloads)<br />

· Includes one increase or decrease in storage capacity per host per month<br />

· Capacity changes shall be applied in 1 working day<br />

· Capacity may be increased by up to 10% per month. Unlimited increases shall be available with<br />

3 months’ notice.<br />

· Unlimited capacity decreases for shared storage<br />

· Customer data shall be processed and stored only at the agreed data centre locations,<br />

auditable by the Customer and their official regulator<br />

· Usage reports shall be provided monthly.<br />

SMS shall offer the following options:<br />

627


· Replicated storage in another nominated Contractor data centre, including real-time or delayed<br />

data mirroring<br />

· Network optimisation and application acceleration<br />

· Capacity planning assistance<br />

· Customised service reports and compliance reports<br />

· Information management consultancy and assistance<br />

· Assistance to set-up SMS, including data migration<br />

· System management of Customer production workloads.<br />

SMS shall be available as:<br />

· A shared service, hosted in the Contractor’s data centres<br />

· A dedicated service, hosted in the Contractor’s data centres<br />

· A dedicated service, hosted in the Customer’s data centres.<br />

Security <strong><strong>Service</strong>s</strong><br />

The Contractor shall provide a portfolio of Security <strong><strong>Service</strong>s</strong> based on security products from a range<br />

of vendors. It shall utilise its own professional services to support the assessment of risk, define<br />

requirements, provide technical and service design and architecture as well as ensuring the effective<br />

deployment and operation of the Security <strong><strong>Service</strong>s</strong>.<br />

The Security <strong><strong>Service</strong>s</strong> shall be monitored and supported 24x7 and shall be delivered as either on-site<br />

capabilities or network-based services. The <strong><strong>Service</strong>s</strong> shall include reporting, incident response,<br />

remediation, advice and guidance from the Contractor’s Security Operations Centre.<br />

The following table shows the <strong><strong>Service</strong>s</strong> that shall be available:<br />

<strong>Service</strong> Description<br />

Firewalls This <strong>Service</strong> shall offer a range of managed firewall capabilities to<br />

provide protection against unauthorised access to information assets.<br />

Intrusion<br />

Detection Systems<br />

(IDS) and Intrusion<br />

Prevention Systems<br />

(IPS)<br />

Security<br />

Information and<br />

Event Management<br />

(SIEM)<br />

628<br />

This <strong>Service</strong> shall offer appliances and software to monitor network<br />

traffic for malicious activity, provide security alerts for analysis and<br />

remediation, and block threats in accordance with the defined security<br />

policy.<br />

This <strong>Service</strong> shall underpin security compliance (CESG Good Practice<br />

Guide 13) through the collection, storage, correlation and analysis of log<br />

information from a range of security and other devices. It shall provide<br />

the core components for the prevention, detection and remediation of<br />

security incidents as well as enabling retrospective analysis to support<br />

security investigations.<br />

Web Security This <strong>Service</strong> shall protect the Customer against inbound and outbound<br />

web-based threats (anti-malware, spam, worms, botnets etc.) and enable


Endpoint<br />

Security<br />

629<br />

enforcement of web usage in line with the defined security policies and<br />

acceptable-use policies. It shall also block inbound web content that is<br />

not within the security policy.<br />

This <strong>Service</strong> shall ensure consistent endpoint protection across the<br />

Customer’s estate to meet malware threats, provide a consolidated view<br />

of the application of endpoint security and report any security alerts. The<br />

<strong>Service</strong> may include antivirus and anti-spyware, application and device<br />

control, desktop firewalls, host intrusion prevention and network access<br />

control.<br />

Email Security This <strong>Service</strong> shall protect the Customer from inbound and outbound<br />

email threats (including spam, malware, phishing etc.) and may also<br />

enforce security policies (including data leakage and acceptable use<br />

policies).<br />

Vulnerability<br />

Assessment<br />

Data Loss<br />

Prevention<br />

This <strong>Service</strong> shall scan the Customer’s infrastructure to identify and<br />

prioritise any known vulnerabilities. The scope of the vulnerability<br />

assessment shall be customised and the <strong>Service</strong> shall provide a detailed<br />

report containing advice on remediation options to enhance the<br />

protection of information assets.<br />

This <strong>Service</strong> shall protect against loss of sensitive information and<br />

subsequent reputational damage through the enforcement of defined<br />

policies, to mitigate the risk of sensitive data loss and also to report on<br />

compliance requirements.<br />

Authentication This <strong>Service</strong> shall provide the primary method for users to claim and<br />

verify their identity to systems. It shall be capable of supporting multiple<br />

factors as required by the Customer to provide additional assurance,<br />

which may include: one-time passwords; physical tokens; soft tokens;<br />

biometrics; out-of-band components.<br />

Access<br />

Management<br />

Web &<br />

Application Sign-on<br />

<strong><strong>Service</strong>s</strong><br />

This <strong>Service</strong> shall provide a range of means and mechanisms to enable<br />

the Customer to define and control who has access to what<br />

information. Access rights and permissions may be applied by rules or<br />

roles or a combination of both, and the <strong>Service</strong> shall provide<br />

administration services to allow them to be controlled securely.<br />

These <strong><strong>Service</strong>s</strong> shall provide the means whereby Customer users can<br />

access both internal and external applications and services (such as cloudbased<br />

software-as a-service platforms) securely without being challenged<br />

for additional user credentials. The <strong>Service</strong> may extend to enable access<br />

to those applications and services from a range of devices including<br />

laptops, shared devices (e.g. Internet café access) and mobile devices such<br />

as smartphones and tablets.


CLAS<br />

Professional Security<br />

<strong><strong>Service</strong>s</strong><br />

Identity and<br />

Access Management<br />

consultancy<br />

Business and<br />

<strong>Service</strong> Continuity<br />

630<br />

CLAS is the CESG Listed Adviser Scheme - a partnership linking the<br />

Information Assurance (IA) knowledge of CESG with the expertise and<br />

resources of the private sector. The Contractor shall provide CLAS<br />

Professional Security <strong><strong>Service</strong>s</strong> fulfilled by CLAS-accredited individuals with<br />

experience of designing and operating protectively marked systems. The<br />

CLAS Professional Security <strong><strong>Service</strong>s</strong> shall include the following service<br />

types which can be tailored to meet the Customer’s specific requirements:<br />

· Information Security Reviews. Assessment of alignment of<br />

existing policy with the requirements of the Security Policy<br />

Framework or a review of the Customer’s current security<br />

arrangements. This <strong>Service</strong> defines any shortfalls coupled with a<br />

detailed improvement plan.<br />

· Development and review of Risk Management and Accreditation<br />

Document Sets (RMADS)<br />

· Risk Assessment & Treatment Planning<br />

· IT Health Check planning and guidance<br />

· Advice on ‘off-shoring’ data<br />

· Strategies, solutions and services for realising protective<br />

monitoring within an organisation<br />

· System Decommissioning <strong><strong>Service</strong>s</strong><br />

· Codes of Connection reviews<br />

· IA Maturity reviews and IA strategy development<br />

· Provision of experienced staff to take on senior security coordination<br />

roles or accreditation roles<br />

· Understanding and specifying security requirements within<br />

contracts<br />

The Contractor has staff experienced in the use and deployment of<br />

identity lifecycle management, and shall provide focussed consultancy to<br />

help Customers overcome their identity and access challenges, reduce the<br />

risk and impact of unauthorised access, enable secure mobility, realise<br />

business efficiencies and ensure regulatory compliance<br />

The Contractor shall provide consultancy <strong><strong>Service</strong>s</strong> to assist Customers<br />

to develop continuity strategies, then build, deploy and validate them to<br />

meet Customer requirements. The Contractor shall also provide<br />

continuity testing <strong><strong>Service</strong>s</strong> to ensure that the implementation meets the<br />

agreed continuity requirements ready for live operation.<br />

The Contractor shall provide an assurance programme, including<br />

audits, reviews and on-going testing, to help ensure that an effective<br />

response continues to be available to meet the continuity<br />

requirements. The approach shall align to industry compliance standards<br />

such as BS25999, BS25777 and ISO/IEC20000.


Security Review The Contractor shall provide <strong><strong>Service</strong>s</strong> that deliver an independent<br />

review of the current security status coupled with a clearly defined plan of<br />

action, tailored to the Customer environment. It shall identify the<br />

effectiveness of the security controls in place to protect critical assets,<br />

sensitive data stores and business critical interconnections. Reviews shall<br />

also include audits against regulatory requirements (e.g. PCI DSS),<br />

standards (e.g. ISO 27001), best practices, HMG policies and any relevant<br />

external parties’ codes of connection. Additionally, the review can focus<br />

on areas such as Data Loss Prevention (DLP) and Governance Risk and<br />

Compliance (GRC).<br />

Cloud Security<br />

Review<br />

Governance Risk<br />

Management and<br />

Compliance<br />

631<br />

The Cloud Security review shall provide an in-depth security<br />

assessment of a Customer’s current security situation regarding the<br />

delivery of cloud services, or the potential to move IT services and data<br />

into a cloud-services platform. Guidance shall be given in the selection<br />

and application of appropriate safeguards to meet Customer-defined<br />

security fundamentals, to helps the Customer meet its business objectives<br />

or mission by protecting its physical and financial resources, data,<br />

processes, reputation, legal position, employees, and other tangible and<br />

intangible assets in a cloud environment.<br />

The Contractor has staff experienced in the operation of, and working<br />

within, risk and compliance governance frameworks. The Contractor shall<br />

provide professional consultancy services to support Customers in<br />

establishing or maintaining their Governance and Risk Management<br />

systems (technical, commercial and security), and understanding their<br />

compliance obligations and determining remediation activities needed to<br />

reach or maintain compliance<br />

VPN <strong><strong>Service</strong>s</strong> VPN services ensure secure transit of information and enables secure<br />

remote and flexible working. The Contractor shall provide secure VPN<br />

services for remote access. Types of VPN solutions may vary according to<br />

Customer requirements, but include solutions suitable for corporate<br />

environments and suitable and accreditable in government environments<br />

up to Impact Level 4.<br />

Encryption<br />

<strong><strong>Service</strong>s</strong><br />

Security <strong><strong>Service</strong>s</strong> Management<br />

The Contractor shall provide encryption products and services to<br />

protect Customer data in transit (on networks) and at rest (on endpoints)<br />

using appropriately certified and approved products suitable for corporate<br />

environments and suitable and accreditable in government environments<br />

up to Impact Level 4.<br />

The Security <strong><strong>Service</strong>s</strong> shall be integrated with resolver groups within an ITIL framework and be able<br />

to provide a consolidated view of security. Operation of the <strong><strong>Service</strong>s</strong> shall include:


· Maintenance of the Security <strong>Service</strong> including proactive and reactive support including:<br />

632<br />

· Patching and version upgrades<br />

· Monitoring for system health and utilisation<br />

· Remediation of faults<br />

· Malware protection updates<br />

· Tuning<br />

· Policy change management<br />

· Monitoring of security devices for threats, anomalous traffic or activity to enable a centralised<br />

view of security alerts and incidents to provide situational awareness across multiple accounts<br />

and services. This incorporates:<br />

· Event Analysis – Upon detection, security events shall be analysed to ascertain if they<br />

need to be upgraded to a security Incident for further action<br />

· Security Incident Categorisation – If the event is defined as a security Incident, it shall be<br />

categorised considering the cause, priority, potential impact and the urgency of response<br />

· Security Incident Response – The security analysts, resolver groups and service<br />

management team, plus identified Customer stakeholders as defined within the<br />

overarching <strong>Service</strong> Design and communications plan, will agree on the most appropriate<br />

course of action. When a course of action has been implemented, its effectiveness in<br />

resolving the Incident shall be assessed so that if the chosen course of action is not<br />

effective, further course/s of action can be taken. The security Incident shall be tracked to<br />

resolution<br />

· Post Incident Analysis - After each security Incident, post-Incident analysis shall be<br />

undertaken to:<br />

· Ensure that the conduct of the investigation was appropriate<br />

· Consider lessons identified, where conduct of the investigation could be improved<br />

· Ensure that all mitigating actions have been taken<br />

· Determine if any preventative measures are required to prevent repetition of<br />

security Incidents or events of a similar nature<br />

· Reporting on the Security <strong>Service</strong> performance, incidents and trends.<br />

Real-Time Information Systems<br />

The Contractor shall offer its Digital Media Network (DMN) service to allow Customers to provide<br />

information to their users and clients.<br />

Digital Media Network (also popularly known as Digital Signage, in-house TV and Digital Out Of<br />

Home) is a business solution enabling an organisation to manage and schedule the playback of<br />

multimedia content, combined with other sources of information and feedback, from a central location<br />

to a wide estate of remotely connected playback devices and associated display technologies.<br />

The DMN <strong>Service</strong> shall provide a centrally hosted storage and management facility, softwarecontrolled<br />

to allow individual multimedia files to be assigned to specific locations and screens within a<br />

playback schedule. Authorised users from remote locations shall be able to undertake administration of<br />

the system. The system shall provide a monitoring and reporting environment to manage the operation<br />

and to respond in the event of disruption, however caused.


Once scheduled, the system shall manage the distribution of relevant information across the<br />

networking environment, delivering content and operating instructions to playback devices associated<br />

with a wide variety of display technologies. The Contractor shall offer assistance to allow the Customer<br />

to select the most appropriate technologies to communicate in an effective and efficient manner to its<br />

target audience.<br />

In addition to distributing pre-prepared multimedia content to screens in remote locations, the<br />

DMN <strong><strong>Service</strong>s</strong> shall integrate with other systems and sources of information, allowing the display of<br />

dynamic and relevant content:<br />

· Integration with web-based RSS data<br />

· Third party databases, POS and information systems<br />

· Bluetooth, SMS, Q-Code and NFC/RFID integration<br />

· Integration of User Generated Content and social media<br />

· Localised information from local IT systems<br />

· Queue, appointment and call management optimisation systems<br />

· Live streamed video.<br />

As well as to communication-to-many via large display technologies, the DMN <strong>Service</strong> shall also<br />

offer interactive solutions:<br />

· Kiosks: interactive kiosks are an electronic communications tool that enables clients to serve<br />

themselves – accessing information, making purchases, etc. The Contractor shall offer<br />

customised, end-to-end interactive kiosk solutions to meet the needs of Customers and their<br />

clients by handling enquiries and transactions.<br />

· Multi-concurrent multi-touch surfaces: A hybrid between talk-to-many interactive digital<br />

signage screens and personal-space transactional kiosks, multi-touch surfaces provide a tabletstyle<br />

touch interaction to multiple users simultaneously. The Contractor shall offer applications,<br />

developed to take advantage of the interface, that engage clients and streamline transactional<br />

interactions.<br />

Messaging <strong><strong>Service</strong>s</strong><br />

Desktop Messaging<br />

Desktop Instant messaging shall be offered under the Voice <strong><strong>Service</strong>s</strong> described above. While these<br />

are normally deployed as part of a unified communications solution, the desktop messaging and<br />

presence features shall be available separately.<br />

Messaging Gateway<br />

The Contractor shall offer a Messaging Gateway <strong>Service</strong> that supports the following message types:<br />

· SMS (UK and International)<br />

· Email<br />

· Pager – both UK networks<br />

· 2-way pager<br />

· Landline<br />

· Text-to-speech<br />

633


· Location requests - using mobile network location or GPS<br />

· Smartphone instant messaging app<br />

· Voice broadcast<br />

The desktop element of the <strong>Service</strong> shall include a master account, and child/user accounts that<br />

include the following features:<br />

· Send to individual or group<br />

· Send to any combination of SMS, pager, smartphone, email, landline<br />

· Address book – including user-defined custom fields<br />

· Create/edit message templates<br />

· Create and edit broadcast lists<br />

· Create multi-rule search filters<br />

· Pre-scheduled messages<br />

· Outbox message log, including delivery status<br />

· Inbox for SMS, 2-way pager and email replies, with auto-forward option to SMS/email<br />

· Reporting with export options<br />

Optional <strong>Service</strong> elements shall include:<br />

· Outbound voice broadcast<br />

· Location-based service including mapping<br />

· Campaign manager with shortcode/keyword campaigns<br />

The <strong>Service</strong> shall also offer a range of documented Application Programming Interfaces (APIs) to<br />

allow third party software and systems to integrate with the messaging gateway. APIs supported shall<br />

include:<br />

· SOAP/XML<br />

· REST<br />

· SMTP<br />

· SNPP<br />

· SMPP<br />

· TAP (dial-up).<br />

Definitions Of Terms<br />

Term Definition<br />

ACD Automatic Call Distribution – the automated handling of inbound calls based on<br />

a set of business rules<br />

API Application Programming Interface – a specification of the data structures and<br />

routines that an application supports to allow other applications to communicate<br />

with it.<br />

634


BRENT A range of encrypted telephones used for secure calls over ISDN lines.<br />

CCTV Close Circuit TeleVision; generic term applied to surveillance monitoring<br />

solutions applying generally to all IP based surveillance systems as well as legacy<br />

coaxial through to NDVR solutions<br />

CESG Communications-Electronics Security Group – the Information Assurance group<br />

within the <strong>Government</strong> Communications Headquarters.<br />

CLAS CESG Listed Advisor Scheme – a CESG-maintained list of security advisors who<br />

have been accredited to give advice on aspects of UK government security.<br />

DDI Direct Dial-In – a telephone extension that has an associated PSTN number, so<br />

external callers can dial directly to it without going via an operator<br />

DEL Direct Exchange Line – an analogue connection to the PSTN, i.e. a traditional<br />

phone line.<br />

DISA Direct Inward System Access – a system used to make external callers appear to<br />

be local extension users.<br />

DLP Data Loss Prevention – techniques to avoid the accidental or deliberate leakage<br />

of sensitive information outside its security domain.<br />

DMN Digital Media Network – a service offering digital signage, information displays,<br />

kiosks and other forms of public information and interaction.<br />

DTMF Dual-tone multi-frequency; used for telecommunication in-band signaling over<br />

analogue telephone lines between telephone handsets and other communications<br />

devices and the switching center.<br />

EDRM Electronic Document and Records Management – a system for the control,<br />

protection and retrieval of electronically held information.<br />

Fibre<br />

Channel<br />

635<br />

A networking technology for storage systems.<br />

GPS Global Positioning System – satellite-based geographic location service.<br />

GRC Governance, Risk management and Compliance – the approach an organisation<br />

takes in managing these areas, and how it integrates them.<br />

IA Information Assurance – the study and management of risk in an informationhandling<br />

environment.<br />

ID Identification


IL Impact Level<br />

IL2 Impact Level 2-2-x for Integrity, Confidentiality and availability (PROTECT)<br />

IL3 Impact Level 3-3-x for Integrity, Confidentiality and availability (RESTRICTED)<br />

IL4 Impact Level 4-4-x for Integrity, Confidentiality and availability (CONFIDENTIAL)<br />

IMAP Internet Mail Access Protocol – a protocol used to synchronise email between a<br />

mail client and server, so that both hold the same data.<br />

IP Internet Protocol; primary protocol for the transmission of data packets across<br />

computer-based networks<br />

IPT Internet Protocol Telephony – the processing and transmission of voice calls as<br />

IP data streams.<br />

ISDN Integrated <strong><strong>Service</strong>s</strong> Digital Network; a set of communications standards for<br />

simultaneous digital transmission of voice, video, data, and other network services<br />

over the traditional circuits of the public switched telephone network.<br />

ISO International Organization for Standardization – the international body<br />

responsible for setting global standards.<br />

IT Information Technology<br />

ITIL Information Technology Infrastructure Library (ITIL); a suite of practices for IT<br />

service management aligning IT services with the needs of business<br />

LAN Local Area Network – a local network within a building or a campus, normally<br />

based on Ethernet.<br />

LINX London INternet eXchange – a pair of national peering points between all major<br />

UK ISPs, used for the exchange of Internet traffic between their customers.<br />

PBX Private Branch Exchange<br />

PCI-DSS Payment Card Industry Data Security Standard – a standard for the secure<br />

handling of cardholder information when processing card payments.<br />

PIN Personal Identification Number – a multi-digit number (usually a minimum of 4<br />

digits) used to verify the identity of a user.<br />

POP3 Post Office Protocol version 3 – a protocol used by email clients to retrieve email<br />

from a server<br />

636


Presence An indication of the current state of a user, whether they are online, offline,<br />

active or away from their device (computer, phone, etc.)<br />

PSTN Public Switched Telephony Network – the public phone system<br />

Q&A Question and Answer.<br />

RAID Redundant Array of Inexpensive Disks – a set of disk drives that appear like a<br />

single larger or faster drive by spreading data across all drives, often with duplication<br />

or other data-integrity protection measures.<br />

REST REStructured Text – a simple markup language, related to the Python<br />

programming language<br />

R-Factor Measure of voice call quality, based on the percentage of users satisfied with the<br />

quality of a test signal sent over the network.<br />

RMADS Risk Management and Accreditation Document Set – the formal documentation<br />

associated with risk assessment and security accreditation.<br />

SATA Serial Advanced Technology Attachment– a standard for connecting disk drives<br />

to a computer.<br />

SCSI Small Computer Systems Interface – a standard for connecting disk drives to a<br />

computer.<br />

SIP Session Initiation Protocol – an open-standard protocol used to set up calls in IP<br />

Telephony.<br />

SLA <strong>Service</strong> Level Agreement – an agreed set of performance metrics that a service<br />

should deliver.<br />

SMS Either: Short Message <strong>Service</strong> – 160-character text messages over mobile<br />

networks, or Storage Managed <strong>Service</strong> – the Contractor’s cloud-based storage<br />

service<br />

SMTP Simple Mail Transfer Protocol – a protocol used to send and relay email between<br />

mail servers.<br />

SNPP Simple Network Paging Protocol – a protocol for sending messages to pager<br />

devices over the Internet.<br />

SOAP Simple Object Access Protocol – a protocol for exchanging information between<br />

Web-based applications<br />

637


Softphone<br />

, Soft Client<br />

638<br />

A software application for use in IP Telephony that emulates a phone on a user’s<br />

desktop or laptop computer<br />

TAP Telocator Alphanumeric Protocol – a protocol for sending alphanumeric<br />

messages to pagers or mobile phones<br />

TDM Time-Division Multiplexing – a technique to allow multiple signals to share one<br />

communications channel, allowing them equal time on the channel by taking turns.<br />

UPS Uninterruptable Power Supply; electrical device providing temporary emergency<br />

mains power to a system should mains power fail<br />

VPN Virtual Private Network – a private network created over a shared infrastructure<br />

using encryption or other data-separation techniques.<br />

WAN Wide Area Network – a network that runs between different locations (buildings<br />

or campuses).<br />

WYSIWYG What You See Is What You Get – a term used for content editing software that<br />

continuously shows the user how the document will appear.<br />

XML eXtensible Markup Language – a language used to create data structures that<br />

allows the creator to define their own extensions to the basic elements.


Global Crossing<br />

Level 3 has been providing a comprehensive range of traditional and IP based voice service to<br />

<strong>Government</strong> for over 15 years via the MTS and MTCF frameworks. As a MTCF provider Level 3<br />

currently has over 50,000 voice end-points in service with various <strong>Government</strong> departments<br />

with over 200,000 voice desktops in place across the public sector.<br />

Level 3 continues to invest in communications services and has the core capability to deliver a<br />

wide range of voice and communications services to support evolving customer requirements.<br />

Level 3 has key technical and commercial resources at various levels ensuring that we are at<br />

the forefront of technological and pricing benefits. Utilising Level 3’s knowledge and experience<br />

within the <strong>Government</strong> sector and our legacy customer base we have developed a service<br />

offering to meet <strong>Government</strong> department needs in this area.<br />

Level 3 understands that communications services must be flexible, tailored to meet<br />

communication needs, compliant with regulation and corporate governance and also aligned<br />

with <strong>PSN</strong> and industry standards. Most importantly, we know that services should simply work –<br />

seamlessly facilitating our customers’ changing communication needs. We will use our<br />

expertise in communications services to ensure that the customers get the service they require<br />

whilst also driving long term value for money.<br />

In summary the Level 3 communications service covers:-<br />

639<br />

Supply, installation, delivery, design, maintenance and support services<br />

Traditional and IP based services using our own infrastructure<br />

Voice call packages and call preference services<br />

Conferencing services including desktop video conferencing<br />

Internet service<br />

Email, website services, co-location and hosting<br />

On-line storage<br />

Security services and anti-virus<br />

Email scanning and detection<br />

Firewalls<br />

Intrusion and spyware detection<br />

Authentication and access management<br />

Web Conferencing<br />

These services can be provided as commodity or managed services.<br />

Delivery <strong><strong>Service</strong>s</strong><br />

It is recognised that one of the key tenets of <strong>PSN</strong> is guaranteed interoperability and to ‘make it<br />

work’. Level 3 has a broad range of delivery services designed to minimize risk and guarantee end to end<br />

SLAs.


In the UK we have more than a thousand Security Cleared (SC) staff and we sponsor over one<br />

thousand eight hundred SC clearances across contractors and suppliers. The majority of this operation is<br />

dedicated to supporting <strong>Government</strong> managed service customers giving us a strong base from which to<br />

deliver <strong>PSN</strong> services. This capability is complemented by several List X sites and a resilient data and<br />

command infrastructure cleared to operate IL3 and IL4 services.<br />

As an organisation comprising of more than ten thousand staff we are able to draw upon<br />

experienced resources where necessary to assist with the design, development, supply, installation,<br />

delivery and support of products and services for <strong>PSN</strong>.<br />

Level 3 offers a range of delivery, service and professional services capabilities relating to security<br />

for networks and accredited applications, and is already a leading trusted supplier to the UK public<br />

sector. Our organisation is staffed with fully qualified and experienced communications professionals<br />

covering all elements of the government security requirements from IL2-2-4 through to IL4-4-4. Staff are<br />

evaluated and chosen using the strict Level 3 vetting process ensuring full government security<br />

clearance at whatever level is applicable.<br />

Level 3 implements and adheres to the principles, standards and guidelines for the delivery of<br />

services as described in the ITIL framework.<br />

Level 3’s support model operates with a dual centre 24x7x365 service desk and network operation<br />

centre for incident management. Both support centres are UK based and have full capabilities to take<br />

on management in a disaster recovery/business continuity situation. The network operations centres<br />

proactively manage incidents identified through network monitoring tools and alarms.<br />

640


Project Management<br />

The Level 3 project management process is based on the PRINCE2 methodology but is modified to<br />

meet customer needs, a practice that is encouraged by PRINCE2.<br />

Level 3 has a strong track record of delivering large scale projects into the <strong>Government</strong> sector and is<br />

currently engaged with large consolidate and build projects in HMRC and MOJ. We can call on excellent<br />

resources and skill sets which can be demonstrated with the following breakdown:<br />

641<br />

40 in-house project management professionals and a pool of external professionals on whom<br />

we can draw<br />

Project leader/stage manager to programme director<br />

95% PRINCE2 accredited to practitioner level<br />

OGC Change Management, MSP (Managing Successful Programmes), MoR (Management of<br />

Risk) and PMO specialists<br />

80% of our professionals are security cleared<br />

20% of our professionals are multi-lingual<br />

Experienced, seasoned professionals with track records of implementing projects to time,<br />

budget and quality<br />

The disciplines of formal project start-up, initiation, transition, monitoring and closure are key<br />

stages of the project life cycle and are managed by a project manager qualified to a PRINCE2 practitioner<br />

level. Each project is controlled during its life cycle by adherence to the five generic project stages from<br />

which specific deliverables will be forthcoming.<br />

These five project stages are depicted in the following figure:


642<br />

Project Lifecycle Diagram<br />

Level 3 recognises that a successful <strong>PSN</strong> <strong><strong>Service</strong>s</strong> provider will understand<br />

and be committed to the overall programme and vision, including the<br />

delivery of services. Our on-going experience in delivering <strong>PSN</strong><br />

compliant programmes and our commitment to best practice service<br />

delivery mean that Level 3 is fully aligned with the <strong>PSN</strong> vision.<br />

<strong>Service</strong> Management<br />

One of the key elements of the <strong>PSN</strong> programme is guaranteed interoperability and service level<br />

agreements. Level 3 takes this seriously and has an ITIL based service management methodology.<br />

The purpose of Level 3’s service management function is to provide a positive service management<br />

experience that develops and maintains positive long-term customer relationships. It provides on-


demand and proactive service support to customers whose unique set of service requirements drive the<br />

need for a close working relationship.<br />

Large <strong>PSN</strong> projects will be allocated a service manager, whose role is to be the client facing contact<br />

for the on-going service level and service performance reviews. With over 30 ITIL qualified service<br />

managers in the UK, the majority of whom have experience working with <strong>Government</strong> departments, we<br />

have a considerable resource pool and knowledge base upon which to provide flexible levels of service<br />

management for <strong>PSN</strong>.<br />

The Level 3 service management model is further explained in the diagram below:<br />

643<br />

Enhanced & Premium <strong>Service</strong> Management overlay -<br />

Tailored to customer need, bespoke, flexible, proactive, experienced,<br />

dedicated, ITIL qualified <strong>Service</strong> Managers<br />

OR<br />

Standard <strong>Service</strong> Management overlay –<br />

UK based team providing single point of contact for assistance & queries<br />

Incident Mgt Problem Mgt Change Mgt Finance Mgt<br />

Configuration<br />

Mgt<br />

<strong>Service</strong> Management Model<br />

Customer’s<br />

<strong>Service</strong><br />

Team<br />

Customer’s<br />

Incident,<br />

Problem,<br />

Change,<br />

Finance,<br />

etc... Teams


When an incident is identified via proactive monitoring on a customer’s network a ticket is opened<br />

on the Level 3 incident management system to record the event. Automated notification emails can also<br />

be set up to provide immediate notification of the creation of a fault ticket to agreed parties, as well as<br />

being entered on to Level 3 customer portal “uCommand”.<br />

644<br />

View Tickets in uCommand<br />

In addition to the proactive monitoring Level 3’s support model also allows for incidents to be<br />

reported in by the customer’s service desk. Any incident reported into Level 3 will be handled by a<br />

technical front line team who will attempt first line diagnosis and fix. Where this is not possible, or the


incident is diagnosed as requiring more detailed technical investigation or third party support, the<br />

incident is transferred to the relevant resolution team. Level 3 has a number of specialist technical<br />

teams plus a dedicated team to manage third party suppliers. Throughout the incident lifetime updates<br />

are provided to the customer’s service desk either by email or telephone as well as in uCommand.<br />

Incident resolution times are calculated from the first report to the Level 3’s service desk until the<br />

action has been completed by or on behalf of Level 3 to repair the root cause of the incident or a<br />

workaround has been implemented by the contractor.<br />

There is an inbuilt escalation procedure in the Level 3 incident management system. This ensures<br />

tickets nearing their SLA are escalated for closer attention to ensure incidents are resolved within SLA.<br />

Additionally customers may request an escalation at any time, calling the same dedicated telephone<br />

number.<br />

The interaction and reporting provided by Level 3 will be tailored to meet the customer’s needs but<br />

will focus on the following areas:<br />

<strong>Service</strong> Introduction; The process of introducing the service management function, the systems<br />

available to the client and the process used to agree the detailed service interaction required on a<br />

regular basis.<br />

<strong>Service</strong> Review Meetings; Meetings to review service performance. <strong>Service</strong> manager to attend<br />

/chair and minute formal service review meeting and to own actions resulting from meeting.<br />

Reporting; Production of tailored customer reporting on SLA performance / availability / change etc.<br />

The output is captured for discussion as an agenda item at the service review meetings.<br />

645


<strong>Service</strong> Level Management; Proactive reporting of service level performance and calculation of<br />

service penalties (where applicable)<br />

Escalation Management; Single point of contact for customer assistance during escalation<br />

Operational Reviews; Arrange and chair operational reviews with the customer as required<br />

Continual <strong>Service</strong> Improvement; An on-going review of the operational processes to drive<br />

improvements in customer service experience.<br />

<strong>Service</strong> Improvement Plan; Proactive service improvement documented and captured in CSI Plan -<br />

owned and managed by the service manager in consultation with customer. The output is captured for<br />

discussion as agenda item at the service review meetings.<br />

Customer Information Guide; The production and on-going management of customised service<br />

lifecycle management handbook.<br />

Major Incident Management and Root Cause Analysis (RCA); To provide major incident<br />

management contact and production of major incident reports for P1 incidents. Co-ordination of<br />

associated follow up and closure with problem management<br />

Problem Management; Working in conjunction with the Level 3 problem management function in<br />

proactive trending of statistics and information. The output is captured for discussion as agenda item at<br />

the service review meetings.<br />

Operational Processes<br />

646


For effective management of the service a number of key activities will be carried out during the<br />

entire life of the service and will form part of the review process with the client.<br />

Change Control: proposed changes are thoroughly reviewed before any action is taken to<br />

implement the change.<br />

647<br />

Level 3 enforces a robust change management process. Its purpose is to ensure that ALL<br />

changes made to any network owned by Level 3, or for which it has responsibility, are managed in a<br />

proper, consistent manner, through a single point of contact. ALL changes to the networks<br />

irrespective of their simplicity or complexity will be managed through the change control process.<br />

SLAs.<br />

Level 3 will provide a product catalogue detailing all standard order codes and their associated<br />

Availability Management: <strong>Service</strong> level targets are a key service metric.<br />

Network management and monitoring tools are utilised within the network operations centre<br />

to ensure immediate response to a network incident and minimising service unavailability. Capacity<br />

management reports are reviewed by the operations team and provide an important input to<br />

availability management.<br />

Capacity Management: Ensuring that customers and multi-tenanted sites have no capacity issues<br />

Level 3’s design and technical consultants will work with customers to scope the size of the<br />

circuits and ports required for the varying site types based on current and projected usage and<br />

requirements and requirements for all tenants in a building.<br />

Capacity reports will be produced to show on a per site basis the utilisation for the previous<br />

months to enable the Level 3 operation and service management teams to identify potential<br />

capacity issues on or before issues potentially impact service. Capacity management reports will be


included in the monthly management report to show site by site utilisation and exception<br />

reporting.<br />

648<br />

On line monitoring tools also provide the Network Operations Centre (NOC) with the ability to<br />

view capacity issues during a service event.<br />

Release and deployment process: release management processes are in place for the introduction<br />

of new hardware and software upgrades to an existing service and for policy revisions for changes<br />

to services such as security and firewall management.<br />

Level 3 will ensure the scope of the service delivered has the full functionality to support the<br />

design of the service and as such the equipment is specified with the latest and most appropriate<br />

configuration. For example, if an incident is identified by our technical specialist teams or by our<br />

third party equipment providers where the root cause is attributed to a software issue:<br />

The integrity of existing customer service is number one priority to Level 3, and therefore the<br />

strict adherence to release and change management processes are mandatory.<br />

Maintenance: Level 3 provide a comprehensive range of maintenance options.<br />

All ports on our routers are monitored 24x7 by our network operating centre facilities to ensure<br />

our guidelines are being met. It is also worth noting that the majority of the IP network is carried<br />

over Level 3s own transmission network which is monitored, managed and maintained on a 24x7<br />

basis by Level 3 engineers.<br />

Level 3 offers a variety of different maintenance options to individual customers, dependent on<br />

their individual maintenance requirements. This is dependent on site priorities.


Level 3 has provided a range of both standard and enhanced service management facilities to a<br />

number of government departments including Skills Funding Agency, HMRC and Crown Prosecution<br />

<strong>Service</strong>.<br />

Traditional and IP based voice services<br />

The Level 3 voice service will include the option of providing new TDM infrastructure or a next<br />

generation IP solution based on an IL2 or IL3 hosted IP telephony service or IP enabled PBX solutions<br />

located at the customer premise. Both solutions are offered as a fully managed service which includes<br />

provisioning and on-going support.<br />

Where traditional PBXs are required customers will be provided with a PBX having on-site switching<br />

capabilities using both TDM and IP. Connectivity will be required to connect the PBX to a public<br />

telecoms operator which could be to the Level 3 core switches using access circuits utilising PSTN<br />

signalling standards of DPNSS and ISDN/Q931 or SIP trunking as appropriate.<br />

Level 3 also provides an option of deploying a next generation voice service based on IL2 or IL3<br />

hosted IP telephony services. It is a high availability hosted IP voice platform using Cisco unified<br />

communication platform which shall be deployed across two Level 3 data centres with no single points<br />

of failure. The solution is based on industry standard SIP based architecture. The next generation voice<br />

service is a fully managed IP based voice service utilising a core, multi-tenanted soft-switch capability. It<br />

has been engineered to integrate with other technology platforms such as unified communications<br />

(Microsoft Lync) and call handling (Aspect Hosted Contact Centre) services.<br />

649


Level 3 ensures customers are provided with a low-risk, cost effective managed telephony service<br />

which will allow users to be transitioned from their existing service to a next generation voice service in<br />

a seamless approach.<br />

Level 3 has selected an industry leading partner to implement the next generation voice service in<br />

Cisco and together we provide a risk free migration to IP telephony. The proposed next generation<br />

services will be built around best of breed industry leading products and services that provide a resilient<br />

architecture which allows the flexibility and scalability necessary for a changing environment. The<br />

solution is based on IL2 or IL3 compliant telephony platforms based on open standard SIP architecture.<br />

Level 3 is a leading member of the <strong>PSN</strong> community and the proposed solution is fully compatible<br />

with all current <strong>PSN</strong> requirements and the company is fully committed to <strong>PSN</strong> standards. Level 3 and<br />

Cisco are major contributors to the various <strong>PSN</strong> work streams and therefore <strong>Government</strong> departments<br />

can be assured that the solution deployed will be taken through the <strong>PSN</strong> assurance process.<br />

The service will be connected to the customer infrastructure using <strong>PSN</strong> compliant/approved<br />

services. This connectivity will provide access to the main hosted IP telephony platform, session border<br />

controllers and media gateways in the core network which will provide access to all features and<br />

functionality including connections to any traditional voice customers.<br />

650


Next Generation service shown at high level including connectivity to Hosted services and <strong>PSN</strong><br />

The following features and benefits are available for both traditional and next generation IP service:<br />

651<br />

Voice calls from desktop to desktop phone<br />

Voice calls to and from PSTN via DNSP or GCN connectivity using lease cost routing on-net calls<br />

will not traverse the PSTN<br />

Support for DDI numbers and number portal/migration as appropriate<br />

Support for emergency calls, does not require the user to be logged onto the endpoint<br />

Support for a numbering plan as defined by the framework authority<br />

Support for legal interception<br />

Provides access to directory enquires 118 services. Level 3 will also provide a facility to list DDI<br />

numbers in external directories.<br />

Unified voicemail<br />

Directory federation connecting the customer’s directory to our central directory


652<br />

Tones (beeps) will be inserted when calls are made to IL2 users<br />

Instant messages to IL2 users from IL3 will have warning banners inserted to warn users of lower<br />

impact level conversations<br />

This service will allow conversions: email to fax, fax to email, SMS to email, email to SMS, text to<br />

voice, voice to text.<br />

TDM and next generation voice services include basic functionality such as call-forwarding, call<br />

pick-up, add-on conferencing, short-code dialling, etc as commonly used within enterprises<br />

Users to retain current internal numbers as well as their existing PSTN number ranges<br />

Level 3 will work with the Framework Authority to administer the common numbering plan for<br />

the next generation voice services<br />

Gateway devices to support fax and analogue phones/devices will be made available<br />

Level 3 can build dedicated interconnects to other <strong>PSN</strong> <strong><strong>Service</strong>s</strong> framework contractors to<br />

ensure that calls between customers of different contractors pass directly between these<br />

contractors without traversing the PSTN<br />

Level 3 will ensure that voice inter-connects between other framework contractors shall support<br />

the <strong>PSN</strong> standards for signalling protocols for the set-up and tear down of voice calls – subject to<br />

further detailed discussion around the protocols to be used<br />

Calls between customers of Level 3 and customers of other <strong>PSN</strong> framework contractors will be<br />

carried without charge to the interconnect with the other <strong>PSN</strong> framework contractor<br />

IM and presence<br />

Web, audio and video conferencing<br />

Unified messaging (through Microsoft Exchange).<br />

Voice Endpoint Devices<br />

The functional specification of the handset proposed to meet the economy and administrative<br />

handset requirements are as follows: -<br />

Feature Benefit<br />

Lighted Hold key The key lights when pressed to put a<br />

call on hold and stays lit until the held<br />

call has been resumed, or flashes if one<br />

call is held while another is engaged; the<br />

key is dark when no calls are on hold.


Lighted Menu key The key lights when pressed to<br />

653<br />

access voicemail messages, call logs,<br />

network settings, user preferences,<br />

corporate directories, and XML services;<br />

it stays lit while menu items are active.<br />

Lighted message waiting indicator The key lights when there is new<br />

voicemail, and the light is visible on both<br />

the phone chassis and the handset; it<br />

stays lit until you process your new<br />

voicemail.<br />

Graphical display A 396 x 81 pixel-based, anti-glare,<br />

monochrome display with white<br />

backlight provides scrollable access to<br />

calling features and text-based XML<br />

applications.<br />

Deep-Sleep option Power savings can be recognized by<br />

cycling power by time of day and day of<br />

week.<br />

Co-branding Co-Branding button allows<br />

customers to include their logo on the IP<br />

Phone.


Multiple-language support The following languages are<br />

654<br />

supported:<br />

only)<br />

• Arabic (Arabic area)<br />

• Bulgarian (Bulgaria)<br />

• Catalan (Spain)<br />

• Chinese (China)<br />

• Chinese (Hong Kong)<br />

• Chinese (Taiwan)<br />

• Croatian (Croatia)<br />

• Czech (Czech Republic)<br />

• Danish (Denmark)<br />

• Dutch (Netherlands)<br />

• English (United Kingdom) (Prompts<br />

• Estonian (Estonia)<br />

• French (France)


655<br />

• Finnish (Finland)<br />

• German (Germany)<br />

• Greek (Greece)<br />

• Hebrew (Israel)<br />

• Hungarian (Hungary)<br />

• Italian (Italy)<br />

• Japanese (Japan)<br />

• Latvian (Latvia)<br />

• Lithuanian (Lithuania)<br />

• Korean (Korea Republic)<br />

• Norwegian (Norway)<br />

• Polish (Poland)<br />

• Portuguese (Portugal)<br />

• Portuguese (Brazil)<br />

• Romanian (Romania)<br />

• Russian (Russian Federation)


656<br />

• Spanish (Spain)<br />

• Slovak (Slovakia)<br />

• Swedish (Sweden)<br />

• Serbian (Republic of Serbia)<br />

• Serbian (Republic of Montenegro)<br />

• Slovenian (Slovenia)<br />

• Thai (Thailand)<br />

• Turkish (Turkey)<br />

Speakerphone Full-duplex speakerphone allows for<br />

flexibility in placing and receiving calls.<br />

Headset support RJ9 interface to optional headset<br />

Four soft key buttons and a scroll<br />

toggle bar<br />

allows customers to enjoy additional<br />

options for place and receiving calls.<br />

Your calling options are dynamically<br />

present; the scroll toggle bar allows easy<br />

movement through the displayed<br />

information.<br />

Network features Network features include IEEE 802.1


657<br />

p/q tagging and switching.<br />

Ethernet switch The phone has a 10/100BASE-T<br />

Ethernet connection through two RJ-45<br />

ports, one for the LAN connection and<br />

the other for connecting a downstream<br />

Ethernet device such as a PC.<br />

Volume control A volume-control toggle provides<br />

easy decibel-level adjustments of the<br />

handset, monitor speaker, and ringer.<br />

Dual-position foot stand The display is easy to view and the<br />

buttons and keys are easy to use; you<br />

can remove the foot stand for wall<br />

mounting, with mounting holes located<br />

on the base of the phone.<br />

Multiple ring tones The phone offers seven user-<br />

adjustable ring tones.<br />

Hearing-aid-compatible features The hearing-aid-compatible (HAC)<br />

handset meets the requirements set by<br />

the ADA; it also meets ADA HAC<br />

requirements for a magnetic coupling to<br />

approved hearing aids. The phone


658<br />

dialling pad also complies with ADA<br />

standards.<br />

Codec support G.711a, G.711, G.729a,<br />

G.729b,G.729ab and iLBC audio-<br />

compression codec’s are supported.<br />

Voice quality Comfort-noise generation and voice-<br />

activity-detection (VAD) programming is<br />

provided on a system basis.<br />

Security features • Certificates<br />

• Image authentication<br />

• Device authentication<br />

• File authentication<br />

• Signalling authentication<br />

• Media encryption using Secure<br />

Real-Time Transfer Protocol (SRTP)<br />

• Signalling encryption using<br />

Transport Layer Security (TLS) Protocol<br />

• Encrypted configuration files


659<br />

Cryptography is not enabled by<br />

default and may only be enabled<br />

through a cryptographically enabled<br />

CUCM.<br />

The functional specification of the handset proposed to meet the professional handset<br />

requirements are as follows: -<br />

Feature Benefit<br />

Lighted Hold key The key lights when pressed to put a<br />

call on hold and stays lit until the held<br />

call has been resumed, or flashes if one<br />

call is held while another is engaged; the<br />

key is dark when no calls are on hold.<br />

Lighted Menu key The key lights when pressed to<br />

access voicemail messages, call logs,<br />

network settings, user preferences,<br />

corporate directories, and XML services;<br />

it stays lit while menu items are active.<br />

Lighted message waiting indicator The key lights when there is new<br />

voicemail, and the light is visible on both<br />

the phone chassis and the handset; it<br />

stays lit until you process your new


660<br />

voicemail.<br />

Graphical display A 396 x 81 pixel-based, anti-glare,<br />

monochrome display with white<br />

backlight provides scrollable access to<br />

calling features and text-based XML<br />

applications.<br />

Deep-Sleep option Power savings can be recognized by<br />

cycling power by time of day and day of<br />

week.<br />

Co-branding Co-Branding button allows<br />

customers to include their logo on the IP<br />

Phone.<br />

Multiple-language support The following languages are<br />

supported:<br />

• Arabic (Arabic area)<br />

• Bulgarian (Bulgaria)<br />

• Catalan (Spain)<br />

• Chinese (China)


661<br />

only)<br />

• Chinese (Hong Kong)<br />

• Chinese (Taiwan)<br />

• Croatian (Croatia)<br />

• Czech (Czech Republic)<br />

• Danish (Denmark)<br />

• Dutch (Netherlands)<br />

• English (United Kingdom) (Prompts<br />

• Estonian (Estonia)<br />

• French (France)<br />

• Finnish (Finland)<br />

• German (Germany)<br />

• Greek (Greece)<br />

• Hebrew (Israel)<br />

• Hungarian (Hungary)<br />

• Italian (Italy)


662<br />

• Japanese (Japan)<br />

• Latvian (Latvia)<br />

• Lithuanian (Lithuania)<br />

• Korean (Korea Republic)<br />

• Norwegian (Norway)<br />

• Polish (Poland)<br />

• Portuguese (Portugal)<br />

• Portuguese (Brazil)<br />

• Romanian (Romania)<br />

• Russian (Russian Federation)<br />

• Spanish (Spain)<br />

• Slovak (Slovakia)<br />

• Swedish (Sweden)<br />

• Serbian (Republic of Serbia)<br />

• Serbian (Republic of Montenegro)<br />

• Slovenian (Slovenia)


663<br />

• Thai (Thailand)<br />

• Turkish (Turkey)<br />

Speakerphone Full-duplex speakerphone allows for<br />

flexibility in placing and receiving calls.<br />

Headset support RJ9 interface to optional headset<br />

Four soft key buttons and a scroll<br />

toggle bar<br />

allows customers to enjoy additional<br />

options for place and receiving calls.<br />

Your calling options are dynamically<br />

present; the scroll toggle bar allows easy<br />

movement through the displayed<br />

information.<br />

Network features Network features include IEEE 802.1<br />

p/q tagging and switching.<br />

Ethernet switch The phone has a 10/100BASE-T<br />

Ethernet connection through two RJ-45<br />

ports, one for the LAN connection and<br />

the other for connecting a downstream<br />

Ethernet device such as a PC.<br />

Volume control A volume-control toggle provides<br />

easy decibel-level adjustments of the


664<br />

handset, monitor speaker, and ringer.<br />

Dual-position foot stand The display is easy to view and the<br />

buttons and keys are easy to use; you<br />

can remove the foot stand for wall<br />

mounting, with mounting holes located<br />

on the base of the phone.<br />

Multiple ring tones The phone offers seven user-<br />

adjustable ring tones.<br />

Hearing-aid-compatible features The hearing-aid-compatible (HAC)<br />

handset meets the requirements set by<br />

the ADA; it also meets ADA HAC<br />

requirements for a magnetic coupling to<br />

approved hearing aids. The phone<br />

dialling pad also complies with ADA<br />

standards.<br />

Codec support G.711a, G.711, G.729a,<br />

G.729b,G.729ab and iLBC audio-<br />

compression codec’s are supported.<br />

Video Communications Video Application Integration<br />

Support


Voice quality Comfort-noise generation and voice-<br />

665<br />

activity-detection (VAD) programming is<br />

provided on a system basis.<br />

Security features • Certificates<br />

• Image authentication<br />

• Device authentication<br />

• File authentication<br />

• Signalling authentication<br />

• Media encryption using Secure<br />

Real-Time Transfer Protocol (SRTP)<br />

• Signalling encryption using<br />

Transport Layer Security (TLS) Protocol<br />

• Encrypted configuration files<br />

Cryptography is not enabled by<br />

default and may only be enabled<br />

through a cryptographically enabled<br />

CUCM.


The functional specification of the handset proposed to meet the professional handset<br />

requirements are as follows: -<br />

Feature Benefit<br />

Graphical display 5-inch (12.5 cm), high-resolution<br />

666<br />

(320 x 222), graphical monochrome 4-bit<br />

grayscale display. Allows for greater<br />

flexibility of features and applications,<br />

and significantly expands the<br />

information viewed when using features<br />

such as <strong><strong>Service</strong>s</strong>, Information, Messages,<br />

and Directory. Display also supports<br />

localization requiring double-byte<br />

Unicode encoding for fonts.<br />

Wideband Audio Support for wideband (G.722 codec,<br />

adherence to TIA 920), including<br />

handset, headset, and speakerphone<br />

(see Q&A for details).<br />

Directories Key Ready access to missed, received or<br />

placed calls (plus intercom history and<br />

directories). Incoming messages are<br />

identified and categorized on the<br />

display, allowing users to quickly and


667<br />

effectively return calls using direct dial-<br />

back capability. Corporate directory<br />

integrates with the Lightweight<br />

Directory Access Protocol Version 3<br />

(LDAP3) standard directory.<br />

Settings Key Allows user to adjust display<br />

contrast, select background images (if<br />

available), and select ringer sounds<br />

through the User Preference menu.<br />

Network Configuration preferences also<br />

can be set up (usually by the system<br />

administrator). Configuration can be set<br />

up either automatically or manually for<br />

Dynamic Host Control Protocol (DHCP),<br />

Trivial File Transfer Protocol (TFTP),<br />

Cisco Unified Communications Manager,<br />

and backup Cisco Unified<br />

Communications Manager instances.<br />

Other available Settings submenus<br />

include Device Configuration, Security<br />

Configuration, and Model Information.<br />

Messages Key Provide direct access to voicemail


Buttons<br />

Help Button Online Help gives users information<br />

Speakerphone, Mute, and Headset<br />

668<br />

about the phone keys, buttons, and<br />

features<br />

Speakerphone includes Speaker<br />

On/Off, Microphone Mute, and Headset<br />

buttons that are lit when active. For<br />

added security, the audible dual tone<br />

multifrequency (DTMF) tones are<br />

masked when the speakerphone mode<br />

is used.<br />

Multiple-language support The following languages are<br />

supported:<br />

• Arabic (Arabic area)<br />

• Bulgarian (Bulgaria)<br />

• Catalan (Spain)<br />

• Chinese (China)<br />

• Chinese (Hong Kong)<br />

• Chinese (Taiwan)


669<br />

only)<br />

• Croatian (Croatia)<br />

• Czech (Czech Republic)<br />

• Danish (Denmark)<br />

• Dutch (Netherlands)<br />

• English (United Kingdom) (Prompts<br />

• Estonian (Estonia)<br />

• French (France)<br />

• Finnish (Finland)<br />

• German (Germany)<br />

• Greek (Greece)<br />

• Hebrew (Israel)<br />

• Hungarian (Hungary)<br />

• Italian (Italy)<br />

• Japanese (Japan)<br />

• Latvian (Latvia)


670<br />

• Lithuanian (Lithuania)<br />

• Korean (Korea Republic)<br />

• Norwegian (Norway)<br />

• Polish (Poland)<br />

• Portuguese (Portugal)<br />

• Portuguese (Brazil)<br />

• Romanian (Romania)<br />

• Russian (Russian Federation)<br />

• Spanish (Spain)<br />

• Slovak (Slovakia)<br />

• Swedish (Sweden)<br />

• Serbian (Republic of Serbia)<br />

• Serbian (Republic of Montenegro)<br />

• Slovenian (Slovenia)<br />

• Thai (Thailand)<br />

• Turkish (Turkey)


Speakerphone Full-duplex speakerphone with<br />

671<br />

acoustic echo cancellation.<br />

Headset Port Dedicated headset port eliminates<br />

the need for a separate headset<br />

amplifier and allows the handset to<br />

remain in its cradle, making headset use<br />

simpler. Both wideband (G.722) and<br />

narrowband headsets are supported.<br />

Volume Control Provides easy decibel-level<br />

adjustments for the speakerphone,<br />

handset, headset, and ringer. The<br />

handset is hearing aid-compatible.<br />

Additional volume control gain can be<br />

achieved using an inline handset<br />

amplifier.<br />

Network features Network features include IEEE 802.1<br />

p/q tagging and switching.<br />

Ethernet switch Internal 2-port Ethernet switch<br />

allows for a direct connection to a<br />

10/100BASE-T Ethernet network<br />

through an RJ-45 interface with single


672<br />

LAN connectivity for both the phone and<br />

a colocated PC. System administrator<br />

can designate separate VLANs (802.1Q)<br />

for the PC and phone, providing<br />

improved security and reliability of voice<br />

and data traffic.<br />

Expansion Module Support An optional add-on module provides<br />

14 additional buttons for programming<br />

directory numbers or speed dials. Up to<br />

two expansion modules can be used.<br />

Dual-position foot stand The display is easy to view and the<br />

buttons and keys are easy to use; you<br />

can remove the foot stand for wall<br />

mounting, with mounting holes located<br />

on the base of the phone.<br />

Multiple ring tones More than 24 defined user-<br />

selectable ring tones are available. Ring<br />

tones may also be personalized through<br />

use of the Unified Phone Application<br />

Suite.


Hearing-aid-compatible features The hearing-aid-compatible (HAC)<br />

673<br />

handset meets the requirements set by<br />

the ADA; it also meets ADA HAC<br />

requirements for a magnetic coupling to<br />

approved hearing aids. The phone<br />

dialling pad also complies with ADA<br />

standards.<br />

Codec support G.711a, G.711, G.729a,<br />

G.729b,G.729ab and iLBC audio-<br />

compression codecs are supported.<br />

Video Communications Video Application Integration<br />

Support<br />

Quality of <strong>Service</strong> (QoS) Options Supports differentiated services<br />

code point (DSCP) and 802.1Q/p<br />

standards.<br />

Voice quality Comfort-noise generation and voice-<br />

activity-detection (VAD) programming is<br />

provided on a system basis.<br />

Security features • Certificates<br />

• Image authentication


674<br />

• Device authentication<br />

• File authentication<br />

• Signalling authentication<br />

• Media encryption using Secure<br />

Real-Time Transfer Protocol (SRTP)<br />

• Signalling encryption using<br />

Transport Layer Security (TLS) Protocol<br />

• Encrypted configuration files<br />

Cryptography is not enabled by<br />

default and may only be enabled<br />

through a cryptographically enabled<br />

CUCM.<br />

Configuration Options IP address assignment can be<br />

statically configured or configured<br />

through the DHCP client.<br />

A variety of handset options will be available from Level 3 and the proposed solution also has<br />

capabilities for hearing impaired users, using amplified headsets or in-line amplifiers. Also, as<br />

the solution supports SIP phones from third party vendors, specific phones such as large button<br />

phones can be supported.


Large button and impaired hearing phone example<br />

Level 3 has a number of partners that can provide specialist equipment for users with particular<br />

needs and these can be addressed on a case by case basis. Analogue devices are connected<br />

to the proposed solution using analogue adaptors.<br />

Level 3 can also provide a range of headsets to meet the individual needs of users. Testing has<br />

been undertaken with Plantronics, Jabra and Sennheiser. Level 3 uses a number of distributors<br />

for headsets and can source both DECT and bluetooth based wireless devices<br />

Level 3 is aware that customers have a requirement to support ISDN services to the desktop,<br />

primarily to support BRENT devices. The proposed solution supports the provision of ISDN<br />

services using two-port voice interface cards - BRI (NT and TE).<br />

For maintenance of handsets it is recommended that each site retains a number of spare phones to<br />

enable a swift replacement for the users. Level 3 will then accept the return of the faulty device from<br />

the customer and place an order for a replacement device to replenish local spare devices.<br />

Voice call packages and voice minutes<br />

Level 3 can offer customers the option to have an all-inclusive fixed charging approach to call usage.<br />

Customers may require this option to manage and control call costs and an all-inclusive bundled call<br />

package shall include all calls made between customers, local, national, mobile and international<br />

locations to achieve this objective.<br />

Alternatively, customers can pay for usage separately. All our call rates are regularly benchmarked<br />

to ensure best value. With an approach where usage is billed per second and payable in addition to core<br />

costs, customers can review usage and call profiles and can implement a good housekeeping approach<br />

675


to call usage. This approach would include the barring of premium rate numbers and close audit to<br />

identify inappropriate use.<br />

DDI<br />

Level 3 will provide all users of the TDM or next generation voice service with individual DDI<br />

numbers. These numbers can be geographic numbers relative to the location of the customer or a non-<br />

geographic number range.<br />

Premium rate numbers<br />

Level 3 will provide customers with the ability to make calls to premium rate numbers. Due to the<br />

high cost of premium rate calls, Level 3 would recommend that user access is controlled using system<br />

restrictions on a per extension basis.<br />

Non-geographic numbers<br />

Level 3’s non-geographic number service (NGNS) enables customers to manage incoming calls<br />

allowing the flexibility to choose between revenue share, calling party pays, called party pays or free of<br />

charge.<br />

Calls can be delivered to a site or end user of Level 3’s traditional voice service, next generation<br />

voice service or a user of another service provider’s voice service.<br />

Calls can be routed to suit the location and time of day of the customer’s operation.<br />

Level 3 can provide a range of non-geographic numbers including 0800, 03xx, 0845 as well as 0871<br />

and 0844.<br />

676


The following diagram illustrates how the non-geographic number service works<br />

677<br />

Non Geographic Number <strong>Service</strong> – network diagram<br />

Technology used is Ericsson SCCPs running number translation.<br />

Callers from any PSTN telephone in the UK, including BT payphones, can dial these numbers. Non-<br />

geographic numbers are reachable from overseas locations. Calls can be delivered to a site via standard<br />

telephone lines, ISDN lines, directly connected telephone lines or integrated with Level 3’s software<br />

defined network access lines, whichever meets the customer’s business needs. There is no need for any<br />

special equipment by the caller of receiver of calls.


Administrators can use the Level 3 UCommand portal to configure how the call is routed depending<br />

on a variety of parameters such as time of day, business hours, day of the week, public holidays and<br />

area code of incoming caller.<br />

Use of NGNs promotes communication through an easily remembered number and its availability<br />

anywhere within a serviced region. It also enables end-users to have their calls re-routed based on the<br />

time or origin of the calls.<br />

118 enquiries<br />

Level 3 will provide access to directory enquires 118 services. Customers<br />

shall be provided with the facility to list DDI numbers in external<br />

directories.<br />

Call Preference <strong>Service</strong><br />

Level 3 will work with the customer’s network provider to ensure all external calls made will utilise<br />

the most cost effective route using least cost routing.<br />

Level 3 can offer customers the ability to deliver all geographic or non-geographic numbers through<br />

intelligent dial plans within the Level 3 core network. The intelligent dial plan provides an increased<br />

level of control on where the calls route to. An example is that customers may need to move the<br />

delivery of calls to a specific number if there is a technical fault or an incident at the office. Other<br />

configurable options with the intelligent dial plan service are:<br />

678<br />

Time of day - business/out of hours<br />

Day of the week - weekdays/weekends<br />

Day of the year - working days/public holidays


Area code of incoming caller - routing of calls to particular sites based on the location of the<br />

calling party<br />

Emergencies - routing calls to emergency number in the event of a disaster or a declared<br />

emergency<br />

In addition to the above, Level 3 can also offer all customers the option to present an agreed<br />

telephone number to the person called. This number when called by inbound callers will be capable of<br />

delivery to a dedicated answer point or a recorded message. There are three options available for the<br />

presentation of outgoing calling line identity (CLI) presentation:<br />

679<br />

Corporate-wide CLI<br />

o Every call that is made from any telephone across the customer estate will present a<br />

single corporate telephone number to the called party.<br />

Individual CLI<br />

o Each call that is made will present the individual’s personal DDI number to the called<br />

party.<br />

No CLI<br />

o Each call that is made will have the CLI withheld.<br />

If customers decide upon a single corporate number, Level 3 can route any calls made to that<br />

number to a destination as advised by the customer. This can be a voicemail announcement or a<br />

dedicated answer point.<br />

Audio Conferencing<br />

The Cisco UC solution for next generation service and all PBX systems fully supports multi-way calls.<br />

The scale is dependent on the requirements of the customer. This capability uses the ad-hoc<br />

conferencing capabilities within the solution. This is a software audio bridge that can bridge up to 48<br />

calls into a conference. By default, the system is set to bridge a maximum of 8 calls.<br />

With Microsoft Lync, audio, video and web conferences are easy for users to set up (either from<br />

Lync or from the Outlook online meeting plugin), and easy to join – users who have already been


authenticated by Active Directory don’t need to enter any additional PINs or codes. Meanwhile, users<br />

who aren’t signed in can join from a conventional phone using dial-in information, or by following a URL<br />

in a browser and having Lync call them back. The Lync web-app provides a rich conferencing experience<br />

through a browser, and Lync Attendee enables users with Communicator 2007 or Communicator 2007<br />

R2 to join Lync online meetings. Within conferences, presenters can share desktop applications,<br />

PowerPoint presentations or create interactive whiteboards and polls. With a PowerPoint deck<br />

uploaded, meeting attendees can skip back or forward through the slides if they need to, and then jump<br />

back in line with the presenter. For users with Lync, Lync web app or Lync Attendee, a meeting roster<br />

shows everyone who is in the conference and allows the chairperson to mute, unmute, eject or grant<br />

presenter access to participants.<br />

For larger numbers of participants (up to 150 as standard), Level 3’s ready access reservationless<br />

audio conferencing service is available instantly, enabling an end user to initiate calls by informing<br />

participants of the conference dial in number and access pin number. An Outlook integration tool<br />

allows the end user to auto populate their meeting invitations with the call details, and provides a link<br />

that individuals can click on to initiate an automated dial out to their phone from the ready access<br />

bridges. Alternatively, each participant can manually dial the conference telephone number, enter the<br />

conference pin number and join the call. No pre-booking with Level 3 is required to initiate these instant<br />

access type audio conference calls.<br />

The Level 3 audio conferencing service is also available as an operator controlled (concierge)<br />

conference which can be used for major events where the number of participants can be very large (up<br />

to 3,000). In this type of conference the chairperson(s) usually presents with Level 3 conference<br />

operator assistance and then participants can ask questions under the control of the conference<br />

operator.<br />

680


IL3 (Impact Level 3)<br />

681<br />

Overview of the Level 3 Audio Conferencing Network Architecture<br />

Audio conferencing will be provided by the currently accredited hosted IP telephony service<br />

platform with additional services being offered by the unified communications platform which supports<br />

Microsoft Lync 2010 communicator services.<br />

The IL3 conferencing service will not have PSTN access. The impact level 2 conferencing service will<br />

be made available to IL3 users. When an impact level 3 user dials into the IL2 service a pre-call<br />

announcement (nominally “beeps” or a pre-recorded message – subject to customer approval) will be


played to warn the user that they are using an IL2 environment. The “beeps” are introduced by the<br />

session border controller or the conferencing bridge.<br />

IL2 (Impact Level 2)<br />

Ready Access (Level 3’s brand name for its instant access conferencing service) is a unique audio<br />

conferencing solution that leverages Level 3’s solely owned MPLS core and over 84,000 on-net audio<br />

conferencing ports (located in EMEA, North America and Pac Rim). Level 3 employs a standard bridge<br />

configuration, using Polycom ReadiVoice technology to deliver reservation-less audio conferencing to<br />

our customers.<br />

Through our Global Origination <strong>Service</strong> (GOS) Level 3 directly negotiates with local PTT’s and carriers<br />

to acquire local toll and toll free access numbers (over 100 currently available). These are routed from<br />

the LEC (Local Exchange Carrier or PSTN provider) to a local Level 3 POP (Point of Presence on network).<br />

This traffic is then backhauled across our VoIP core to the Conference Call Routing Server which<br />

intelligently routes conferencing traffic to the appropriate bridge resource across our DWDM backbone.<br />

Level 3 has also deployed Ditech VQA (Voice Quality Assurance) devices within these POPs. These<br />

devices, primarily deployed by mobile operators, have a significant impact in reducing both acoustic and<br />

hybrid audio echo. Since their deployment, Level 3 has seen a reduction in the number of trouble tickets<br />

(incidents) generated for echo by 80%<br />

For those countries where Level 3 cannot provide a GOS (Global Origination <strong>Service</strong>) number (due to<br />

local restrictions) calls are routed through the PSTN to centralised Level 3 hub locations that then<br />

682


provide the same call routing pattern as GOS numbers. Participants can now also join a Ready Access<br />

(instant access conference call) meeting through Level 3s Connect service. This blackberry or android<br />

device plug in and desktop client will provide ‘click to call’ access directly to the conferencing bridge.<br />

By removing costly international PSTN and 3rd party charges Level 3 can pass these costs savings<br />

onto our customers. Using a centralised system provides a standardised user experience regardless of<br />

where the chairperson is located. All users have access to the same features and online tools including<br />

web conferencing services. This will have a significant impact on the cost of change as consistent<br />

training can be provided on a global basis. As the owner of both the bridge and the network it is<br />

delivered over Level 3 have visibility and control over the traffic flow meaning we can react quicker in<br />

the event of issues and provide meaningful troubleshooting and repair for the majority of the transport.<br />

Level 3’s virtual port configuration also offers resiliency and redundancy in the event of disaster<br />

recovery. Level 3’s unique distributed provisioning application, offers optimum disaster recovery<br />

through the automatic and frequent distribution of subscription details to all bridging systems. In the<br />

event of a DR situation our engineers can quickly evaluate the situation and if traffic should be moved to<br />

a disaster bridge, then we have a redundant tool; Pulsar that moves all the customers’ numbers and<br />

their web conference control interface to an alternative bridge in less than a minute. Customers can<br />

continue to use their existing number sets, there is no requirement to change to a set of ‘DR’ numbers.<br />

Although, if required, Level 3 can create specific DR accounts which use a separate primary bridge then<br />

the normal number set.<br />

Another clear advantage is that these ports are on-net, creating a clear migration path from<br />

traditional PSTN / TDM access to VoIP. VoIP Ready-Access provides our customers with the same<br />

features and benefits of the Ready Access service but delivered through a dedicated IP connection to<br />

the Level 3 MPLS core. This gives customers an efficient and convenient way to combine the value of an<br />

683


on-demand audio conferencing service with the cost savings of VoIP. This achievement was highlighted<br />

in the award of the 2007 Internet Telephony Award for our VoIP Ready Access services. Level 3 accepts<br />

enterprise outbound IP voice traffic for national and international calling to more than 240 countries<br />

worldwide. This is supported by over 140 Sonus GSX switches (VoIP Switches and gateways to the PSTN)<br />

deployed within our network. Calls are routed through Acme and Sonus Session Border Controllers<br />

located globally for resilience. These send voice conferencing traffic (identified by unique DRIC<br />

routing/subscription numbers) to the CCRS (Conference Call Routing Server) for processing.<br />

Level 3’s IP VPN service is the ideal transport for real time conferencing applications. Built directly<br />

upon the world’s most extensive DWDM optical backbone there are no legacy services (like Frame Relay<br />

or ATM) within the Level 3 core. All traffic is routed within the same autonomous system (identified by<br />

Level 3’s AS number) and traffic routing and management intelligence are maintained within the core of<br />

Level 3’s network instead of the customer’s premises. This optimises network operational efficiency and<br />

reliability, increasing performance. These factors mean we can offer customer end-to-end service level<br />

agreements for availability, packet delivery, and latency appropriate for voice conferencing. VoIP<br />

packets on Level 3s IP network receive the highest priority, translating into consistent and predictable<br />

carrier grade call quality.<br />

Desktop video conferencing<br />

Level 3 can provide desktop video using Lync Server 2010 which enables real-time video between<br />

Lync 2010 endpoints and endpoints from third-party hardware vendors. This interoperability enables<br />

customers to leverage their existing video conferencing hardware investments while extending video<br />

conferencing features to other users with minimal incremental investment and user training. Users can<br />

use third-party video conferencing hardware while scheduling meetings and determining attendee<br />

684


availability using familiar tools, such as Outlook or Lync 2010. The Lync solution can be integrated with a<br />

customer’s existing IT and communications estate with the following options:<br />

685<br />

A customer’s existing on premise or hosted exchange server solution may be used to provide<br />

unified messaging for Lync<br />

A customer’s existing voice solution can be connected to Lync via SIP trunks into our session<br />

border controllers<br />

Alongside the core Lync applications, Level 3 is able to offer enhanced complementary<br />

products including integration of room-based video conferencing and mobile presence<br />

integration.<br />

Level 3 can also provide desktop video endpoints from other providers if required. We can also<br />

provide a range of professional services to support desktop video services including: -<br />

Video audit<br />

User migration/deployment<br />

Integration with Level 3/<strong>PSN</strong> service provider services<br />

Advice on Microsoft and other vendor licencing requirements<br />

Unified Communications and Collaboration tools<br />

Microsoft Lync offers a suite of collaboration tools out of the box and via a single user interface, and<br />

is already widely in use commercially today. The Level 3 <strong>Service</strong> is flexible in that users currently holding<br />

licences for Microsoft Lync (estimated at approximately 100,000 across <strong>Government</strong> today) can be<br />

integrated and reused as part of the solution, making use of existing assets, and reducing the software<br />

deployment costs. To ensure best on-going value Level 3 wish to make use of <strong>Government</strong> existing


Microsoft GSPLAR agreements and continue to use <strong>Government</strong> licences rather than resell new ones<br />

unnecessarily.<br />

The Level 3 hosted Lync service integrates with the Microsoft Office suite of applications including<br />

Microsoft Outlook / Exchange and SharePoint, as well as it’s, Office Communications Server and Active<br />

Directory products; and Directory products aiding ease of delivery. The Microsoft service also integrates<br />

into IBM's range of products including Lotus Sametime, Lotus Quick and Lotus Web conferencing.<br />

686<br />

Typical Customer Deployment and supporting core infrastructure


The Unified Communications <strong>Service</strong> will be hosted in Level 3’s resilient data centres in locations<br />

around the UK. These data centres will be IL3 accredited and co-located with next generation voice<br />

services and the existing HIPT service.<br />

The service will provide unified communications and collaborative services utilising the full<br />

Microsoft Lync under the scope of the specified framework. Using industry standards helps ensure a<br />

feature rich and wide communications ability across all departments wishing and agreeing to<br />

communicate. Minimal further investment is needed in products or services to translate and adapt<br />

services for interconnectivity or in additional training for the users or support staff.<br />

Where there is a need to share data and communicate information using a variety of tools,<br />

communication between <strong>Government</strong> departments served by Level 3 will be possible using the unified<br />

communications service. Level 3’s default position is that all unified communications calls between IL3<br />

customers operate at IL3 with a warning banner reminding the users of this fact. Where any live instant<br />

messaging session is passed between impact levels, Level 3 will introduce a warning.<br />

Level 3 would wish to facilitate ease of interworking and to help create the effect of a unified<br />

communications environment across the whole of the <strong>PSN</strong> environment. To help achieve this as an<br />

additional service Level 3 would:-<br />

Level 3 Unified Communication Customers would be required to federate to the Level 3<br />

directory, thus allowing intercommunication between Level 3 unified communication customer<br />

Level 3 will work with other Contractors delivering <strong>PSN</strong> unified communications services to<br />

ensure pan <strong>PSN</strong> transparent interworking and federation across <strong>Government</strong>.<br />

Such an approach is dependent on the adoption by all contractors of open industry standards and<br />

clarity from the Framework Authority and CESG on accreditation requirements and security standards.<br />

Lync features<br />

687


Microsoft Lync 2010 is Microsoft’s comprehensive enterprise communications platform. Powered by<br />

Lync Server 2010, Lync builds on the capabilities of its predecessor, Office Communications Server,<br />

providing instant-messaging and presence, desktop collaboration, voice, video and web conferencing,<br />

federation with other organisations, and a full-featured enterprise-voice feature set that can remove the<br />

need for many businesses to operate multiple on-premise PBX platforms for their users’ telephony<br />

needs. In this section, we give an overview of Lync 2010 as provided by Level 3, and how its features and<br />

capabilities fulfil the customer’s needs for a unified communications platform.<br />

Enterprise Voice for telephony<br />

As with previous versions of Office Communications Server (OCS), Lync provides click-to-call,<br />

presence-enabled enterprise voice. Lync 2010 adds a range of familiar telephony features, and the<br />

enhancements of presence and directory integration, which can make it suitable as the primary or sole<br />

telephony device for many users.<br />

688


Voicemail and Unified Messaging<br />

689<br />

Transfer a call to mobile from a Lync client<br />

The solution will employ the Exchange Unified Messaging role for Voicemail functionality. Exchange<br />

UM is the standard Voicemail solution for Lync 2010 and caters for direct dial-in to voicemail via PSTN<br />

for message retrieval, as well as delivery of voice messages into Outlook. In addition voicemail Messages<br />

can also be played and retrieved using the Lync client.<br />

Voicemail example with Lync


The phone tab of the Lync client shows users when they have a voicemail and lets them access the<br />

messages directly. The Lync client also allows users to view the corresponding Outlook item and an<br />

automatic transcription of the selected voice mail.<br />

Instant messaging and presence<br />

690<br />

Voicemail with transcription<br />

In the proposed solution, Instant Messaging and Presence are provided as standard features in the<br />

Lync Desktop Client. The Lync client employs Presence driven Communication which will be enabled to<br />

assist both incoming and internal contact requests to reach the best party, based on information in the<br />

corporate directory and availability as shown by Presence status. The Presence of a group of resources,<br />

such as a buddy list or all available skills in a particular category, will be shown as a list for the start of


any communication, including IM, voice calling, desktop sharing, or conferencing. Presence-driven<br />

communications can help to remove waste and delay from your business processes, as the appropriate<br />

resource can be found exactly when needed. Presence-driven communications can also help you better<br />

use your talent and resource base because the software can access all known resources at the same<br />

time.<br />

691<br />

Lync presence example


Mobility<br />

More and more information workers are using the mobile phone as their only phone. Mobile Clients<br />

for Microsoft® Lync 2010 take the power of unified communications mobile—including rich presence,<br />

audio conferencing, and access to multiple communication modes from a single, easy-to-use interface.<br />

Stay connected with mobile clients - Using mobile clients for Lync, information workers can view<br />

colleagues' availability and select the best way to communicate - initiating instant messaging (IM), e-<br />

mail, or a phone call. In addition, workers using their mobile device provide accurate availability status<br />

back to other users when using mobile clients for Lync.<br />

Connect to conferences with a single click - Mobile clients for Lync can enable information workers<br />

to join a Lync conference with a single click of a button, without requiring users to dial conference<br />

numbers and enter long numeric passcodes.<br />

Connect with others using a single, consistent identity - A single telephone number can be used<br />

across desk phone, PC, and mobile phone. Outbound calls from a mobile device with a Lync client can<br />

enable the use of a single identity and phone number, making it easier to recognize calls from the Lync<br />

mobile client by colleagues, partners, customers, and personal contacts.<br />

Connect more securely - With communication channel encryption, transport layer security (TLS)<br />

support, and perimeter/internal network protection, your communications experience is safer no<br />

matter where you are or what network you use.<br />

Video calling<br />

692


In the proposed solution, the Lync desktop client has native support for video calling (reference RFP<br />

section 6.1.5). Devices can be selected either as default or on a per call basis. Devices can be<br />

interchanged mid-call without disconnecting the call. The client supports a range of USB Webcams as<br />

well as the Polycom CX 5000 video collaboration device with 360-degree panoramic video. A<br />

comprehensive list of supported devices can be made available.<br />

Conferencing<br />

With Lync 2010 audio, video and web conferences are easy for users to set up (either from Lync or<br />

from the Outlook online meeting plugin), and easy to join –users who have already been authenticated<br />

by Active Directory don’t need to enter any additional PINs or codes. Meanwhile, users who aren’t<br />

signed in can join from a conventional phone using dial-in information, or by following a URL in a<br />

browser and having Lync call them back. The Lync web-app provides a rich conferencing experience<br />

through a browser, and Lync Attendee enables users with Communicator 2007 or Communicator 2007<br />

R2 to join Lync online meetings. Within conferences, presenters can share desktop applications,<br />

PowerPoint presentations or create interactive whiteboards and polls. With a PowerPoint deck<br />

uploaded, meeting attendees can skip back or forward through the slides if they need to, and then jump<br />

back in line with the presenter. For users with Lync, Lync web app or Lync Attendee, a meeting roster<br />

shows everyone who is in the conference and allows the chairperson to mute, unmute, eject or grant<br />

presenter access to participants.<br />

Internet services<br />

The Level 3 internet connectivity service provides a shared platform providing customer filtered<br />

internet access to users at IL2, IL3 and optionally at IL4. Level 3 offers a unique multi layered Impact<br />

Level approach where browsing traffic is filtered using a multi layered security approach. This<br />

693


architecture is illustrated in the below figure. This will utilise different vendors to give depth in defence<br />

and comply with good practice guides. In this way all users at IL4 have also used the IL3 and IL2<br />

infrastructure. This allows us to deploy common filters, virus signatures, attack signatures etc at the<br />

lowest levels hence give a high overall level of protection to all users. IL3 and IL4 users’ traffic will<br />

therefore have passed through the IL2 infrastructure. This gives volume and economy of scale.<br />

DLP (data leakage prevention) provides content based searching and allows mails or content to be<br />

released according to key words which may determine its classification (restricted, confidential etc) and<br />

also look for key words which may imply a classification. Each layer is firewalled using differing firewall<br />

vendors to comply with GPG8 recommendations. The system will utilise heuristics and offer bespoke<br />

pattern matching. The system will also use well known virus signatures. Combined this will give “zero<br />

hour” virus protection against new viruses.<br />

The IL3 service will draw traffic from the IL2 assured service. In this way the IL3 service creates<br />

depth in defence by drawing “clean” traffic from a separately assured IL2 platform. The IL3 filtering<br />

platform is in essence a customer of the Il2 filtering service.<br />

The IL2 service will draw internet traffic from the Level 3 internet backbone. This has inbuilt DDOS<br />

which due to the nature of DDOS is a globally distributed architecture.<br />

Level 3 currently has a global internet filtering service which can be assured to IL2. By utilising<br />

multiple global internet gateways we provide a higher awareness of live attack scenarios and a greater<br />

protection against common mode failures and DDOS attacks.<br />

694


Where customers take the proxy bypass service it is expected that this traffic will be delivered by a<br />

separate VPN to the customer’s site. This is such that traffic does not mix with traffic which has been<br />

fully cleaned by the full filtering service(s).<br />

695<br />

Multi-layered impact level approach to Internet browsing<br />

The following features and benefits are provided with the Internet Connectivity <strong>Service</strong>: -


Virus scanning (available at all impact levels) to scan email traffic only<br />

Content control (available at all impact levels) to filter and control html access<br />

implementing white and black lists per customer<br />

Proxy bypass (available at all impact levels) this will replicate a managed firewall<br />

service and is designed for users who have virus scanning and content control at<br />

their own sites. We see this as a migration path to move to the virus scanning<br />

and content control services.<br />

DLP data leakage protection , this is an optional service available at Il4 which we<br />

recommend to ensure the customers meet GPG guidance for Il4 to Il3 browse<br />

down access. DLP provides scanning for words such as “restricted” and can<br />

enforce release policies<br />

HTML virus scanning, this provided protection against HMTL borne viruses<br />

Anti spam email protection<br />

Anti porn email protection by content analysis (instead of white and black list<br />

protection)<br />

IDS & IPS can be provided as an option extra for the proxy bypass service<br />

DIA direct unfiltered internet access provided to the customer’s site<br />

Email, website services, co-location and hosting<br />

Managed hosting services are provided under the Level 3 on-demand and continuity solutions<br />

banner. Typically, IT services are architected using a set of building blocks, which are then tailored to<br />

meet a specific set of requirements, to meet the needs in line with the customer’s business.<br />

696


697<br />

Managed Hosting <strong>Service</strong> Model<br />

The above shows the Level 3 managed hosting service model with 3 underpinning capabilities;<br />

Infrastructure and Technology, Processes and Procedures, Human Resources and Skills. Level 3 has a<br />

programme of continuous development and improvement to ensure Level 3 can support the latest<br />

technologies and meet demanding IT delivery requirements.<br />

The services delivered cover a range from simple infrastructure services such as co-location and<br />

remote hands, through managed network & servers (platform service), through applications delivered<br />

by Level 3 or working with specialist 3rd parties and completed with a range of professional services.<br />

This complete range of services is delivered with a consistent customer engagement model which<br />

ensures our customers receive a single consistent approach for all of the products we provide to them<br />

whether data network, voice network or managed hosting. This engagement has a customer service<br />

manager leading it with agreed SLAs and regular reporting.


698<br />

Managed Hosting service technical building blocks<br />

The above figure provides an abstract high level view of the managed hosting services incorporating<br />

the following services: -<br />

Local Area Network Architecture<br />

Managed Firewall service<br />

Managed Storage<br />

Managed Backup<br />

Local Load Balancing<br />

Managed Server Hosting<br />

Managed Hosting Monitoring <strong>Service</strong><br />

On-line storage<br />

The service consists of a managed data storage and storage area network (“SAN”) service, which<br />

provides data storage capacity to server equipment as part of a managed service, or to equipment


owned or provided by the customer which is installed at the data centre. The <strong>Service</strong> will provide<br />

management and monitoring of SAN services in the Level 3 Data Centre.<br />

Level 3 will manage the customer equipment, and/or any software or ancillary hardware provided<br />

by the customer.<br />

Where the SAN architecture and SAN switching platform permits, the <strong>Service</strong> is capable of<br />

supporting solely the following operating systems:<br />

Microsoft Windows 32 Bit<br />

Microsoft Windows 64 Bit<br />

VMware<br />

Linux<br />

Unix (AIX, Solaris, HP-UX)<br />

The service has the features shown in the below table:<br />

699<br />

Feature Description<br />

Design & Deploy<br />

Initial storage and SAN design Level 3 will agree the design for storage and SAN with the<br />

customer and produce the detailed design document.<br />

Installation Level 3 will install, configure and connect all server, SAN<br />

and storage hardware as specified in the detailed design<br />

including installation and configuration of resiliency of the<br />

server hardware.<br />

SAN fabric configuration Level 3 will configure the network components of the<br />

Logical Unit Number (“LUN 1 ”) creation<br />

SAN. The demarcation point will be the SAN switching fabric.<br />

design.<br />

Level 3 will create LUNs as required in the detailed<br />

1 “LUN” means a logical unit on the storage array that the Host Bus Adaptor hardware and software is configured to communicate<br />

with.


Controller initialisation Level 3 will initialise the storage controllers.<br />

Disk initialisation Level 3 will initialise the disk including drive firmware<br />

700<br />

loading and configuration of default disk group.<br />

Zone configuration Level 3 will configure the storage infrastructure into<br />

security zones as specified in the detailed design.<br />

Virtual disk creation Level 3 will create virtual disks as specified in the<br />

detailed design and present them to the server.<br />

Implementation of inter-site copy and failover Level 3 will, where specified in the detailed design,<br />

configure and test copy sets, disaster recovery and managed<br />

disk sets between SAN installations, recommending sufficient<br />

inter-site connectivity to support the proposed service.<br />

Monitoring and reporting Level 3 will configure SAN monitoring and reporting in<br />

Manage and Support<br />

Manage LUN volumes<br />

accordance with the detailed design to ensure that detective,<br />

preventative and corrective controls are in place.<br />

Level 3 will create, maintain and delete storage resources<br />

as approved through the service request process.<br />

Manage Hosts Level 3 will create, maintain, delete server relationships<br />

within the <strong>Service</strong> as approved though the service request<br />

process.<br />

Storage Monitoring Level 3 will identify and troubleshoot alerts associated<br />

with the <strong>Service</strong>.<br />

Manage disk groups Level 3 will create/maintain/delete disk groups as per<br />

service request submitted and approved as a


701<br />

change request.<br />

Manage SAN zones Level 3 will create/maintain/delete disk groups as per<br />

service request submitted and approved as a change request.<br />

Manage virtual disks Level 3 will create/maintain/delete disk groups as per<br />

service request submitted and approved as a change request.<br />

Manage copy sets, replication groups and managed sets Level 3 will create/maintain/delete disk groups as per<br />

service request submitted and approved as a change request.<br />

Firmware/Software maintenance Level 3 will be responsible for maintaining controller,<br />

<strong>Service</strong> Management & Reporting<br />

drive, appliance and software revision levels in line with its own<br />

service infrastructure under its normal operating procedures<br />

Monitoring The service is monitored using data centre<br />

monitoring tools 24 x 7. Monitoring capabilities<br />

are to be agreed with the customer in line with<br />

the technology capabilities but will include<br />

monitoring the following parameters:<br />

Data storage (what is assigned, where its<br />

assigned to) – ADHOC (when requested<br />

and when changes are made)<br />

Capacity management (current and<br />

historical utilisation of allocated storage)<br />

Cabling to the hardware<br />

Storage related hardware components<br />

Reporting A monthly service report is provided to the<br />

customer of the metrics monitored above.<br />

Security services and Antivirus<br />

<strong>Service</strong> Features Table


Level 3 has built a security operations centre in our network operations centre (NOC) facility. This<br />

has been built in partnership with one of our sub-contractors for <strong>PSN</strong> services - Integralis. The facility is<br />

based in our List X environment and staffed by Security Cleared (SC) staff. It has a full disaster recovery<br />

facility in the north of England with dual resilient server estates based at separate off site locations.<br />

We have a pilot customer; a Police force where we manage IL3 and IL4 security services for them.<br />

First and second line duties are performed by Level 3 staff with third line support available from<br />

Integralis. Integralis provides their ISIS platform which is a proprietary log correlation and security event<br />

management tool. To maintain IL3 and above compliance we run a separate version of ISIS within the<br />

estate. The service manages firewalls, IDS and IPS security devices and has the capability to manage<br />

virus scanners and other gateway devices. Integralis also operate a main commercial SOC located in<br />

Berkshire. The two SOCs collaborate and hence have the latest data on global security events. This<br />

Commercial SOC has access to 1000’s of security devices and sensors based worldwide.<br />

The SOC service has been submitted for <strong>PSN</strong> certification and this is expected in H1 2012. We<br />

anticipate this will be the first <strong>PSN</strong> certified security service of its type in the UK. <strong>PSN</strong> certification aligns<br />

to ISO27001 and is independently audited by KPMG. The audit process is currently underway. The<br />

service provides the relevant capability at GPG13 as required for IL3 and IL4 services.<br />

Level 3 can support anti-virus services using industry leading packages including McAfee and<br />

Kaspersky<br />

Email scanning and filtering<br />

702


Email and web-filtering services are provided together with our sub-contractor, Integralis, using a<br />

jointly built Security Operations Centres (SOCs) and underpinning security management architecture.<br />

There are essentially three levels of service available, from telephone-based technical support and<br />

problem solving, through to 24x7 monitoring and analysis services and full alert management and<br />

reporting. Key components of the managed gateway services include:<br />

- The ISIS Engine: The Integralis Security Information <strong>Service</strong> (ISIS) is the data correlation engine that<br />

underpins the managed security services. This includes a series of business rules developed by<br />

security analysts over time to help streamline the process of threat identification.<br />

- 24 x 365 monitoring and alerting: Level 3 monitors security appliance vital health signs, system<br />

operating-conditions and analyses available log data continuously. Problem conditions are either<br />

dealt with directly by Level 3, or escalated to designated customer security contacts. The service<br />

centres operate in a 24x7x365 manner with staff monitoring and managing thousands of devices in<br />

more than 40 countries worldwide.<br />

- System availability checks and health monitoring: System availability checks are built into the<br />

service. A system down condition can be escalated to the customer security contact. Availability<br />

graphs and statistics are provided via the Security Information <strong>Service</strong> (ISIS) Secure Web Portal.<br />

- Security event alerting and escalation: Alerts sent from the managed system will be logged,<br />

acknowledged, analysed and then escalated by the SOC. Alerts that would impact the <strong>Service</strong><br />

delivery, the availability or functionality of the security device or other monitored devices, will be<br />

raised as an ‘Incident’, and dealt with in accordance with the incident management service.<br />

- Reporting service: A wide range of reporting options are provided via the ISIS portal. These reports<br />

provide information about network activity, traffic types and volumes, details of alerts, system<br />

availability statistics and graphs, system resources usage and of course security events.<br />

- Change control: rigorous change control is included within the service. Level 3 works only with<br />

designated security contacts within the customer organisation that are authorised to place change<br />

requests via the secure web portal. All requests are subject to two-factor authentication and a<br />

complete audit trail. Configuration changes are backed up regularly making it possible to quickly roll<br />

back the security policy if required. Change control requests are initiated and tracked via the ISIS<br />

secure web portal, with e-mail notification of updates to prompt the customer to access the portal.<br />

Integralis deploys its extensive network security expertise to validate, design and implement<br />

changes to the IDS policy. Requests for insecure changes are identified and avoided ensuring that a<br />

robust security policy is maintained.<br />

- Enrolment support: the Level 3 enrolment process allows the client to call on the experience of<br />

Integralis’ operations staff to assist and advise on enrolment activities.<br />

- Monitoring. The main interface between Integralis operational staff and our customers is the ISIS<br />

secure customer web portal. This is a web interface which customers can access providing they<br />

have secure access. The portal integrates a variety of underlying technologies to provide a secure<br />

single sign-on architecture for maximum availability and scalability. Once logged in the user is<br />

703


presented with a summary screen detailing their account status, any relevant security alerts and<br />

issues and open calls.<br />

- Whenever a customer-visible update occurs, an e-mail or other call is made to the customer asking<br />

them to visit the Integralis secure web portal for updated information – this e-mail includes a fully<br />

authenticated URL which the customer can just click-through to access the relevant information.<br />

Because of the strong authentication features used only the intended recipient of the information is<br />

able to receive it. Features of the portal vary depending on what services the customer has selected<br />

from Integralis. They include some or all of the following:<br />

- Trouble ticket and change control system access. Customers can raise, view and close calls in the<br />

Remedy system.<br />

- Messaging. In addition to being able to send secure e-mail to the Level 3 SOC, customers may use<br />

the web interface to send ad-hoc messages. These can be associated with calls in the customer<br />

support system, or may be standalone. Messages sent in this manner are received in the customer<br />

support system and acted on alongside other calls.<br />

- The secure web portal augments direct interaction with Integralis staff by allowing customers to:<br />

request changes; review alerts and related actions; review status of change requests; communicate<br />

with the SOCs; generate reports; download report data.<br />

An illustration of the SOC service is shown below.<br />

704<br />

Level 3 SOC Managed Security Architecture


Firewalls<br />

Level 3 have a number of customer firewall solutions to meet a variety of customer specifications<br />

and security impact Levels (IL2 and IL3). Across both impact levels Level 3 can offer the following<br />

topologies:-<br />

Shared Firewall <strong>Service</strong> – Gateways to common <strong>Government</strong> extranets e.g. MINT<br />

Customer dedicated integrated Router/Firewall e.g. Juniper SRX<br />

Customer dedicated firewall e.g. Cisco 5510<br />

Level 3 offers a secure watch and a secure manage service, providing differing level of service<br />

depending on the customer knowledge and skillet. The secure manage provides a fully managed service<br />

including threat analysis and configuration management. The secure watch service is a monitoring only<br />

service where the end customer provides initial and on-going device configuration.<br />

Level 3 will offer Impact Level 3 managed security services using our dedicated IPVPN or our access<br />

to the <strong>Government</strong> Secure Intranet (GSi) to <strong>Government</strong> customers wanting to pass data within a<br />

RESTRICTED environment. Level 3 will provide Managed Security Solutions for UK <strong>Government</strong><br />

customers who require their data to run at RESTRICTED – Impact Level 3. These services are run from<br />

our List-X facilities which are situated on Level 3 Premises in the U.K. only. The managed security service<br />

will run alongside our restricted UK Gov IPVPN under the current cardinal accreditation rules set which<br />

Level 3 UK operate today.<br />

Additionally there is an IL2 managed firewall offering that is based on our commercial managed<br />

security service architecture. This service is designed for UK <strong>Government</strong> customers who require their<br />

data to run at PROTECT– Impact Level 2. These services are run from our commercial facilities.<br />

705


706<br />

Firewall options from Level 3<br />

Level 3’s customer firewall services include the following elements:-<br />

Customer requirements capture and due diligence - Level 3 offers UK <strong>Government</strong> customers a<br />

fully managed security service which means that we are responsible for the final design solution as part<br />

of our professional services offering to compliment this service.<br />

Detailed design - Level 3 will work with the customer to develop a design of managed devices to<br />

support the customer's Level 3 firewall solution. Level 3 engineers define all managed firewall and/or<br />

security devices, software, interfaces, and memory required to support the customer's requirements as<br />

communicated during the sales cycle.


Implementation/Project Management. - Level 3 will also work with the customer to develop a<br />

comprehensive work plan to implement and install the security network including transport and<br />

managed devices.<br />

Proactive 24x7 Operational monitoring/management - The firewall infrastructure and associated<br />

hardware will be maintained and proactively managed 24 x 7 from the Level 3 NOCs. Level 3 has<br />

multiple NOCs for resilience purposes. Level 3 will be immediately notified through our network<br />

management tooling if a device was to become unavailable. The Level 3 MSS team will actively<br />

investigate faults that occur on the network and will also be available 24x7 to address any specific<br />

operational issues that customer may wish to investigate.<br />

On-going service management - As part of the on-going service management Level 3 will provide<br />

regular service review meeting to discuss service issues. This may include performance against SLA,<br />

security breaches, service improvement initiatives.<br />

All services are intended to be <strong>PSN</strong> compliant were appropriate.<br />

Intrusion and spyware detection<br />

Level 3 works with its sub-contractor Integralis to provide intrusion detection solutions that identify<br />

threats from both inside and outside of your network, both wired and wireless. Integralis pioneered IDP<br />

product acceptance in Europe and has deployed and maintains some of the largest and most technically<br />

advanced deployments in the UK. Level 3 is highly experienced in designing and delivering seamless IDP<br />

707


solutions into government departments and commercial organisations. Our IDP product range includes<br />

all the leading technologies including Sourcefire, Check Point, Juniper, IBM ISS, McAfee and more.<br />

Level 3 uses the latest tools and technology to manage and monitor industry-leading intrusion<br />

detection and prevention (IDS/IDP) platforms. We help you prevent costly downtime and potential<br />

revenue losses by delivering comprehensive real-time identification and analysis of security events by<br />

our security experts from our global Security Operations Centres (SOCs), helping to ensure you are<br />

protected against intrusion threats and attacks. Because we monitor thousands of devices worldwide,<br />

we can quickly detect and analyse anomalies, and link firewall and IDS/IDP data to ensure more effective<br />

incident context, and reduce false positives.<br />

Our intrusion detection capabilities offer a range of solutions covering:<br />

708<br />

Security strategy and policy services to assess and tune intrusion detection and prevention<br />

solutions<br />

Design, installation and configuration of all major IDP technologies<br />

24/7/365 monitoring and analysis to ensure rapid response and alerting based on threat<br />

potential and pre-determined response levels<br />

Consistent reporting and alerts based on data intelligence across a broad range of vendors,<br />

platforms and devices<br />

IDS/IPS rule set and signature management<br />

Detailed, easy-to-use reporting via our web-based ISIS portal, covering IDS/IDP device<br />

configuration, security intelligence, and security and health events<br />

Expert threat identification, correlation and comprehensive threat intelligence<br />

Authentication and access management<br />

Level 3 will provide a managed remote access solution service to deliver a secure remote access<br />

point to the Level 3 network. The hardware encryption and secondary authentication devices used to<br />

deliver the service will include CAPS (Enhanced) approved equipment for the protection of data<br />

transmission up to IL3 across a public internet connection.


The proposed solution will provide users with access to corporate internal networks and available<br />

resources they would have when located at their workstation. This solution will provide dual factor<br />

authentication via an easy to use standard web browser.<br />

This remote access solution (RAS) is delivered by Prolinx as our sub-contractor. This RAS Solution<br />

provides a simple, flexible, secure and efficient remote access point to resources from a variety of<br />

internet-facing connectivity. This can include, but is not limited to, home-broadband including via<br />

wireless, 3/3.5G mobile access through a dongle or tethered mobile phone or even through a client-<br />

site’s internet access (client’s gateway restrictions permitting). Its simplicity is derived from an interface<br />

that uses any industry standard web browser, very familiar to business users.<br />

Level 3 is able to provide a fully managed, remote access gateway service, allowing access to the IL2<br />

and IL3 networks from accredited Level 3 user access devices. Level 3 will manage the provision of RAS<br />

user accounts and access tokens in line with Level 3 Systems requirements, currently based on a<br />

possible 10,000 IL3 users adopting this service within the first 2 years. The solution will also<br />

accommodate Level 3’s maximum user database up to 300,000 +.<br />

The solution is able to deal with large amount of concurrent connections utilizing hardware<br />

clustering concepts. The solution can be “scaled-out” to meet possible future growth requirements.<br />

When clustered, cluster pairs multiply aggregate throughput to handle unexpected burst traffic as well<br />

as resource-intensive application use. Clusters can be deployed in either active/passive or active/active<br />

modes across the LAN or across the WAN.<br />

709


The gateway solution proposed provides dual-resilient, load-balanced routes into Level 3’s<br />

substantial communications infrastructure. Scalable access bandwidth provides all remote users with a<br />

speed of access to networked resources comparable to their office workstation.<br />

The dual-factor authentication process is performed entirely through a standard web browser,<br />

requiring minimal training to master. The construct and operation of the RAS <strong>Service</strong> is at the request of<br />

Level 3, using “Realms” to customise the connections. Once a connection is established to the desired<br />

internal network, all of the internal system’s services will be reachable from the remote location,<br />

assuming the appropriate software exists on the user device.<br />

Additionally, the service does not require the user to update any connection software and all key<br />

generation and rotation is accomplished by the gateway device. Once a device is authenticated and a<br />

secure session established the host system provider will be able to distribute operating system and<br />

antivirus patches seamlessly to the endpoint.<br />

The service does not require the device to be periodically connected to the host system directly and<br />

enable seamless transition between the fixed and mobile operating environments.<br />

In addition to remote access solutions, Level 3 can provide additional authentication services. Given<br />

increasing compliance demands, tight management of the identities of consumers, customers, and<br />

employees is now a requirement. Multi-factor authentication to reduce or remove dependence on<br />

passwords is increasingly taking hold. Single sign-on solutions, the rise of networked applications, and<br />

partner and consumer based federated identity management solutions are all driving the complexity of<br />

identity management solutions to new levels.<br />

710


Level 3 authentication solutions are designed to help organisations strengthen and streamline their<br />

identity management, achieving higher levels of security while ensuring compliance.<br />

Efficiently operating and managing an effective identity management system can be a significant<br />

challenge. It places additional demands on internal resources, such as network administrators, which<br />

can distract them from critical operational activities. And when a user can’t authenticate because no<br />

one is available to help, productivity stops.<br />

Level 3 authentication solutions offer a cost-effective flexible approach that simplifies the challenges<br />

that come with identity management. Level 3 can design, deploy, configure, monitor and manage your<br />

authentication systems in a manner that is customised to your needs.<br />

Level 3 offers flexible identity management options that cover:<br />

711<br />

Assessment services to ensure business requirements and security policies are met<br />

Design of identity and access management architecture and solutions<br />

Provision of market-leading technologies including RSA SecurID, ActivIdentity and Cryptocard<br />

24/7/365 monitoring and alerting from our global Security Operation Centres (SOCs)<br />

System availability checks<br />

Platform and policy management with change control<br />

Remote system management and rebuild<br />

Detailed reporting via the ISIS web-based portal<br />

Comprehensive remote management<br />

Varying service level agreements (SLAs) for guaranteed uptimes, customised to your needs<br />

Web conferencing<br />

Level 3 can offer two web conferencing solutions. Cisco WebEx web conferencing and Cisco WebEx<br />

Connect.


Cisco WebEx web conferencing is a data collaboration service, intended for primary use in<br />

conjunction with the Level 3 Ready-Access audio conferencing. Users must have a web-enabled Ready-<br />

Access subscription in order to access Cisco WebEx solutions as a Host. Hosts use the same Ready-<br />

Access Number and 7-Digit Access Code to access Cisco WebEx solutions as they do to access their<br />

Ready-Access audio conferencing service. Ready-Access audio conference controls are available within a<br />

Cisco WebEx web conference and synchronized audio and web recording is available.<br />

Cisco WebEx web conferences can be used in any situation that requires collaboration or data<br />

sharing between two or more participants who are not able, for whatever reason, to meet in person.<br />

In addition to the Cisco WebEx web conferencing product, Level 3 also offers Cisco WebEx Connect,<br />

a presence and Enterprise Instant Messaging tool customers can use to collaborate securely with<br />

remote colleagues – inside or outside their organization. WebEx Connect IM brings together the most<br />

effective communication and collaboration solutions from Cisco including: Presence, Enterprise Instant<br />

Messaging, Voice, Video, UC Capabilities and 1:1 Conferencing. Additionally, customers that use<br />

Connect will be able to launch Meeting Centre meetings from the WebEx ball within the client.<br />

Cisco WebEx Web Conferencing Product Comparison<br />

712<br />

Cisco WebEx<br />

Meeting Centre<br />

Description Meet online<br />

to present<br />

information,<br />

Cisco WebEx<br />

Training Centre<br />

Deliver<br />

engaging,<br />

effective, and<br />

Cisco WebEx<br />

Event Centre<br />

Stage large-<br />

scale online<br />

events and web<br />

Cisco<br />

WebEx Support<br />

instant,<br />

Centre<br />

Provide<br />

personalized


713<br />

share<br />

applications,<br />

and collaborate<br />

on projects with<br />

customers and<br />

co-workers<br />

worldwide.<br />

Usage Scenarios Collaborative<br />

Recommended<br />

number of attendees<br />

sessions<br />

Internal and<br />

external<br />

meetings<br />

Product<br />

demos<br />

Sales<br />

presentations<br />

Up to 100;<br />

additional<br />

capacity<br />

available<br />

interactive<br />

instructor-led<br />

training to<br />

employees,<br />

customers, and<br />

partners in<br />

virtual online<br />

classrooms.<br />

Employee<br />

training<br />

Partner<br />

training<br />

Customer<br />

training<br />

Up to 1000;<br />

additional<br />

capacity<br />

available<br />

seminars to<br />

generate leads<br />

and train<br />

employees,<br />

customers, and<br />

partners.<br />

Web seminars<br />

Marketing<br />

events and<br />

conferences<br />

Product<br />

launches<br />

Employee<br />

communicatio<br />

ns<br />

Up to 3,000;<br />

additional<br />

capacity<br />

available<br />

customer or IT<br />

support<br />

worldwide.<br />

Enable your<br />

support staff to<br />

diagnose and<br />

fix problems in<br />

real-time,<br />

remotely, from<br />

their PCs.<br />

IT support<br />

using the<br />

Internet<br />

Customer<br />

support<br />

through the<br />

Internet<br />

10 or fewer<br />

per remote<br />

support session


Sharing<br />

Information<br />

Share desktop,<br />

application, web<br />

browser/content<br />

Whiteboard,<br />

presentation and<br />

document sharing<br />

Play Flash,<br />

streaming audio/video,<br />

WebEx recordings<br />

(Windows and Mac)<br />

Annotation<br />

tools/annotation in<br />

sharing mode<br />

Text Chat and Q&A<br />

(managed and<br />

moderated)<br />

714<br />

Cisco WebEx<br />

Meeting Centre<br />

Cisco WebEx<br />

Training Centre<br />

Cisco WebEx<br />

Event Centre<br />

Cisco<br />

WebEx Support<br />

Centre<br />

Yes Yes Yes Desktop<br />

and application<br />

sharing only<br />

Yes Yes Yes N/A<br />

Yes Yes Yes N/A<br />

Yes Yes Yes Yes<br />

Text Chat Yes Yes Text Chat


Transfer files Yes Yes Available on<br />

Publish event and<br />

course materials<br />

Audio and Video Cisco WebEx<br />

715<br />

Meeting Centre<br />

Audio Ready-<br />

Access<br />

Video Single-point<br />

and multi-point<br />

(6); integration<br />

with Cisco<br />

Unified Video<br />

Conferencing<br />

available<br />

request<br />

Yes Yes<br />

Cisco WebEx<br />

Training Centre<br />

Access<br />

Ready-<br />

Single-point<br />

and multi-point<br />

(6)<br />

Cisco WebEx<br />

Event Centre<br />

Ready-<br />

Access; Audio<br />

Broadcast<br />

Single-point<br />

available on<br />

request<br />

Basic and<br />

advanced file<br />

transfer<br />

Cisco<br />

WebEx Support<br />

Access<br />

only<br />

Centre<br />

Ready-<br />

Single-point<br />

Meeting Features Cisco WebEx Cisco WebEx Cisco WebEx Cisco


716<br />

Meeting Centre Training Centre Event Centre WebEx Support<br />

Attention indicator Yes Yes<br />

Polling: instant and<br />

planned<br />

Program/campaign<br />

management, post<br />

event surveys<br />

Lead source<br />

tracking and enrolment<br />

scoring<br />

Email management<br />

(automated invitations,<br />

reminders and tracking)<br />

Registration<br />

management<br />

Instant only Yes Yes<br />

Testing and instant Yes<br />

Yes<br />

Yes<br />

Text only Full-<br />

featured<br />

Yes Advanced Advanced<br />

Centre


grading, and instructor<br />

scoring<br />

Breakout sessions<br />

and hands-on labs<br />

Permissions-based<br />

remote control<br />

One-click remote<br />

system hardware and<br />

software information<br />

Options<br />

717<br />

only<br />

Yes – Web<br />

Yes Yes<br />

Reports Yes Yes Yes Yes<br />

Connection<br />

Operating system<br />

support (Windows,<br />

Mac, Linux, Solaris)<br />

Cisco WebEx<br />

Meeting Centre<br />

Unix<br />

Yes, plus<br />

Cisco WebEx<br />

Training Centre<br />

Cisco WebEx<br />

Event Centre<br />

Yes<br />

Yes Yes Yes<br />

Start meeting from Yes Yes Yes Yes<br />

Cisco<br />

WebEx Support<br />

Centre


within any Windows<br />

application, desktop or<br />

Internet browser<br />

Join and attend<br />

from 3G mobile device<br />

Click to join using<br />

SMS or email (audio<br />

only)<br />

Integrated<br />

ecommerce (pay to<br />

attend)<br />

request<br />

connect<br />

Inbound support<br />

Remote reboot and<br />

718<br />

Yes<br />

Yes Yes Yes<br />

Yes Requires<br />

Implementation<br />

<strong><strong>Service</strong>s</strong><br />

Requires<br />

Implementation<br />

<strong><strong>Service</strong>s</strong><br />

Click-to-<br />

Connect,<br />

WebEx<br />

WebACD<br />

Logon as Yes<br />

Yes


administrator and<br />

remote printing<br />

Options<br />

Other Tools and<br />

Recording, editing,<br />

playback<br />

Microsoft®<br />

Outlook® and Lotus®<br />

Notes Integration<br />

Flash-based<br />

attendee interface<br />

Localization<br />

(French, German,<br />

Italian, Japanese,<br />

Portuguese, Simple and<br />

Traditional Chinese,<br />

719<br />

Cisco WebEx<br />

Meeting Centre<br />

Network-<br />

based and<br />

client-side<br />

Cisco WebEx<br />

Training Centre<br />

Network-<br />

based and<br />

client-side<br />

Cisco WebEx<br />

Event Centre<br />

Network-<br />

based and<br />

client-side<br />

Cisco<br />

WebEx Support<br />

Centre<br />

Network-<br />

based,client- side, and client-<br />

side automatic<br />

Yes Yes Yes Yes<br />

Yes, plus<br />

Korean and<br />

Swedish<br />

Korean<br />

Yes, plus<br />

Yes<br />

Yes Yes, plus<br />

Korean


Spanish)<br />

720


KCOM Group Plc<br />

KCOM shall provide supply, installation, maintenance, technical architecture and system design,<br />

project management, and support for equipment, commodity and managed service for the services<br />

described below:<br />

Traditionally-delivered voice services<br />

KCOM provides traditionally-delivered voice services anywhere in the UK.<br />

<strong><strong>Service</strong>s</strong> are provided either via direct connection to KCOM’s own national network or as an indirect<br />

connection via the BT network, depending on location. Direct connections use Primary Rate ISDN30 with<br />

a choice of signalling (Q931e, DASS, DPNSS) dependent on Customer equipment, using KCOM fibre, or<br />

OLO (Other Licensed Operator) “tail” circuits. Indirect connections utilise the existing BT network<br />

infrastructure (Wholesale Line Rental ISDN30e/Dass, ISDN2 and analogue lines). KCOM uses ISDN digital<br />

technology for reliability, call clarity and seamless connection for voice/fax and video communication.<br />

To complement indirect connections, KCOM carries traffic via Carrier Pre-Select (pre-determined<br />

code programmed at the local BT exchange to automatically route calls via the KCOM network). This can<br />

be offered on its own where existing lines need to remain with BT, or both lines and calls can be<br />

transferred.<br />

KCOM also provides an indirect access code service (138) to extend to home-workers, so that<br />

business calls can be made using the access code, which will be billed to the business Customer, allowing<br />

private calls and line rental to remain with the incumbent.<br />

Business continuity options are available for direct and indirect connections for additional resilience.<br />

Existing numbers can be ported to KCOM to maintain marketing continuity.<br />

KCOM supports additional supplementary services such as Call Barring, Caller Display, Call<br />

Forwarding and Calling Line Identity presentation, to complement and enhance line functionality. KCOM<br />

also supports Type 5 number presentation when directly connected to the KCOM network, which<br />

presents a nominated number such as a freephone or local call number to the end user rather than the<br />

721


underlying network number to encourage return calls, or to implement traffic management on return<br />

calls.<br />

IP-based voice services<br />

KCOM SIP Trunking provides PSTN connectivity over an IP connection from the Customers telephone<br />

system. This can replace or co-exist with existing traditional voice connections such as ISDN.<br />

Unlike traditional ISDN or analogue line connections, SIP trunks are not tied to geographical<br />

locations and are scalable on a per line basis. Calls within and between connected locations are free of<br />

charge, whilst all other calls are on standard KCOM voice tariffs. Customers can retain existing numbers<br />

and get access to new number ranges from different area codes across the UK. SIP Trunking allows the<br />

integration and routing of calls between separate locations in a more flexible and efficient manner.<br />

Dynamic failover provides additional security by automatically re-routing calls if the<br />

normal telephone destination cannot be reached.<br />

KCOM offers a transition service to migrate Customers from existing voice lines to KCOM SIP<br />

Trunking ensuring that there will be no disruption to service.<br />

KCOM has undertaken interconnect and interoperability testing between its SIP Trunking product<br />

and the following PBX vendors:<br />

· Cisco<br />

· Avaya<br />

· Mitel<br />

· Siemens<br />

· Panasonic<br />

· Samsung<br />

· Toshiba<br />

· Microsoft<br />

722


· Splicecom.<br />

KCOM offers SIP Trunking over the following site access methods:<br />

· Broadband: ADSL(20CN) and ADSL2+(21CN),<br />

· Ethernet: Copper (EFM) and Fibre point-to-point and multi-point<br />

· IP VPN MPLS.<br />

Call packages<br />

KCOM offers standard call tariffs, or bespoke pricing based on a Customer existing traffic profile.<br />

KCOM does not operate minimum call charges or set up fees. Calls are priced on a pence per minute<br />

rate only and are BABT certified for accurate billing.<br />

Voice minutes<br />

KCOM operates several PSTN interconnect agreements with a number of Tier 1 UK, International<br />

and Mobile carriers to assure quality business grade call transit and termination and carries over 900<br />

million minutes per annum across the KCOM network.<br />

KCOM has a pro-active Fraud Management Team monitoring network usage and anomalies.<br />

DDI<br />

DDI is used to provide different telephone numbers for each telephone extension, and to route the<br />

call to the correct extension. The extension number forms the last part of the actual directory number<br />

and can be set from 2 to 6 digits.<br />

For ISDN2e, DDI installation shall be a minimum of 2 and a maximum of 60 channels. Groups of<br />

ISDN2e access channels can be allocated up to a maximum of 5 separate DDI ranges, where each<br />

number range will have a minimum of 10 consecutive numbers. All numbers in all ranges will have the<br />

same service profile (i.e. if one number is forwarded they all will be). The numbering options allow a<br />

mixture of SNDDI (Single Number Direct Dialling In) and DDI ranges on the same installation with all<br />

numbers using any of the available channels. A maximum of 5 SNDDI, including the main number, can be<br />

provided on ISDN2e.<br />

723


For ISDN30e – DDI provides number blocks in multiples of 10 numbers and can support a maximum<br />

of 10 DDI / SNDDI ranges. For ISDN30 DASS, only DDI ranges are applicable and SNDDI numbers are not<br />

supported. Up to 5 DDI ranges can be applied across the same channels.<br />

Premium rate numbers<br />

KCOM offers Premium Rate Numbers of 090 (content) and 091 (non content) of all price point<br />

ranges, with access via a secure online portal to manage Number Translation <strong>Service</strong> routing plans in<br />

real time. Calls can be routed by time of day, day of week, ratio (%) distribution, DTMF (emergency<br />

routing), divert on busy/no reply, and by geographic distribution.<br />

For business continuity (DTMF emergency routing), KCOM provides the ability to create multiple<br />

routing plans which can be held dormant until required. The activation of an alternative routing plan can<br />

be invoked instantly by remote activation at any time from either a phone using DTMF control, the<br />

online portal, or by the KCOM 24 hour Customer <strong><strong>Service</strong>s</strong> Helpline.<br />

KCOM builds all Premium Rate Numbers onto the KCOM Intelligent Network (IN) platform to enable<br />

intelligent routing of inbound calls. The KCOM IN platform delivers calls to any destination in the UK via<br />

on-net or off-net connectivity. All Premium Rate Numbers can be viewed for billing and reporting<br />

through the KCOM Online Billing & Reporting tool, and network usage is monitored 24/7 via the KCOM<br />

fraud management team.<br />

Non-geographic numbers<br />

KCOM offers non-geographic numbers including 0800 freephone, 0845 local rate, 0870 national<br />

rate, 0844 & 0871 flexible tariffs & 03 national alternative numbers. All geographic number ranges can<br />

be managed via a secure online portal to update Number Translation <strong>Service</strong> routing plans in real time.<br />

Calls can be routed by time of day, day of week, ratio (%) distribution, DTMF (emergency routing), divert<br />

on busy/no reply, and by geographic distribution.<br />

For business continuity (DTMF emergency routing), KCOM service offers the ability to create<br />

multiple routing plans which can be held dormant until required. The activation of an alternative routing<br />

plan can be invoked instantly by remote activation at any time from either a phone using DTMF control,<br />

the online portal, or by our 24 hour Customer <strong><strong>Service</strong>s</strong> Helpline.<br />

724


KCOM builds all Non-geographic numbers onto the KCOM IN platform to enable intelligent routing<br />

of inbound calls and deliver calls to any destination in the UK via on-net or off-net connectivity. Existing<br />

Non-geographic numbers can be ported so existing numbers can be retained. All Non-geographic<br />

numbers can be viewed for billing and reporting through the KCOM Online Billing & Reporting tool, and<br />

network usage is monitored 24/7 via the KCOM fraud management team.<br />

KCOM also supports Local Presence Numbers, which are numbers that portray a local presence in<br />

areas where there may be no physical site location. They are managed in exactly the same way as other<br />

non-geographic numbers.<br />

118 enquiries<br />

KCOM is the UK’s largest wholesale provider for directory enquiry services, with over 20 customers<br />

and over 40 different 118 numbers. KCOM offers a 118xxx Directory Enquiry (DQ) service on behalf of<br />

customers for revenue generating business. This is a flexible service and provides a range of call handling<br />

features which can be tailored to specific requirements and desired target markets including, operator<br />

or automated greeting, basic service or call connect, single or multiple searches, national or<br />

international DQ, SMS number delivery and automated or operator number announcements.<br />

Alternatively, KCOM offers a national and international 118xxx DQ service with a flat fee rate for<br />

either 1 or up to 3 searches, and the option to onward connect or restrict. The service includes an option<br />

to re-route all outbound calls to DQ services to a specified 118xxx service. KCOM also provides a Multi-<br />

DQ service whereby multiple requests (over 10) can be faxed/emailed to the KCOM Operator Call<br />

Handling Centre.<br />

Call Preference <strong><strong>Service</strong>s</strong><br />

KCOM offers registration to the Telephone Preference Scheme and Fax Preference Scheme which is<br />

administered by the Direct Marketing Association for both Indirect and Directly Connected circuits.<br />

For Directly Connected circuits, KCOM has set processes for managing “Nuisance” calls, where<br />

“Nuisance” is determined as any call which is unwanted. The reporting of Nuisance Calls is managed by<br />

the KCOM Network Management Centre (NMC) and appropriate action is taken dependent on the type<br />

of “Nuisance” call being reported. KCOM works in liaison with the police for line trace requests, and has<br />

a Malicious Call Indicator capability on the KCOM Network where the end user can dial “1” at the time of<br />

receipt of the call to trigger an immediate notification to the NMC team. The end user can also reject<br />

Anonymous Calls to the CLI that has been reported as receiving “Nuisance” calls.<br />

725


For Indirectly Connected circuits, all “Nuisance” calls are managed through the Openreach Nuisance<br />

Calls Bureau or directly through the Law Enforcement Agency.<br />

Audio conferencing<br />

KCOM Conferencing Pay as you Go is a reservation-less audio conference service available 24 hours<br />

a day, 7 days a week. The service allows three or more people to participate on a single call with<br />

unlimited number of participants. This is charged on a pence per minute, per user rate for the duration<br />

of the call. The account is managed via a secure customer portal allowing customers to view invoices,<br />

add new users, adjust security options and manage recorded conferences. Audio conferencing is either<br />

hosted internally, or as a managed call by a conference moderator, with the option to have interactive<br />

mode for all participants, or muted for host-only speak.<br />

KCOM also provides on-premise IP telephony audio conferencing products allowing multiple callers<br />

to dial into a multi party voice conference call. The voice conference servers provide VOIP access to<br />

voice conferences using headsets, short-code dialling within the company, and external bridges for PSTN<br />

access for company staff and other users such as partners, suppliers and Customers.<br />

On-premise audio conferencing is set up using a web page or is built into standard email tools such<br />

as Microsoft Outlook and Lotus Notes so that the dial-in details and PIN numbers can be attached to the<br />

voice conference invite.<br />

Voice conference services from KCOM scale to hundreds of ports allowing a number of simultaneous<br />

conferences to be happening at any one time.<br />

KCOM provides the following on-premise voice conference products:<br />

· Cisco – Cisco Meeting Place<br />

· Avaya – Avaya Aura Conferencing<br />

· Microsoft – Lync 2010.<br />

Desktop video conferencing and collaboration tools<br />

726


KCOM provides the following desktop video conferencing and collaboration tools:<br />

· Unified Communication clients that enable users to see the presence of colleagues, escalate to<br />

an Instant messaging chat and then to a voice conference call and video conference on a point<br />

to point, or point to multipoint basis. Users also have the option to share documents, web sites<br />

and other applications<br />

· A reservation conferencing tool based on Cisco Webex or Avaya Aura Conferencing that<br />

integrates web conferencing, video conferencing with multi parties, note only the speaking<br />

party is seen at any one time. This can also be fully integrated into voice conferencing<br />

applications. The scheduling of these meetings can be made via a web browser or plug-ins<br />

available for applications such as Microsoft Outlook.<br />

KCOM provides the following manufacturer products:<br />

· Cisco – Jabber, Cisco Webex connect, Cisco Webex meeting centre<br />

· Avaya – Avaya Aura One X, Avaya Aura Conferencing.<br />

· Microsoft – Lync 2010.<br />

Web conferencing<br />

KCOM provides both cloud based and on premise web conferencing products that are accessed<br />

either through a web site or integrated via an API into applications such as Microsoft Outlook, Lotus<br />

Notes and other email applications. The KCOM web conferencing services gives users the following<br />

capabilities:<br />

· Run live or streamed video for training or company briefings<br />

· Run VoIP or Real time audio communication through the computer allowing people to access<br />

via the network or internet<br />

· Run web tours - where URLs, data from forms, cookies, scripts and session data can be pushed<br />

to other participants<br />

· Record meetings for later viewing and/or distribution.<br />

· Use whiteboards with annotation to edit a variety of applications such as Microsoft Excel,<br />

Word, and Powerpoint presentations<br />

· Text chat, either public (echoed to all participants) or private (between 2 participants).<br />

· Run polls and surveys to obtain feedback<br />

727


· Share screens, desktop and applications.<br />

KCOM provides these services using the following products:<br />

· Cisco – Cisco Webex, Cisco Meeting Place with Webex node for MCS<br />

· Avaya – Avaya Aura Conferencing<br />

· Microsoft – Lync 2010.<br />

Internet services<br />

KCOM is a VMware Premier <strong>Service</strong> Provider, provides Internet services including email and web<br />

services, antivirus, email scanning/filtering, firewalls, intrusion/spyware detection, authentication,<br />

access management. KCOM is a member of LINX (London Internet Exchange) and peers with other major<br />

providers. All primary hosting is performed in Tier III or higher data centres and KCOM has<br />

geographically-resilient facilities.<br />

KCOM provides fully uncontended internet access services using fibre or copper bearer circuits.<br />

Bandwidths from 2Mbps to 10Gbps will be delivered over fibre circuits, whilst lower-cost copper circuits<br />

support bandwidths of up to 10Mbps, subject to availability.<br />

KCOM provides resilient fibre circuits in either failover or load-balanced configurations. A failover<br />

service provides two active circuits, each providing back-up for other. A load-balanced service provides a<br />

second, inactive circuit which shall be automatically used should the primary circuit fail.<br />

KCOM also provides reactive Distributed Denial of <strong>Service</strong> (DDoS) monitoring of the network as<br />

standard and shall provide an option to upgrade to a proactive service.<br />

Bandwidth levels on all services have the option to flex the committed level of bandwidth, upon<br />

request, within the constraints of the access bearer. KCOM provides a managed Cisco router, configured<br />

with public IP addresses for use with the service.<br />

Email and website services<br />

728


KCOM provides a hosted email service based on Microsoft Exchange 2010. Two main types of<br />

mailbox are provided:<br />

· Basic mailboxes, providing personal calendars, task lists and contacts<br />

· Full MAPI (Messaging Application Program Interface) compliant mailboxes providing shared<br />

calendars, global address lists, shared contacts, and mobile access including Blackberry<br />

Enterprise Server. Mailboxes can be up to 25GB in size.<br />

Management is via a web portal which can optionally be Customer-branded. The Exchange 2010<br />

platform is fully resilient and the service is provided with a 99.9% availability SLA. Access to email can be<br />

via Microsoft Outlook, any web browser using Outlook Web App or a mobile device via Activesync.<br />

Outlook Anywhere ensures the security of emails travelling across the Internet as transmission is via RPC<br />

over HTTPS.<br />

KCOM also provides an Email Archiving service with role based administration and options for full<br />

search and discovery tools to monitor and report adherence to internal email policy, and user or<br />

administrator recovery of emails. The Email Archiving service will be provided as an option for the<br />

Hosted solution of can be provided as a standalone solution.<br />

KCOM provides website services from KCOM data centres via the KCOM managed hosting platform.<br />

Websites can be delivered and managed on Microsoft Windows and Red Hat Linux platforms with<br />

availability SLAs of up to 99.99%<br />

Co-location and hosting<br />

KCOM provides unmanaged and managed co-location services in several, redundant data centres<br />

across the UK, all of which are Tier III or higher. All sites have multiple internet connections as well as<br />

standard telecommunications connectivity. MPLS, point to point and internet connections can be crossconnected<br />

in all locations. All data centres have 24x7 monitoring and remote hands available. Fullymanaged<br />

hosting services are provided at the primary site in Docklands, with a redundant site in<br />

Reading. Hosting services can be delivered on either virtual (VMWare) or physical servers, fully-licensed<br />

on either Microsoft Windows or Red Hat Linux platforms. Managed hosting services include equipment<br />

supply, solution design, uptime monitoring, operating system management, patching, antivirus, DDoS<br />

monitoring and licensing.<br />

On-line storage<br />

729


KCOM provides online storage services in the KCOM primary and secondary data centres, which are<br />

linked via dual, redundant 10Gb/s links. All storage is provided utilising high performance shared<br />

SAN/NAS infrastructure on redundant NetApp equipment, which is backed up to the redundant site.<br />

Access solutions to the On-line storage platform will be provided by connection via 1Gibit or 10Gbit<br />

Ethernet using iscsi, NFS or SMB protocols On line storage can be provide by connection over 1Gibit or<br />

10Gbit Ethernet using iscsi, NFS or SMB protocols.<br />

Security services<br />

KCOM provides security services as a hosted service or an on-premise service on customer owned<br />

equipment.<br />

Hosted Security <strong><strong>Service</strong>s</strong><br />

KCOM provides hosted security services as a physical, dedicated, high availability service or on a<br />

shared platform depending on Customer requirements. KCOM shall provision, configure and install the<br />

solution; undertake testing in conjunction with the Customer and participate in any external penetration<br />

testing where required by the Customer; monitor and support the service 24x7; deploy firmware<br />

updates and security patches under change control.<br />

All services are provided out of KCOM enterprise-class Tier 3 data centres.<br />

On-premise Security <strong><strong>Service</strong>s</strong><br />

KCOM designs and provides managed services for security devices from key vendors including Cisco,<br />

Checkpoint, Juniper and Thales. The managed service comprises:<br />

· Design and Integration<br />

· License and Subscription services for updating of Anti Virus signatures<br />

· Maintenance including on-site engineering support, hardware replacement and software and<br />

security patch updates<br />

· Hardware and critical software status monitoring<br />

· Change and configuration management supported by back up and restore processes<br />

· Device incident management<br />

· Optional Security Event Correlation and Management<br />

730


· Optional Security Event Filtering and Log Retention<br />

· Optional Vulnerability Scanning and Assessment.<br />

On-premise services can be used in conjunction with hosted services for e-mail and web filtering.<br />

Antivirus<br />

Hosted <strong><strong>Service</strong>s</strong><br />

The KCOM hosted antivirus service provides fully automated updates to ensure protection against<br />

the latest signatures. It employs advanced virus, spyware, and heuristic detection engines to enable<br />

KCOM end point security agents to prevent both new and evolving threats from gaining access to<br />

Customer networks and their content and applications. KCOM provides global updates via the<br />

FortiGuard Network for comprehensive protection against all content-level threats. Scanning is done in<br />

real time at near wire speed.<br />

On-premise<br />

KCOM provides firewall appliances configured to access vendor provided updates for Anti Virus<br />

software and management of the associated subscription service. This is normally provided as part of a<br />

wider security managed <strong>Service</strong>.<br />

Email scanning and filtering<br />

Email scanning and filtering is provided via MailDefender. This is a cloud product, requiring no<br />

software to be installed on-premise. It uses multiple industry leading AntiSpam and AntiVirus engines<br />

and also contains Anti-phishing and quarantine elements. The system is updated every five minutes with<br />

new virus information. It can be setup to operate at the domain level or at an individual user level with<br />

user defined white/blacklists. User administration can be done via the MailDefender interface or via<br />

Active Directory synchronisation. The quarantine area can be configured to be end-user or supervisor<br />

managed. Messages within the quarantine database can be searched by keyword, date, from, to, etc, to<br />

find specific emails. The MailDefender system includes detailed auditing and reporting and the ability to<br />

add a disclaimer to outgoing emails.<br />

Firewalls<br />

731


KCOM offers Firewall services as a hosted service or an on-premise managed service on customer<br />

owned equipment.<br />

Hosted services<br />

For co-location and managed hosting Customers, KCOM provides fully-managed Fortigate and Cisco<br />

firewall services on a rental model. All services provide stateful inspection, deep packet inspection,<br />

packet filtering, real time anti-virus and anti-spam delivered in an application context.<br />

On-premise services<br />

KCOM designs and provides Firewall solutions based on vendor platforms including Cisco,<br />

Checkpoint and Juniper. The service provided includes:<br />

· Design, implementation and transition into operational management<br />

· Maintenance<br />

· Managed service where required<br />

· Optional Security Event and Information Management (SEIM)<br />

· Optional subscription services for Anti Virus updates<br />

Intrusion and spyware detection<br />

KCOM offers Intrusion Prevention <strong>Service</strong> (IPS) services as a hosted service or an on-premise<br />

managed service on customer owned equipment.<br />

Hosted services<br />

The KCOM IPS provides Customers with robust defences against stealthy network-level threats. It<br />

uses a customizable database of more than 5,100 known threats that enables KCOM to stop attacks that<br />

evade conventional firewall defences. It also provides behaviour-based heuristics, enabling the system<br />

to recognise threats for which no signature has yet been developed. The combination of known and<br />

unknown threat prevention provides a robust defence to attacks.<br />

On-premise services<br />

732


KCOM design and provide solutions based on vendors platforms including Cisco, and Checkpoint.<br />

The service is based on IPS modules configured in Firewalls or on standalone IPS appliances and<br />

includes:<br />

· Design, implementation and transition into operational management<br />

· Maintenance<br />

· Managed <strong>Service</strong> where required<br />

· Optional Security Event and Information Management (SIEM)<br />

· Optional subscription services for IPS signature updates.<br />

Authentication and access management<br />

KCOM offers authentication and access management as a hosted service or an on-premise service.<br />

Hosted services<br />

KCOM deploys a range of authentication and access management services, from forms-based<br />

authentication, through Microsoft Active Directory and up to and including two factor authentication<br />

(Fortinet or RSA-based). All are delivered as a managed service as part of a larger managed hosting<br />

project.<br />

On-premise services<br />

KCOM provides Internet based Virtual Private Network (VPN) and Access Control Systems based on<br />

Cisco equipment for on-premise authentication and access management.<br />

The VPN service uses Firewalls supporting SSL and IPSEC clients. IPSEC VPN includes client software<br />

for end user devices including laptops, smart phones and tablet.<br />

Authentication and access is provided by the deployment of the Cisco Access Control System (ACS),<br />

Network Access Control (NAC) appliances and the Cisco Identity <strong><strong>Service</strong>s</strong> Engine (ISE). These solutions<br />

are used to control access in wired and wireless environments as well as an additional layer to VPN<br />

services.<br />

733


Access control is used for Policy Enforcement, Identity Aware Access, Role Based Access and Guest<br />

Access.<br />

The service includes:<br />

· Design, implementation and transition into operational management including integration<br />

with Customer’s directory services as required<br />

· Maintenance<br />

· Managed <strong>Service</strong> where required.<br />

Web and application sign on services<br />

KCOM provides web-based sign on services for accessing (e.g.) a fully-managed SharePoint platform<br />

via Forms-Based Authentication. Application sign on services (e.g. Microsoft Active Directory) are<br />

deployed as part of a larger managed service and are dependent upon the specifics of the application or<br />

platform.<br />

Messaging services<br />

KCOM provides Voice-mail systems that provide a user interface to select, play, and manage<br />

messages; a delivery method to either play or otherwise deliver the message; and a notification ability<br />

to inform the user of a waiting message.<br />

KCOM provides Unified Messaging systems that allow users to access voice-mail and email messages<br />

using either the graphical user interface (GUI) on their PC, mobile device or using the telephone user<br />

interface (TUI). When viewed using a PC, voice-mails and emails are displayed together in the user’s<br />

email inbox.<br />

KCOM provides more advanced systems that are integrated with a company’s PABX, with a call<br />

centre ACD for automatic call distribution. Interactive Voice Response (IVR) systems use digital<br />

information stored in a corporate database to select pre-recorded words and phrases stored in a voicemail<br />

vocabulary to form sentences that are delivered to the caller.<br />

KCOM provides the following manufacturers Voice Mail or Unified messaging products:<br />

734


· Cisco – Cisco Unity and Unity Connection.<br />

· Avaya – Call Pilot, Avaya Modular Messaging , Avaya Aura Messaging<br />

· Microsoft – Exchange 2010<br />

Real time information services<br />

KCOM shall provide intelligent building solutions to monitor and deliver real time information on<br />

hazards such as smoke detection and fire control, building access management and telemetry for<br />

example temperature thresholds, air flow and smoke detection in environments such as data centres.<br />

The KCOM intelligent building solutions also enable the automation of processes and tasks in an<br />

estate environment. The solution KCOM provides uses integrated energy management systems<br />

supporting power management and energy conservation, for instance, lighting automation solutions can<br />

be delivered over the converged IP network meaning that lights can be switched off when it senses the<br />

building or room is not occupied. It also provides the monitoring and control and facilities such as<br />

switching off, or reduced power to other systems such as air conditioning, heating at either set times or<br />

when buildings are not occupied for periods. Additionally, servers, PCs, IP Phones and Wireless Access<br />

Points can be powered down during non operational hours.<br />

KCOM Intelligent Building solutions include:<br />

· Cisco Routing , Switching and Security Products<br />

· Cisco VPN Products<br />

· Building Automation and Management Systems<br />

· Energy Management Systems<br />

· HVAC Systems<br />

· Lighting sensor systems<br />

Desktop messaging<br />

KCOM provides desktop instant messaging and presence for text-based communication between<br />

two or more participants over the Internet, corporate network or mobile network. Presence and Instant<br />

Messaging (IM) chat happens in real-time.<br />

735


The instant messaging service includes a separately installed software client, or a browser-based<br />

client. IM Chat can be escalated into a voice call and then into a wider conference using voice and web<br />

conferencing.<br />

Using IM Federation a company’s IM application can be made visible to other communities allowing<br />

interaction with other public sector bodies such as Police, Fire and Rescue etc, as well as suppliers and<br />

internet based IM providers such as Google Talk, Yahoo messenger and MSN Messenger.<br />

KCOM provides the following manufacturers presence platforms and clients:<br />

· Cisco – Jabber, Cisco Unified Personal Communicator, Cisco Unified Presence, Cisco CUCILYNC<br />

(Cisco Unified Communications Integrated with Lync), Cisco Integration to IBM Lotus Notes<br />

· Avaya – One X and Aura Presence<br />

· Microsoft – Lync 2010.<br />

Messaging via email, SMS, pager and mobile or fixed line telephone<br />

KCOM Connect provides options for delivering messages via email, SMS, paging and multimedia<br />

messages to any combination of mobile and fixed line phones, PDAs, Blackberrys, email, pagers and fax<br />

destinations. These shall be:<br />

· - sent directly from user desktop via a web site,<br />

· - integrated into business applications through plug-ins/APIs into email systems such as<br />

Microsoft Outlook, Lotus Notes, allowing emails to be sent as text messages, or<br />

· - integrated into backend systems and software such as Salesforce.com<br />

Messages can be delivered to mobile phones and fixed line telephones using text to speech.<br />

KCOM provides integration into other messaging services through its partnership with Pageone<br />

Paging <strong><strong>Service</strong>s</strong>. KCOM Pageone paging service sends pager messages to a group of users, initiated<br />

simply by landline, SMS, or from any PC with web access allowing messaging to the organisations<br />

pagers.<br />

736


KCOM Connect includes audit details of all message delivery and receipt.<br />

Provision of all elements of a complete solution<br />

KCOM provides UC services including the following components:<br />

· Instant Messaging<br />

· Soft (computer-based) telephony<br />

· Fixed to mobile integration<br />

· Physical (handset-based) telephones<br />

· Collaboration software<br />

· Desktop video or the integration to a larger room-based system<br />

· Presence integration into your current activity, calendar or locality<br />

· Integration into Contact Centre<br />

· Federation to other organisations.<br />

The components that allow Unified Communications may include the following, depending upon the<br />

specific capabilities a particular organisation includes:<br />

1. Applications Servers from KCOM main vendors Cisco, Avaya, Microsoft<br />

737<br />

o Call Processing server<br />

o Presence server<br />

o Messaging server (instant messaging, email, voicemail, facsimile)<br />

o Collaboration server<br />

o Mobility servers<br />

o Billing and Compliancy Servers<br />

2. Gateways from Cisco, Avaya and Microsoft


738<br />

o TDM-PSTN connectivity<br />

o SIP trunking and Session Border Controllers<br />

3. Endpoints, from Cisco, Microsoft, Avaya:<br />

o Phones, Softphones, Mobiles, Tablets, Smart Phones


Logicalis UK Ltd<br />

Section 1 Logicalis Communication <strong><strong>Service</strong>s</strong> Overview<br />

Logicalis has designed a range of <strong><strong>Service</strong>s</strong> that map onto the Lot 1 provision for Communications<br />

<strong><strong>Service</strong>s</strong>, these include:<br />

1. Provision of all elements of a Complete Solution.<br />

2. All traditional and IP based voice services;<br />

739<br />

voice call packages;<br />

voice minutes;<br />

DDI,<br />

premium rate numbers;<br />

non-geographic numbers;<br />

118 enquiries;<br />

call preference services,<br />

SMS, pager and mobile or fixed line telephone;<br />

messaging services;<br />

real time information services;<br />

desktop messaging;


740<br />

messaging via email,<br />

3. Conferencing <strong><strong>Service</strong>s</strong><br />

audio conferencing;<br />

desktop video conferencing and collaboration tools;<br />

web conferencing;<br />

4. Internet <strong><strong>Service</strong>s</strong><br />

Internet;<br />

email and website services;<br />

co-location and hosting;<br />

on-line storage;<br />

5. Security <strong><strong>Service</strong>s</strong>;<br />

antivirus;<br />

email scanning and filtering;<br />

firewalls;<br />

intrusion and spyware detection;<br />

authentication and access management;


741<br />

web and application sign on services;<br />

6. Supply of Equipment<br />

7. Consultancy and Professional <strong><strong>Service</strong>s</strong> including:<br />

technical architecture;<br />

system design;<br />

installation.<br />

8. Project & <strong>Service</strong> Management<br />

9. Training<br />

10. Support <strong><strong>Service</strong>s</strong> including:<br />

maintenance;<br />

support for equipment, commodity and managed service.<br />

Section 2 Provision of all elements of a Complete Solution.<br />

Voice <strong><strong>Service</strong>s</strong><br />

Logicalis’ service approach to Unified Communications is modular, allowing Customers to take the<br />

services that they require, overlaid onto the foundations that they already have.


For instance, it is likely that many of the Partners that intend to connect to the <strong>PSN</strong> at this stage<br />

already have IP or TDM based telephony platforms that are likely to be retained for at least another two<br />

years. In this case, local call control is handled by these existing systems. This does not preclude these<br />

organisations from taking other services in the portfolio however such as PSTN access, mobile<br />

integration or conferencing. In some cases, Partner organisations may have more than one service<br />

already in place such as call control, instant messaging and e-mail. In this instance, federation,<br />

integration and interconnection services are provided by Logicalis to interconnect them with other <strong>PSN</strong><br />

Customers as required.<br />

Where there is no UC infrastructure in place or it is unlikely to be retained, the Customer can choose<br />

to take the full suite of services from Logicalis, safe in the knowledge that they are able to interwork<br />

with those organisations or sites that have taken the modular approach.<br />

Call Control and Interconnection<br />

742


The core services delivered to <strong>PSN</strong> Customers in the first instance enable the connection of each<br />

Partner site, securely over the <strong>PSN</strong> network. This allows organisations to communicate between their<br />

sites with zero call charges based on their existing call control platforms (Avaya, Nortel, Alcatel etc). In<br />

addition, they are able to access the PSTN centrally using two secured and geographically separated SIP<br />

connections. This allows the Customers to consolidate their ISDN estate, removing line rental costs and<br />

providing a more flexible connection that can grow to accept peaks in demand.<br />

Should Customers, or sites, not have a suitable PBX then Logicalis can provide an IP based call<br />

control service as the foundation of the overall UC solution. This provides the option of both hard (IP)<br />

and soft (IP) phones, single number reach for mobile integration, click to dial, voice messaging and other<br />

features such as home working.<br />

This solution is based on Cisco technology and it integrates seamlessly into the PBX interconnection<br />

service which is based on the same platform, allowing a single dial plan to exist across the <strong>PSN</strong> and<br />

migration possibilities across the two service offerings.<br />

Carrier Independent PSTN Access and Mobile Integration<br />

Centralising services in this way allows the Partners to share in infrastructure savings whilst<br />

maintaining their own individual, highly competitive contracts with BT and other carriers.<br />

Logicalis intends to take the same approach to mobile provision whilst allowing the Customers to<br />

maintain their existing direct relationship with their mobile provider.<br />

743


External IP Communication for “Free”<br />

The Logicalis voice service takes advantage of new Cisco technology which allows organisations to<br />

take advantage of the Internet for call routing. This technology is called Intercompany Media Engine<br />

(IME).<br />

IME allows federation over the Internet in terms of voice and video communication without<br />

complex configuration within the network or any intervention by the caller. IME uses a ring topology<br />

with each IME dynamically learning and then maintaining a database of routes. Companies that have a<br />

Cisco voice infrastructure use IME to link into the ring, gaining access to any connected IME member<br />

over the Internet by just dialling their PSTN number.<br />

Internet calling has not been considered as an Enterprise technology in the past due to worries over<br />

voice quality and security. Cisco has overcome these two issues by ensuring that the connection is<br />

continually monitored and should it exceed the specified metrics of delay and jitter, the call is<br />

automatically re-established over the PSTN, without any user intervention or loss of service. Security is<br />

handled too, with anti-spam controls, certificates and encryption coupled with packet inspection and<br />

proxy services. In the future, IME also extends these capabilities to video, simplifying remote face to<br />

face communications with external parties such as non <strong>PSN</strong> connected bodies.<br />

Providing access to the IME ring in this way will reduce the call costs for Customers wishing to make<br />

calls outside of the <strong>PSN</strong> network. The scale of the cost reduction is unknown at this stage, however it is<br />

envisaged that over time, IME technology will be adopted by other vendors into a new standard.<br />

Instant Messaging, Integrated and Federated<br />

744


Instant Messaging (IM) and Presence are becoming common place and are well adopted in the<br />

consumer sector. This adoption has caused many employers to examine IM and presence as a<br />

productivity tool, decreasing the amount of e-mail and increasing interaction between staff members.<br />

The ability to see who, out of a team of possible colleagues, can help you with a simple question and<br />

get an answer straight away is invaluable in increasing productivity and staff satisfaction. Within offices,<br />

where colleagues sit together, this is less important but as services become shared between sites and<br />

potentially other Partners, the frequency of face to face communication with teams or virtual team<br />

members is likely to reduce. Instant Messaging can provide a way to improve interaction, by ensuring<br />

that the person you need is available before contact is initiated and by allowing the addition of voice,<br />

video and file sharing.<br />

Logicalis understands that numerous organisations have already started to see the benefits of<br />

Instant Messaging and so to ensure that users can continue with the interface that they are familiar<br />

with, the IM service for <strong>PSN</strong> supports both federation and integration.<br />

The IM platform uses XMPP, the protocol that is fast becoming a standard across the industry for<br />

Instant Messaging interworking. This means that the solution can federate with existing IM installations<br />

such as OCS within the <strong>PSN</strong> allowing users to keep the interface they already have, removing the need<br />

for additional user training.<br />

As well as federating with existing installations, the service is also federated with external bodies<br />

such as Google and AOL, allowing users to build contacts outside of the <strong>PSN</strong>.<br />

Control is instigated through the Organisational Administration interface, allowing each <strong>PSN</strong><br />

Customer to implement the policy that they require in terms of federation and access to the IM<br />

745


platform. This control can be used to restrict file sharing, desktop sharing, external federation and other<br />

elements between users within the same organisation or between separate organisations.<br />

Contact Centre<br />

Whilst the term Contact Centre can conjure up negative images, the use of the technology in the<br />

right way improves customer satisfaction and service levels. Logicalis has worked with a number of local<br />

authorities on deploying these tools to reduce waiting times and answer simple, repetitive queries<br />

automatically, 24 hours a day, resulting in a better service to their customers.<br />

Logicalis’ Contact Centre solutions provide inbound, outbound and e-mail integration. The solution<br />

uses the call control element of the Logicalis service which could be interconnected to the existing PBX if<br />

required.<br />

Seamless Integration<br />

A modular approach allows <strong>PSN</strong> Customers to make the most of their existing investments whilst<br />

capitalising on Logicalis’ strength as an integrator. By taking elements from both Logicalis’ service<br />

portfolio and the Partners own delivery, Logicalis can provide a solution that is bespoke for the Partner<br />

but based on a common, proven architecture.<br />

UC on the Move<br />

746


The modular units described above are designed to work with mobility in mind, allowing the user to<br />

choose the best location for them to work, whether at home, in the office or somewhere else. For<br />

example, mobile integration allows users to be contacted using a single number with the most<br />

appropriate device (IP phone, POTS phone or mobile) being used to accept the call. Instant Messaging is<br />

also available from home or the mobile device with this extending to desktop video, e-mail and other<br />

services.<br />

Contact Centre Agents can also be based at home to make the most of the local employment base<br />

and to provide seasonal overflow. This type of flexibility allows <strong>PSN</strong> Customers to respond to the needs<br />

of their customers and staff more easily, resulting in service improvements.<br />

Conferencing - Web, Video and Audio<br />

Needing to share information across a distributed team of people is becoming commonplace and is<br />

only set to become more so as services are increasingly shared between a larger group of organisations<br />

within the <strong>PSN</strong>.<br />

To address this need, Logicalis has a range of conferencing solutions powered from our own<br />

Immersive Conferencing <strong>Service</strong> through to on site solutions and externally hosted solutions such as<br />

WebEx. All of these approaches enable <strong>PSN</strong> Customers to conference internally and externally, sharing<br />

documents and presentations with voice and video.<br />

Using these platforms allows integration with the IM service to click to conference capability as well<br />

as Outlook scheduling to ensure ease of use.<br />

747


Video can be integrated as desktop feeds from individual users for ad-hoc and scheduled meetings<br />

and access to the Janet Video Bureau service provided through the <strong>PSN</strong> network.<br />

Internet <strong><strong>Service</strong>s</strong><br />

Logicalis offers a wide range of Internet based <strong><strong>Service</strong>s</strong> via our dual Tier 3 Data Centres, providing<br />

direct Internet connectivity and a range of hosted or ‘as a <strong>Service</strong>’ offerings from low level solutions<br />

such as co-location and hosting, through to storage, email and website services ‘as a <strong>Service</strong>’ via our G-<br />

Cloud solution.<br />

Security <strong><strong>Service</strong>s</strong><br />

Logicalis provides a variety of security solutions delivered either as on-site deployments or' ‘as a<br />

<strong>Service</strong>’ offerings from Logicalis’ G-Cloud platform. Our solutions cover all aspects of the security<br />

spectrum from securing end points with antivirus, to detecting malicious threats with email scanning<br />

and filtering/intrusion and spyware detection, protecting access through authentication/access<br />

management and application access through web and application sign on services. The final aspect is<br />

securing the perimeter through firewalling technologies.<br />

Communication <strong><strong>Service</strong>s</strong><br />

Logicalis has developed eight main service areas which relate to the Communication <strong><strong>Service</strong>s</strong> for our<br />

<strong>PSN</strong> Customers:<br />

748


749<br />

1. Consultancy and Design <strong><strong>Service</strong>s</strong>;<br />

2. Equipment Provision<br />

3. Implementation <strong><strong>Service</strong>s</strong>;<br />

4. Managed <strong><strong>Service</strong>s</strong>.<br />

5. Unmanaged <strong><strong>Service</strong>s</strong>;<br />

6. As a <strong>Service</strong>;<br />

7. Hosted <strong><strong>Service</strong>s</strong>;<br />

8. Break/Fix <strong><strong>Service</strong>s</strong>;<br />

Logicalis is able to provide:<br />

pre-sales support to scope the design effort, equipment lists and estimate the installation<br />

effort – a pro bono piece of work;<br />

production of the detailed design document, covering the physical and logical<br />

Communication design;<br />

a service design to support ongoing service operations;<br />

provision and implementation of Communication <strong><strong>Service</strong>s</strong> equipment<br />

full monitoring and management of the new or existing systems;


750<br />

ongoing support for new or existing equipment;<br />

service management.<br />

Supply of Equipment<br />

As part of the service catalogue, Logicalis provides hardware for Communications solutions which<br />

can be purchased by the Customer via the change control process. Logicalis updates the equipment<br />

pricing on a regular basis. Any additions or deletions from the <strong>Service</strong> Catalogue are managed by the<br />

<strong>Service</strong> Delivery Manager.<br />

Logicalis can procure an extensive range of equipment direct from the vendors and achieve<br />

significant savings, which are passed on to the Customer, based on a fixed margin model.<br />

A brief summary of the extensive range of equipment and services that can be procured and some<br />

basic specifications are as follows:<br />

All traditional and IP based voice services;<br />

voice call packages;<br />

voice minutes;<br />

DDI,<br />

premium rate numbers;<br />

non-geographic numbers;<br />

118 enquiries;<br />

call preference services,<br />

SMS, pager and mobile or fixed line telephone;<br />

messaging services;<br />

real time information services;<br />

desktop messaging;<br />

messaging via email,


Conferencing <strong><strong>Service</strong>s</strong><br />

audio conferencing,<br />

desktop video conferencing and collaboration tools;<br />

web conferencing.<br />

Internet <strong><strong>Service</strong>s</strong><br />

Internet;<br />

email and website services;<br />

co-location and hosting;<br />

on-line storage.<br />

Security <strong><strong>Service</strong>s</strong><br />

751<br />

antivirus;<br />

email scanning and filtering;<br />

firewalls;<br />

intrusion and spyware detection;<br />

authentication and access management;<br />

web and application sign on services.<br />

Section 4 Consultancy and Design <strong><strong>Service</strong>s</strong><br />

Technical Architecture and System Design <strong><strong>Service</strong>s</strong><br />

Logicalis’ approach to Communication design services is that of a Systems Integrator, whereby we<br />

take a vendor agnostic approach. We have the highest partner accreditations with vendors such as Cisco<br />

and can work with a Partner to provide integration capabilities with additional manufacturer<br />

technologies, to utilise existing investments but still work towards a common call handling architecture.<br />

Logicalis intends to engage with the Customer in a consultative manner in understanding the<br />

requirements and then engaging with vendors to ensure that the best technical and commercial solution<br />

is proposed.


Our design consultancy takes into consideration the existing investments to reuse any<br />

infrastructure/equipment wherever possible.<br />

This consultancy is packaged and available, via the <strong>Service</strong> Catalogue, when required by the<br />

Customer.<br />

The deliverables from this Communication consultancy exercise can then be used by the Customer,<br />

or by Logicalis on behalf of the Customer.<br />

As part of the design service, Logicalis works with the Customer to transform an existing contact<br />

centre into an innovative, dynamic customer-driven tool, and create a platform to radically redesign<br />

business processes around the demands of customers.<br />

Logicalis approaches these projects in a consultative manner to understand the business and<br />

technical drivers. Once we have a clear understanding of requirements our Solutions Architects team<br />

works alongside the main manufacturers in the industry to design the solution.<br />

Our design process includes pre-sales customer workshops, technical solution proposal to ensure<br />

that the correct solution is specified and post-sales design workshops.<br />

Logicalis is able to design Communication Solutions that range from a handful of users through to<br />

many hundreds.<br />

Installation – Communication Implementation <strong><strong>Service</strong>s</strong><br />

Logicalis’ Implementation <strong><strong>Service</strong>s</strong>’ primary focus is to deliver technical services for projects<br />

including implementation and support to our customer base. This is achieved primarily by working in<br />

752


close collaboration with Logicalis’ Pre Sales, Project Management and Managed <strong>Service</strong> teams. The<br />

Implementation <strong>Service</strong> is available on a 24 x 7 basis and comprises:<br />

Engineering Team<br />

This is a home based, mobile engineering workforce located all over mainland Britain, providing the<br />

bulk of the Logicalis SLA responses for all on-site maintenance contracts and managed service support<br />

issues. These issues range in diversity from the swapping of hardware, to further information gathering<br />

& diagnostics, problem simulation, command line configuration, firmware & software upgrades and the<br />

testing of spares prior to use in the field.<br />

Supporting the home based force, is a team of office based engineers providing the interface<br />

between our <strong>Service</strong> Desk and the wider Field Support Team. This Technical Support Group delivers their<br />

services remotely, direct to our customers. While a high percentage of incidents are resolved by this<br />

team, their role also encompasses the gathering of additional technical data to allow further<br />

investigation by their field based colleagues if required.<br />

The hands-on skills in both teams are available across varied technology solutions, including routing,<br />

switching, unified communications, Communications, security, wireless and content. This portfolio<br />

combines hardware and software elements spanning multiple vendors, delivered to a diverse range of<br />

customer environments.<br />

A key factor in successful service delivery is the use of engineers local to their customer base. While<br />

clearly SLA compliance is important, equally so is the longer term relationship between the local<br />

engineer(s) and their customers. Part of the objective setting with each engineer, includes the<br />

establishment & maintenance of the customer relationship. This directly caters for improved customer<br />

753


knowledge and greater SLA management, as well as providing wider benefits which include better<br />

defined local spares holdings etc.<br />

While the focus for the Field Support Team is clearly for the benefit of our customers with existing<br />

maintenance contracts, they are also active in delivering other services. These services include but are<br />

not limited to, projects & implementations, maintenance take on audits, surveys/audits and any<br />

associated documentation.<br />

Solution Implementation Team<br />

The Solutions Implementation Team is a 24 x 7 service, entirely made up of home based engineers<br />

throughout mainland Britain. Their roles are focussed around the delivery of customer project &<br />

implementation based requirements, which incorporates a number of related, specific activities to<br />

guarantee success.<br />

This typically starts with a review of the documentation supplied by Pre Sales (SOW or SDD) and<br />

Project Management (Project Plan), to understand the solution and timeframes. This is carried out by a<br />

‘Lead Engineer’, who has the responsibility for leading the project from a post sales perspective. Next<br />

follows the building and configuration of any hardware & software elements in one of the Logicalis Pre<br />

Staging Labs, where any design constraints or issues can be resolved in a risk free environment. Only<br />

then is the equipment boxed up and sent out to customer site for installation.<br />

Once on-site, the kit is installed and a full connectivity, commissioning and acceptance procedure is<br />

conducted. The Lead Engineer completes any documentation requirements for the customer, as well as<br />

providing further information for Logicalis’ Contracts Admin and Field Support Team (if the installed<br />

solution is being supported by Logicalis).<br />

754


The hands on skills of this team are available across a variety of technology solutions, including<br />

routing, switching, unified communications, Communication, security, wireless and content. This<br />

portfolio combines hardware and software elements spanning multiple vendors, delivered to a diverse<br />

range of customer environments.<br />

While the focus of this team is delivering project based work, they are also active in delivering many<br />

other technical services. These services include maintenance contract break/fix, information gathering<br />

and diagnostics, problem simulation, pilot/proof of concept testing, surveys/audits customer knowledge<br />

transfer etc.<br />

Principal Engineering Team<br />

The Principal Engineering Team is a 24 x 7 service, entirely made up of home based engineers<br />

throughout mainland Britain. Their roles are entirely focussed around the service delivery of the most<br />

complex technical solutions required from the Post Sales Engineering Team.<br />

This role effectively offers direct ‘expert level’ technical support to both the Solutions<br />

Implementation and Field Support teams. Typically this means the lead of the most challenging<br />

customer project solutions, as well as the technical escalation ownership for the most complex<br />

contracted maintenance customer incidents. The various work streams required to deliver the role<br />

include working with Pre Sales to produce detailed design & configuration data, proof of concept<br />

testing, providing best practise configuration advice and templates, mentoring across all technology<br />

areas to all of the other teams etc.<br />

In addition, the Principal Engineering Team is able to carry out all of the activities described within<br />

the remit of the Field Support and Solution Implementation Teams. The highest levels of technical<br />

755


vendor accreditation reside within this team, and as such this technical relationship is a key focus for<br />

them all. This is particularly evident from managing the bulk of our vendor support escalations, but is<br />

also visible in the various vendor technology forums and update sessions.<br />

Project Management<br />

Project Management - Overview<br />

Logicalis provides the full range of skills essential to assure effective Programme and Portfolio<br />

Management. Logicalis’ Programme and Project Managers have many years of experience of working<br />

within <strong>Government</strong> programmes across a wide variety of sectors.<br />

Programmes and Projects range from major infrastructure change programmes to software<br />

development and systems implementation with budgets ranging from several thousand to multi-million<br />

pounds. Our portfolio of core programme and project management services includes:<br />

756<br />

Benefits Management;<br />

Programme Management;<br />

Project Management;<br />

Project Review & Lessons Learned;<br />

Risk Management;<br />

Stakeholder Management.


Benefits Management<br />

Benefits management aims to ensure that the desired project has been clearly defined, is<br />

measurable, and provides a case for investment. Furthermore it seeks to make sure that the proposed<br />

changes or policy outcomes are actually achieved.<br />

The benefits management team recognises that projects require a constant focus on the intended<br />

benefits if they are to deliver value and remain aligned with the Customer’s business goals.<br />

The delivery of value begins with defining the expected high-level outcomes and continues through<br />

the identification, profiling, tracking and embedding of the identified benefits. It also involves assessing<br />

risk against the proposed outcome.<br />

The benefits management team is experienced in the delivery of benefits management in the secure<br />

information domain.<br />

Logicalis help to identify, track and realise benefits, throughout the delivery programme and into the<br />

Operations phase, where we can also assist managers with the responsibility for service delivery to<br />

ensure that the planned benefits are both monitored and optimised.<br />

Programme Management<br />

Logicalis considers its programme managers to be holistic change agents. We believe that the role of<br />

a programme manager has evolved from that of managing multiple projects, to that of implementing<br />

business strategy. Whilst the programme manager of today requires a refined set of business and<br />

leadership skills that are vastly different from that of a project manager, we believe that an effective<br />

757


programme manager requires a sound understanding of project management and all its varied<br />

techniques.<br />

Logicalis’ programme managers are familiar with the culture of large Public Sector organisations and<br />

the measurement of benefits at a strategic level. We currently service an integrated portfolio of Secure<br />

Information projects, involving the management of multiple teams of professionals, as well as executive-<br />

level stakeholders.<br />

Project Management<br />

Logicalis’ project managers manage and support all phases of the project lifecycle where<br />

experienced and effective security cleared PMI and PRINCE 2 qualified practitioners are needed to:<br />

758<br />

project manage a major change;<br />

enhance and strengthen your current team;<br />

provide an exclusive set of security cleared skills or experience on a transitory basis;<br />

execute or accelerate a specific standard or bespoke service implementation;<br />

build up a new business, division or team;<br />

coach your current project managers and their teams.<br />

Logicalis’ approach to project management is experience based; we believe that most business<br />

challenges can be solved effectively with the application of the right management talent, expertise and<br />

action.<br />

Project Review and Lessons Learnt


The objective of a project review is to identify how success can be assured. A Logicalis led project<br />

review ascertains the issues that need to be addressed, both positive and negative. Our project review<br />

and lessons learned service typically focuses on:<br />

• Scope<br />

759<br />

Whilst major scope changes are relatively easy to identify and manage, scope changes often<br />

occur in the form of "scope creep". Scope creep is the amalgamation of small changes that,<br />

individually, appear minor but in aggregate are significant. Logicalis understands that you cannot<br />

effectively manage the resources, time and cost of a project unless you actively manage every<br />

element of the project scope.<br />

• Project Team<br />

A successful project manager must effectively manage all of the resources assigned to that<br />

project. This also includes managing all relevant subcontracts.<br />

• Project Planning & Control<br />

Logicalis excels at detailed project planning to assure full visibility and control of<br />

multifaceted, high value projects. Our specialist knowledge assures the review of, and warrants<br />

the production of accurate, practical and informed schedules and plans whilst ensuring they are<br />

rigorously executed and monitored.<br />

• Communication


760<br />

It is crucial that effective communication exists between the team members and project<br />

stakeholders. Logicalis assesses if these channels are effective and highlights where and how<br />

improvements can be made.<br />

Risk Management<br />

Logicalis’ risk management practitioners are expert in the design and implementation of risk<br />

management techniques. We help organisations to understand their business and security risks and<br />

then apply practical risk management practices to help mitigate them. Our risk practitioners are highly<br />

experienced leaders in the discipline of client-side risk assessment; most especially security vulnerability.<br />

Our Risk Practitioners help your business to:<br />

understand and manage operational risk;<br />

achieve compliant corporate governance;<br />

display effective management of risk to stakeholders;<br />

make practical decisions and maximise ROI;<br />

deliver projects to agreed criteria.<br />

Stakeholder Management<br />

Logicalis recognises stakeholder management as the process by which Clients identify their key<br />

stakeholders and win their support.


Whilst the value of relationships is difficult to determine, it is recognised that successful stakeholder<br />

management is a key source of competitive advantage. Understanding, forecasting and influencing what<br />

other people think about your programme or project is essential to a winning venture. We believe that<br />

the secret to this success is not just about leading the team, but also about dealing with the multitude of<br />

issues and communicating successfully around the periphery of the programme.<br />

Logicalis knows that it is crucial to recognise the key points at which stakeholders must be involved<br />

in development and decision making. It is further recognised that streamlining the approval process<br />

results in cost savings across the programme. Our team of business consultants has comprehensive<br />

experience in this diverse field.<br />

Project Management <strong>Service</strong> Offerings<br />

Project management services are offered either on a T&M or fixed price basis. The number of days<br />

required is estimated, based on the size and complexity of the project. Any special customer<br />

requirements (for example mandatory on-site attendance at weekly meetings) will also influence the PM<br />

estimate. It is therefore important that this is discussed with the customer prior to any quotation being<br />

prepared.<br />

The project management team is split in to three regional teams and has a supporting project<br />

management office (PMO) function. Team leaders have dual roles to include senior project and<br />

programme management as well as a managerial role for the PMs in their team:<br />

Overall the team supports 20 Project Managers and Project Coordinators.<br />

The following table identifies the various categories of PM offerings that are available and<br />

summarises for each offering the elements that are delivered as part of the service.<br />

761


of PM<br />

Deliverable<br />

purchased<br />

Project<br />

Initiation<br />

Resource<br />

Allocation<br />

Process<br />

Process<br />

Project Risk<br />

Project Log<br />

(throughout<br />

project)<br />

Project<br />

Definition<br />

Email/phon<br />

e as point of<br />

762<br />

Project<br />

Coordination<br />

PM<br />

2-4 days<br />

PM<br />

5-10<br />

days<br />

PM<br />

11-20<br />

days<br />

PM<br />

20+ days


contact<br />

Project<br />

Initiation<br />

Meetings by<br />

conf call<br />

Project<br />

Initiation<br />

Meetings on<br />

Customer site<br />

PID –<br />

Project<br />

Initiation<br />

Document<br />

Plan<br />

MS Project<br />

Project<br />

Execution<br />

On-Site<br />

763


Project Review<br />

Meeting x1<br />

On-Site<br />

Project Review<br />

Meetings -<br />

Multiple<br />

Meetings by<br />

Audio or Video<br />

Conference<br />

Status<br />

Reports<br />

Risk<br />

Management<br />

Issue<br />

Resolution<br />

Project<br />

Review of<br />

documentation<br />

764


Project<br />

Change Control<br />

Process<br />

Arrange<br />

Equipment<br />

Delivery<br />

Handover to<br />

Support &<br />

Customer<br />

Manageme<br />

nt of Sub<br />

contractors<br />

Arrangemen<br />

t of Customer<br />

Training<br />

Invoicing,<br />

Stage Payments,<br />

etc<br />

765


Closure<br />

Project<br />

Completion<br />

of works email<br />

Final<br />

Invoicing<br />

Review of<br />

Issue Log<br />

Project<br />

Closure Meeting<br />

Programme/Project Management <strong><strong>Service</strong>s</strong><br />

<strong>Service</strong>ID: <strong>PSN</strong> 4040 Programme/Project Management <strong>Service</strong><br />

<strong>Service</strong> Specification<br />

<strong>Service</strong> Overview<br />

766<br />

When a Project Manager (PM) is assigned he or


767<br />

she will be PRINCE2 accredited and knowledgeable in<br />

delivering projects of a similar nature.<br />

The PM divides the Project into discrete stages,<br />

ensuring that agreement is reached at each stage with<br />

the Customer which assists in the understanding of<br />

project deliverables and confirming expectations are<br />

matched throughout the project.<br />

Interfaces Account Manager, <strong>Service</strong> Delivery Manager and<br />

Lead Solutions Consultant.<br />

Dependencies A Scope of Works is required to identify and<br />

define an agreed requirement.<br />

Lifespan Contract term.<br />

Minimum Term Fixed project management program, as per the<br />

Compliance<br />

Subcontractor No<br />

scope of works.<br />

<strong><strong>Service</strong>s</strong> will be compliant to the sector specific<br />

requirements as identified within the <strong>PSN</strong> Standards.<br />

Overall compliance to CoCo where applicable.<br />

Termination Logicalis will provide clear information as to


Payments and Notice termination notice and costs including where any<br />

<strong>Service</strong> levels<br />

768<br />

termination points are within the ordered service<br />

term.<br />

As per the contract for Professional <strong><strong>Service</strong>s</strong>.<br />

Response time for<br />

confirmation of resource<br />

availability<br />

2 working days<br />

Initial Audit Meeting Within 10 working days (3 days for small<br />

Deliverables<br />

requirement)<br />

Project Management Package 2 – 4 days<br />

The Project Office is responsible for managing<br />

short term engagements. It is likely that a junior<br />

Project Manager will be assigned to these activities. It<br />

is also possible that the project management duties<br />

will be allocated to the lead consultant or engineer. It<br />

is unlikely that Project Managers will be engaged for<br />

less than 2 days on any project.<br />

Deliverables:<br />

Ensuring resource allocated and booked


769<br />

correctly;<br />

Manage equipment deliveries;<br />

Liaise deliveries and installation with customer;<br />

Assessing and reporting progress;<br />

Issue escalation & resolution;<br />

Change Management;<br />

Managing subcontractors, training, invoicing,<br />

etc.<br />

Project Management Package 5 to 10 days<br />

Within the agreed 5 to 10 days project<br />

management package, Logicalis provides a Project<br />

Manager to coordinate and facilitate the timely and<br />

successful delivery of the project. Generally meetings<br />

are performed by audio or video conference although<br />

for significant meetings such as the kick-off, the<br />

project manager travels to the customer site.<br />

Deliverables:<br />

Primary point of contact for service delivery;<br />

Attend initial kickoff/planning meeting;<br />

Produce minutes from the planning meeting;<br />

High level risk management and issue<br />

resolution;<br />

Produce and agree high level milestone plan;<br />

Carry out mid project review & produce


770<br />

minutes;<br />

Provide formal project closure and agree follow<br />

on actions;<br />

Attending ad-hoc conference calls;<br />

Project planning with MS Project;<br />

Resource planning;<br />

Assessing progress;<br />

Issue escalation & resolution;<br />

Change Management;<br />

Managing subcontractors, training, invoicing,<br />

etc.<br />

Project Management Package 11 to 20 days<br />

Logicalis provides a project manager to coordinate<br />

and facilitate the timely and successful delivery of the<br />

project. Generally meetings are performed by audio<br />

or video conference although for significant meetings<br />

such as the kick-off, the project manager travels to<br />

the customer site.<br />

Deliverables:<br />

Primary point of contact for service delivery;<br />

Attend planning meeting;<br />

Produce minutes from the planning meeting;<br />

Risk management and issue resolution;


771<br />

Produce an agreed high level milestone plan;<br />

Produce a project initiation document;<br />

Produce and maintain the project log;<br />

Produce highlight reports at agreed intervals;<br />

Attend mid project reviews & produce minutes;<br />

Provide formal project closure and agree follow<br />

on actions.<br />

Attending conference calls;<br />

Resource planning;<br />

Assessing progress;<br />

Issue escalation & resolution;<br />

Change Management;<br />

Managing subcontractors, training, invoicing,<br />

etc.<br />

Project Management Package >20 days<br />

Projects with >20 days of project management<br />

time are medium and large projects usually requiring<br />

a bespoke service suited to the requirements of the<br />

customer and project. In order to scope out the<br />

project management effort in these types of project it<br />

is important to understand the customer’s<br />

requirements. For example frequency of on-site<br />

attendance, specific reporting requirements,<br />

management of customer/3 rd party personnel, etc.


<strong>Service</strong> Credits<br />

772<br />

The Project Initiation Document, produced by the<br />

Project Manager in the early stages of the project,<br />

defines the scope of the project management<br />

activities as well as the project itself.<br />

<strong>Service</strong> Credit Regime Not applicable fixed project management.<br />

<strong>Service</strong> Management<br />

Included Resources<br />

Project Management<br />

Account Management<br />

Commercial Quote team<br />

Security provisions <strong><strong>Service</strong>s</strong> will be compliant to the sector specific<br />

Pricing<br />

requirements. Minimum compliance will be <strong>PSN</strong><br />

design standard.<br />

Charging Model As per <strong>Service</strong> Catalogue<br />

Price Model As per <strong>Service</strong> Catalogue<br />

Ordering Procedures Ordering will be via the Customer Portal.


<strong>Service</strong> commitment<br />

Logicalis will provide the following<br />

Delivery lead time 5 Days from the point of order<br />

Delivery lead time<br />

exceptions<br />

773<br />

Failure of the Partner Organisation to accept the<br />

first three start dates offered.<br />

Changes to order As per the contract.<br />

Customer obligations<br />

Ordering<br />

Transition<br />

Transition<br />

Methodology<br />

The <strong>PSN</strong> Agreement Number under which the<br />

Order is being placed;<br />

The Site where the services are required (full<br />

postal address or addresses);<br />

On site contact (including email address and<br />

phone number) and Authorised Officer.<br />

As per ISO standards<br />

Compliance <strong><strong>Service</strong>s</strong> will be compliant to the sector specific<br />

requirements as identified within the <strong>PSN</strong> LAN


Subcontractor No<br />

<strong>Service</strong> Management<br />

774<br />

Standard. Minimum compliance will be to technical<br />

compliance to CoCo.<br />

At Logicalis we deliver service design through to out-tasked/outsourced service operations against<br />

the ISO 20000 standard.<br />

Our accredited portfolio of core functions includes:<br />

<strong>Service</strong> Design<br />

<strong>Service</strong> Architecture


Logicalis service architects work with our customers to gain a complete understanding of their<br />

requirement. They define the technical aspects of the service and produce the blueprint solution;<br />

explaining the different support strategies we can offer and their viability with respect to the customer’s<br />

business needs.<br />

Logicalis designed solutions are underpinned by robust service models that support the client’s<br />

business processes. This approach both informs stakeholders and assists maintainers, by assuring a fully<br />

managed programme for all service functions, throughout the life of the contract.<br />

The service architect manages the service design team to ensure that the service we provide meets<br />

the customer’s current and future requirements.<br />

<strong>Service</strong> Design<br />

The service design team takes the preliminary service scope and works closely with the customer to<br />

tailor the in-service support procedures such that they are aligned with their service requirement.<br />

<strong>Service</strong> Design is delivered through the following functions:<br />

Solution Design<br />

The team expands on the service architect’s output to produce a high-level technical solution.<br />

Process Design<br />

The team designs the in-service support procedures that are specific to the customer’s service<br />

requirement.<br />

Measurement Systems, Methods and Metrics Design<br />

775


The team defines the service reporting process by agreeing what data is to be captured, how that<br />

data is to be captured, and how that data is presented. The data is used to underpin the continual<br />

service improvement activity that is delivered throughout our partnership with the customer.<br />

Management Systems Design<br />

At the system design stage, our team ensures that the service management systems, tools and<br />

human resources are in place. The team works closely with our service managers to refine the<br />

customer’s requirements. This ensures that, as the service evolves to meet changing business needs, the<br />

support we offer is always comprehensive.<br />

Integrated Logistics Support (ILS)<br />

ILS analysts take the service model, processes and technical architecture and then plan availability,<br />

reliability and maintainability so as to capture the complete service envelope.<br />

<strong>Service</strong> Transition<br />

<strong>Service</strong> Transition Management<br />

Logicalis <strong>Service</strong> Transition Managers manage the overall service integration (transition from design<br />

to operations). The transition manager interfaces directly with the customer to ensure project risks,<br />

issues and escalations are managed in alignment.<br />

Logicalis understands the challenges and risks facing organisations as they implement complex<br />

service solutions. Our expertise enables us to support both the full and partial integration of <strong>Service</strong><br />

capability.<br />

776


<strong>Service</strong> Transition is delivered through the following processes:<br />

Transition Support Plan Development<br />

We produce a plan and schedule detailing the resources that are used to ensure the smooth<br />

transition from service design to live operations.<br />

Organisation & <strong>Service</strong> Change Coordination<br />

Customer and Logicalis resources, identified in the service transition plan, are put in place to provide<br />

support for the service in live operation.<br />

Testing and Delivering the <strong>Service</strong><br />

Final checks and configuration are rigorously performed to ensure smooth transition into live<br />

operation.<br />

Logicalis is committed to providing a service transition phase that is consistent, controlled, and<br />

creates minimum disturbance to day-to-day operations. We assure this control through the use of our<br />

service introduction approach which ensures that:<br />

777<br />

All processes, descriptions and work instructions required to support the service are considered;<br />

Particular attention is paid to both environment and domain when defining support processes<br />

that are fit for purpose across the totality of the customer’s operational envelope;<br />

<strong><strong>Service</strong>s</strong> are flowed into the live environment following a structured approach, delivered against a<br />

tailored project management background.


<strong>Service</strong> Management <strong><strong>Service</strong>s</strong><br />

778<br />

<strong>Service</strong>ID: <strong>PSN</strong> 4041 <strong>Service</strong> Management <strong><strong>Service</strong>s</strong><br />

<strong>Service</strong> Specification<br />

<strong>Service</strong> Overview<br />

Logicalis service architects work with our<br />

customers to gain a complete understanding of<br />

their requirement. They define the technical<br />

aspects of the service and produce the blueprint<br />

solution; explaining the different support<br />

strategies we can offer and their viability with<br />

respect to the customer’s business need.<br />

The service architect manages the service<br />

design team to ensure that the service meets the<br />

customer’s current and future requirements.<br />

Interfaces Account Manager, <strong>Service</strong> Delivery<br />

Manager, Lead Solutions Consultant, Project<br />

Manager.<br />

Dependencies ‘Scope of Works’ is required which identifies<br />

<strong>Service</strong><br />

thresholds/capacities<br />

and defines the agreed requirement.<br />

<strong><strong>Service</strong>s</strong> are delivered based on fixed<br />

consultancy program.


779<br />

Lifespan Contract life.<br />

Minimum Term Fixed service management program, as per<br />

Compliance<br />

the scope of works.<br />

<strong><strong>Service</strong>s</strong> will be compliant to the sector<br />

specific requirements as identified within the <strong>PSN</strong><br />

Standards.<br />

Overall compliance to CoCo where<br />

applicable.<br />

Subcontractor No<br />

<strong>Service</strong> term As agreed<br />

Termination<br />

Payments and Notice<br />

<strong>Service</strong> levels<br />

As per the contract for Professional <strong><strong>Service</strong>s</strong>.<br />

Response time for<br />

confirmation of resource<br />

availability<br />

Logicalis will provide details with Order.<br />

2 working days<br />

Initial Audit Meeting Within 10 working days (3 days for small


780<br />

Deliverables<br />

requirement)<br />

Logicalis service architects work with our<br />

customers to gain a complete understanding of<br />

their capability requirement. The deliverables<br />

are the following high level headlines which are<br />

agreed with the scope of works.<br />

<strong>Service</strong> Design:<br />

<strong>Service</strong> Architecture;<br />

<strong>Service</strong> Design;<br />

Solution Design;<br />

Processes Design;<br />

Measurement Systems, Methods and<br />

Metrics Design;<br />

Management Systems Design;<br />

Integrated Logistics Support (ILS).<br />

<strong>Service</strong> Transition<br />

<strong>Service</strong> Transition Management;<br />

Transition Support Plan Development;<br />

Organisation & <strong>Service</strong> Change<br />

Coordination;<br />

Testing and Delivering the <strong>Service</strong>;<br />

Training.<br />

Change Managed through change control process.<br />

<strong>Service</strong> Credits<br />

<strong>Service</strong> Credit Regime Not applicable.


781<br />

<strong>Service</strong> Management<br />

Included Resources<br />

Security provisions<br />

Pricing<br />

Resources included:<br />

<strong>Service</strong> Management<br />

Transition Management<br />

Account Management<br />

Commercial Quote team<br />

<strong><strong>Service</strong>s</strong> will be compliant to the sector<br />

specific requirements. Minimum compliance will<br />

be <strong>PSN</strong> design standard.<br />

Charging Model As per <strong>Service</strong> Catalogue<br />

Price Model As per <strong>Service</strong> Catalogue<br />

Ordering Procedures Ordering will be via the Customer<br />

Portal.<br />

Contractor’s <strong>Service</strong> commitment<br />

Logicalis will provide the following


782<br />

Delivery lead time As agreed on order<br />

Changes to order As per the contract.<br />

Customer obligations<br />

Ordering<br />

Via the customer portal and the service desk.<br />

Logicalis will define the minimum required<br />

information for the Order to be made including:<br />

The <strong>PSN</strong> Agreement Number under which<br />

this Order is being placed<br />

The Site where the services are required (full<br />

postal address or addresses)<br />

On site contact (including email address and<br />

phone number) and Authorised Officer<br />

Testing As per the agreed scope of works.<br />

Transition<br />

Transition<br />

Methodology<br />

As per ISO standards<br />

Compliance <strong><strong>Service</strong>s</strong> will be compliant to the sector<br />

specific requirements as identified within the <strong>PSN</strong>


783<br />

Subcontractor No<br />

Section 5 Training<br />

LAN Standard. Minimum compliance will be to<br />

technical compliance to CoCo.<br />

Logicalis has proven experience in the provision of user and maintainer systems training.<br />

We are able to tailor our training offering to meet the customer’s support requirements, throughout<br />

the life of the <strong>Service</strong>.<br />

We offer a diverse range of innovative training solutions that includes bespoke solutions and<br />

freestanding courseware design and delivery.<br />

Section 6 Communication Infrastructure Provision<br />

Logicalis provide Communications Infrastructures which include both Traditional and IP based voice<br />

solutions as on-site provisions. These solutions are designed for Customers, to their specific user<br />

requirements and can include;<br />

Traditional and IP based Solutions providing:<br />

voice call packages;<br />

voice minutes;<br />

DDI,<br />

premium rate numbers;<br />

non-geographic numbers;


784<br />

118 enquiries;<br />

call preference services,<br />

SMS, pager and mobile or fixed line telephone;<br />

messaging services;<br />

real time information services;<br />

desktop messaging;<br />

messaging via email,<br />

Conferencing <strong><strong>Service</strong>s</strong>:<br />

audio conferencing,<br />

desktop video conferencing and collaboration tools;<br />

web conferencing;<br />

Internet <strong><strong>Service</strong>s</strong>:<br />

Internet;<br />

email and website services:<br />

co-location and hosting;<br />

on-line storage;<br />

Security <strong><strong>Service</strong>s</strong>:<br />

antivirus;<br />

email scanning and filtering;<br />

firewalls;<br />

intrusion and spyware detection;<br />

authentication and access management;<br />

web and application sign on services.<br />

Communications at 3-3-x<br />

LAN Provision


For IP based Communications, the underlying LAN service functionality for 3-3-x networks is the<br />

same as for 2-2-x.<br />

The 2-2-x and 3-3-x networks on a site do not share the same active equipment and are provided<br />

with physically separate LAN infrastructure. Although it is technically possible to share equipment, any<br />

cost savings gained by so doing are more than offset by the additional management complication and<br />

security risk in doing so.<br />

The 3-3-x network uses copper cabling for access to users, although faceplates are labelled, and<br />

patch cables colour coded to avoid incorrect connection of end equipment. If an incorrect device were<br />

connected, connection into the network itself can be blocked by user authentication if the customer<br />

selects this option. Fibre optic cabling is used between all equipment locations and between buildings.<br />

Where a fibre run between buildings is not protected i.e. it can be accessed externally or leaves an<br />

area where IL3 traffic can be contained, encryption is provided to maintain confidentiality of the data<br />

path.<br />

A resilient network time source will be provided for the 3-3-x layer.<br />

It is assumed that this is outside the scope of this Lot; however advice can be provided where<br />

required.<br />

Communications at 4-4-x<br />

Logicalis does not propose to provision <strong><strong>Service</strong>s</strong> at this Level.<br />

785


How the relevant Impact Levels are to be achieved and the services accredited<br />

Logicalis’ approach to meeting the needs of any client is based on a sound technology solution. The<br />

full definition of this solution has to be both practical and cost effective.<br />

This can only be achieved through the employment of skilled CLAS consultants to advise Logicalis on<br />

the design and through working with the Accreditor to understand the risk profile and appetite within<br />

the customer to accept and manage risk through non-technical mechanisms. Logicalis uses the retained<br />

services of a third party CLAS consultant. This brings outside expertise with exposure to a range of<br />

options to bear, and balancing the pressures with their wider credibility in the closed world of CLAS<br />

consultants, ensures the solution is done in the correct manner for both the customer and the supplier.<br />

The process to achieve the relevant impact levels is a standard approach:<br />

Design with a security standpoint in mind;<br />

Use products with appropriate accreditation where-ever possible;<br />

Consider all aspects around secure design;<br />

Undertake an IS1 risk assessment;<br />

Construct the RMADS;<br />

Agree with the Accreditor the components of the security solution that require mitigating<br />

action or some form of waiver;<br />

Submit for accreditation;<br />

Annual review of RMADS with Accreditor.<br />

At each stage the Accreditor will be engaged to offer advice as early in the design exercise as<br />

possible.<br />

Section 6 Communication Infrastructure Provision<br />

786


Logicalis provide Communications Infrastructures which include both Traditional and IP based voice<br />

solutions as on-site provisions. These solutions are designed for Customers, to their specific user<br />

requirements and can include;<br />

Traditional and IP based Solutions providing:<br />

787<br />

voice call packages;<br />

voice minutes;<br />

DDI,<br />

premium rate numbers;<br />

non-geographic numbers;<br />

118 enquiries;<br />

call preference services,<br />

SMS, pager and mobile or fixed line telephone;<br />

messaging services;<br />

real time information services;<br />

desktop messaging;<br />

messaging via email,


Conferencing <strong><strong>Service</strong>s</strong><br />

Internet <strong><strong>Service</strong>s</strong><br />

788<br />

audio conferencing,<br />

desktop video conferencing and collaboration tools;<br />

web conferencing;<br />

Internet;<br />

Security <strong><strong>Service</strong>s</strong>;<br />

email and website services;<br />

co-location and hosting;<br />

on-line storage;<br />

antivirus;<br />

email scanning and filtering;<br />

firewalls;<br />

intrusion and spyware detection;


789<br />

authentication and access management;<br />

web and application sign on services;<br />

Communications at 3-3-x<br />

LAN Provision<br />

For IP based Communications, the underlying LAN service functionality for 3-3-x networks is the<br />

same as for 2-2-x.<br />

The 2-2-x and 3-3-x networks on a site do not share the same active equipment and are provided<br />

with physically separate LAN infrastructure. Although it is technically possible to share equipment, any<br />

cost savings gained by so doing are more than offset by the additional management complication and<br />

security risk in doing so.<br />

The 3-3-x network uses copper cabling for access to users, although faceplates are labelled, and<br />

patch cables colour coded to avoid incorrect connection of end equipment. If an incorrect device were<br />

connected, connection into the network itself can be blocked by user authentication if the customer<br />

selects this option. Fibre optic cabling is used between all equipment locations and between buildings.<br />

Where a fibre run between buildings is not protected i.e. it can be accessed externally or leaves an<br />

area where IL3 traffic can be contained, encryption is provided to maintain confidentiality of the data<br />

path.<br />

A resilient network time source will be provided for the 3-3-x layer.


It is assumed that this is outside the scope of this Lot; however advice can be provided where<br />

required.<br />

Communications at 4-4-x<br />

Logicalis does not propose to provision <strong><strong>Service</strong>s</strong> at this Level.<br />

How the relevant Impact Levels are to be achieved and the services accredited<br />

Logicalis’ approach to meeting the needs of any client is based on a sound technology solution. The<br />

full definition of this solution has to be both practical and cost effective.<br />

This can only be achieved through the employment of skilled CLAS consultants to advise Logicalis on<br />

the design and through working with the Accreditor to understand the risk profile and appetite within<br />

the customer to accept and manage risk through non-technical mechanisms. Logicalis uses the retained<br />

services of a third party CLAS consultant. This brings outside expertise with exposure to a range of<br />

options to bear, and balancing the pressures with their wider credibility in the closed world of CLAS<br />

consultants, ensures the solution is done in the correct manner for both the customer and the supplier.<br />

The process to achieve the relevant impact levels is a standard approach:<br />

790<br />

Design with a security standpoint in mind;<br />

Use products with appropriate accreditation where-ever possible;<br />

Consider all aspects around secure design;


791<br />

Undertake an IS1 risk assessment;<br />

Construct the RMADS;<br />

Agree with the Accreditor the components of the security solution that require mitigating<br />

action or some form of waiver;<br />

Submit for accreditation;<br />

Annual review of RMADS with Accreditor.<br />

At each stage the Accreditor will be engaged to offer advice as early in the design exercise as<br />

possible.<br />

Section 7 Hosted Communications<br />

Logicalis can provide Communications Infrastructures, either as an on-site, hosted or ‘as a <strong>Service</strong>’<br />

delivering a highly secure, available, virtual, and sophisticated customer interaction management<br />

solution.<br />

IP based voice services;<br />

voice call packages;<br />

voice minutes;<br />

DDI,<br />

premium rate numbers;


792<br />

non-geographic numbers;<br />

118 enquiries;<br />

call preference services,<br />

SMS, pager and mobile or fixed line telephone;<br />

messaging services;<br />

real time information services;<br />

desktop messaging;<br />

messaging via email.<br />

Conferencing <strong><strong>Service</strong>s</strong>;<br />

Internet <strong><strong>Service</strong>s</strong><br />

audio conferencing,<br />

desktop video conferencing and collaboration tools;<br />

web conferencing;<br />

Internet;


Security <strong><strong>Service</strong>s</strong>;<br />

793<br />

email and website services;<br />

co-location and hosting;<br />

on-line storage;<br />

antivirus;<br />

email scanning and filtering;<br />

firewalls;<br />

intrusion and spyware detection;<br />

authentication and access management;<br />

web and application sign on services;<br />

Hosted Communications<br />

Logicalis provides hosting services in accordance with the following:<br />

Logicalis will:<br />

Provide the Hosting <strong><strong>Service</strong>s</strong> 24 hours per day every day of the week;


794<br />

Provide the Support <strong><strong>Service</strong>s</strong> during Normal Working Hours;<br />

Provide the Remote Hands <strong><strong>Service</strong>s</strong> [during Normal Working Hours] [24 hours per day every<br />

day of the week];<br />

Use all reasonable endeavours to maintain the temperature within the Customer Designated<br />

Area within the parameters described in Hosting <strong><strong>Service</strong>s</strong> and <strong>Service</strong> Details;<br />

Provide the Remote Hands <strong>Service</strong>.<br />

The Customer is entitled to locate and use the hosting equipment in the customer designated area<br />

subject to and upon the terms of the final Agreement.<br />

The Customer is entitled to allow Users to have access to the customer designated area and the<br />

Logicalis Data Centre or to use the hosting services, subject to having obtained Logicalis’ prior written<br />

consent, following the Permit to Work Procedure and completing the Permit to Work Form.<br />

Logicalis will permit the Customer upon giving reasonable notice:<br />

to enter the Logicalis Data Centre during Normal Working Hours for the purpose of<br />

inspecting the Hosting Equipment and allowing the Customer’s potential clients to inspect the<br />

facilities provided by the Contractor; and<br />

to enter the Logicalis Data Centre at all times, 24 hours a day 7 days a week, for the<br />

purpose of carrying out any necessary services, maintenance and/or repair to the Hosting<br />

Equipment. In cases where emergency maintenance and/or repair work is necessary, the<br />

Customer will give Logicalis a minimum of one hours notice.


Customer Obligations<br />

The hosting equipment and additional hosting equipment will be at the customer’s risk at all times<br />

and the customer will be responsible for insuring the hosting equipment and any additional hosting<br />

equipment against all risks. The Customer will, in addition to the Charges, be responsible for all costs<br />

(including costs reasonably incurred by the Contractor) associated with installing installation of the<br />

hosting equipment, cables and other material and any additional hosting equipment at the Logicalis<br />

Data Centre is out of scope.<br />

The Customer will comply with the Data Centre Installation Standards set out in the Data Centre<br />

Installation Standards in respect of all hosting equipment and additional hosting equipment.<br />

Customers will not make any alteration or modification to the Logicalis Data Centre, or any of the<br />

racks, storage facilities, fixtures and fittings or any other facilities provided by Logicalis.<br />

The Customer will keep the Customer Designated Area clean and tidy and free from rubbish and<br />

other debris and refrain from obstructing any doors or access to that space at all times.<br />

The Customer will comply with the Acceptable Use Policy.<br />

The Customer will not load the rack(s) in which the hosting equipment is installed in excess of the<br />

manufacturer’s recommended maximum loading.<br />

Use of Electrical Power<br />

795


Pricing includes a charge for the usage of electrical power up to the maximum amount stated in Co-<br />

location <strong><strong>Service</strong>s</strong> and <strong>Service</strong> Details.<br />

Logicalis may also make an additional charge for, or grant a rebate against the charge for, the<br />

Customer’s actual usage of electrical power at the end of each quarter.<br />

The Customer acknowledges that should it wish to install additional hosting equipment, Logicalis<br />

cannot guarantee to provide electrical power in excess of the electrical power provision.<br />

<strong>Service</strong> Level<br />

Logicalis will perform the Hosting <strong><strong>Service</strong>s</strong> in accordance with the service level requirements set out<br />

in Co-location SLA.<br />

Relocation of Hosting Equipment<br />

Logicalis may, having given the Customer as much notice as is reasonably possible in the<br />

circumstances, relocate the hosting equipment to another area within the Logicalis Data Centre, which<br />

will upon moving to it, become the customer designated area. Logicalis will arrange and pay for the<br />

relocation of the hosting equipment to the new customer designated area and will provide the hosting<br />

services at the new customer designated area.<br />

Removal of Hosting Equipment<br />

796


On expiry, or termination of the service, the Customer will be solely responsible for the removal of<br />

the hosting equipment from the customer designated area within fourteen (14) days of the date of<br />

termination or expiry.<br />

Logicalis may disconnect, switch off or remove any of the hosting equipment at any time without<br />

the prior approval of the Customer if it is necessary to take such action immediately in order to protect<br />

health and safety or to prevent damage to the customer designated area, or the Logicalis Data Centre.<br />

Disaster Recovery<br />

Any disaster recovery requirements will be subject to a separate quotation and a specific contract<br />

for such purposes between Logicalis and the customer. Unless specifically listed in the service schedule,<br />

Logicalis does not provide any disaster recovery services as part of the standard co-location agreement.<br />

System and Security Requirements<br />

Logicalis will be responsible for providing physical and electronic security systems for the Logicalis<br />

Data Centre perimeter and common areas leading up to the customer designated area. Logicalis will<br />

provide physical access and security controls will comply with the Security Policy applicable to the<br />

customer designated area.<br />

Reporting and Reviews<br />

797


Logicalis will, on a quarterly basis, provide the reports relating to the hosting services as set out in<br />

the hosting SLA.<br />

Logicalis and the Customer will meet regularly at mutually determined times and intervals to discuss<br />

and review reports that Logicalis will present regarding any incidents that may have occurred and the<br />

general state of the Logicalis Data Centre.<br />

Hosting SLA<br />

<strong>Service</strong> Level Requirements<br />

Logicalis will perform the Hosting <strong><strong>Service</strong>s</strong> in accordance with the service level requirements set out<br />

below and if Logicalis fails to perform, the Customer will be entitled to receive the service credits set out<br />

below. If one failure or incident leads to two or more service credits being payable only the higher or<br />

highest service credit will apply.<br />

y<br />

Power<br />

Categor<br />

798<br />

Description<br />

Level<br />

<strong>Service</strong><br />

Measure<br />

ment Period<br />

Power Simultaneous 100% Quarterly<br />

<strong>Service</strong> Credit<br />


Temperature<br />

799<br />

failure of power to<br />

any power circuit<br />

(A-feed) and its<br />

associated<br />

redundant power<br />

feed circuit (B-<br />

feed)<br />

uptime Fee<br />


y<br />

ture<br />

Categor<br />

Tempera<br />

800<br />

Description<br />

Customer Area<br />

temperature of no<br />

more than 26 o C<br />

and no less than<br />

17 o C as measured<br />

in the Cold isle at<br />

the front of<br />

customer racks 1m<br />

above floor height<br />

Level<br />

<strong>Service</strong><br />

Not in<br />

excess of<br />

27 o C<br />

Measure<br />

ment Period<br />

Quarterly<br />

<strong>Service</strong> Credit<br />


Fault Resolution<br />

Logicalis will be responsible for coordinating all incident isolation, testing and repair work relating to<br />

the Logicalis Data Centre. Severity levels will initially be as determined by the Customer but Logicalis<br />

may increase or decrease the severity level if it is reasonable to do so after investigation of the<br />

incident. During the incident isolation and troubleshooting process, Logicalis will communicate with the<br />

Customer and escalate its problem resolution efforts based upon the times specified in the table<br />

below. Logicalis will proactively inform the Customer when an issue or condition arises that may cause<br />

potential problems. Logicalis will provide status updates as described below:<br />

erity<br />

Level<br />

801<br />

services affected;<br />

start time of incident;<br />

current status of resolution;<br />

description of problem;<br />

estimated time of resolution.<br />

The following steps will be taken when the Customer reports an incident:<br />

Sev<br />

Description Cove<br />

rage<br />

onse<br />

Time<br />

Resp<br />

Resolu<br />

tion Time<br />

Effort<br />

Work<br />

mer<br />

Status<br />

Custo<br />

Updates<br />

Time<br />

-based<br />

note


S1 Customer’s<br />

802<br />

<strong>Service</strong> is not<br />

operational and<br />

no workaround<br />

is possible<br />

24x7 15<br />

minutes<br />

1 hour 24<br />

hours per<br />

day until<br />

resolution<br />

or change<br />

of<br />

severity<br />

hour<br />

Every<br />

S2 Customer’s 24x7 1 2 16 Every<br />

15<br />

minutes:<br />

the<br />

Logicalis<br />

<strong>Service</strong><br />

Desk<br />

2<br />

hours:<br />

Logic<br />

alis Data<br />

Centre<br />

Manager<br />

4<br />

hours:<br />

ces<br />

Servi<br />

Director<br />

1


803<br />

<strong>Service</strong> is<br />

operational but<br />

performance is<br />

seriously<br />

degraded. If a<br />

workaround<br />

has been<br />

provided, the<br />

loss of<br />

performance<br />

can only be<br />

sustained for a<br />

few Working<br />

Days.<br />

S3 Customer’s<br />

<strong>Service</strong> is<br />

24x7 2<br />

hour hours hours per<br />

hours<br />

4<br />

hours<br />

day until<br />

resolution<br />

or change<br />

of<br />

severity<br />

ard<br />

Stand<br />

2 hours hour: the<br />

Every<br />

4 hours<br />

Logicalis<br />

<strong>Service</strong><br />

Desk<br />

4<br />

hours:<br />

Logic<br />

alis Data<br />

Centre<br />

Manager<br />

1<br />

Working<br />

Day:<br />

ces<br />

Servi<br />

Director<br />

1<br />

Working


804<br />

operational.<br />

However a<br />

problem has<br />

been identified<br />

that causes<br />

slight<br />

degradation in<br />

performance. A<br />

workaround is<br />

available.<br />

Working<br />

Day<br />

Day: the<br />

Logicalis<br />

<strong>Service</strong><br />

Desk<br />

2<br />

Working<br />

Days:<br />

Logic<br />

alis Data<br />

Centre<br />

Manager<br />

5<br />

Working<br />

Days:<br />

ces<br />

Servi<br />

Director


follows:<br />

Scheduled Maintenance<br />

Logicalis will notify the Customer regarding maintenance of the Logicalis Data Centre as<br />

805<br />

Type of Maintenance Description Notification Period<br />

Routine<br />

Standard<br />

Routine maintenance<br />

with no likely affect on RICS<br />

Designated Area; and<br />

maintenance which is part of<br />

the Contractor’s PPM<br />

Routine maintenance<br />

and repair which the<br />

Contractor believe may<br />

involve an outage<br />

Urgent Repair needed urgently<br />

Emergency<br />

Reporting<br />

Repair or other action<br />

needed on health and safety<br />

or security grounds.<br />

No notification required<br />

14 day advance<br />

notification<br />

1 hour advance<br />

notification<br />

No advance notification<br />

required but the Contractor<br />

will notify Customer as soon<br />

as is reasonably practicable


Logicalis will provide the following reports and documents within ten (10) Working Days of each<br />

month end:<br />

806<br />

Power Distribution Unit (PDU) meter readings in Amps (A) of electrical load for each PDU, both<br />

primary and redundant, together with the previous months’ readings.<br />

Monthly details of temperature within the customer designated area recorded.<br />

Access register for the customer designated area together with all requests for access by both<br />

the Customer and Non-Customer personnel including those where access may have been due to<br />

an emergency situation.<br />

Log and/or register of all remote hands services requests.<br />

Business Continuity and Disaster Recovery<br />

Logicalis will have in place a business continuity and disaster recovery plan which it will make<br />

available to the Customer for review. The business continuity plan / disaster recovery plan will:<br />

address all critical functions and operations of the services used by Customer;<br />

specify recovery time frames for each critical function and operation used by Customer;<br />

be thoroughly tested at least annually; be regularly updated to the extent necessary.<br />

Remote Hands <strong><strong>Service</strong>s</strong><br />

Logicalis will provide the remote hands services consisting of technical support for basic operational<br />

functions, and diagnostic and repair activity for hosting equipment, facilities, spares and other materials<br />

owned or leased by the Customer.<br />

Logicalis will charge for the remote hands services in accordance with the rates in the <strong>Service</strong><br />

Catalogue.<br />

Logicalis will be contactable 24 hours a day, 7 days a week and will provide remote hands services<br />

24 hours a day, 7 days a week if required.


Logicalis will relay on request and on receipt of instructions from the Customer:<br />

807<br />

the visual status of hosting equipment to assist in remote troubleshooting;<br />

undertake basic remedial tasks on hosting equipment;<br />

power cycle hosting equipment when and should the need arise; unload/load data tapes at<br />

the Customer tape library equipment.<br />

Logicalis will conduct physical layer testing and test and confirm that all cross-connects are<br />

functioning normally to the patch panel in the Logicalis Data Centre.<br />

Logicalis will install and maintain cabling at additional charges in respect of the following:<br />

install copper patch cords between devices in the customer designated area;<br />

install fibre patch cords between devices in the customer designated area;<br />

source and provide copper and fibre replacement patch leads and cables at the Customer’s<br />

request;<br />

install or patch copper or fibre patch cords at the Customer’s request;<br />

troubleshoot physical layer issues with fibre and copper.<br />

The Customer may elect to have Customer materials such as data tapes delivered to, configured at,<br />

installed at, stored at, maintained at, serviced at, and/or shipped from the Logicalis Data Centre.<br />

Logicalis Hosting and aaS Security


Logicalis can locate our Data Centre within the Security Boundary of the <strong>PSN</strong> and can therefore<br />

provide Hosting and aaS at IL2-2-x and IL 3-3-x in accordance with:<br />

808<br />

HMG CESG/CPNI Guidance<br />

NIST Guidelines<br />

Industry best practice<br />

In order of preference and where available.<br />

Section 8 Communication as a <strong>Service</strong><br />

For simplicity and commonality, Logicalis has mapped our UC provision onto the current MTS<br />

solution. Therefore, as part of the UC <strong>Service</strong> Logicalis provides the following:<br />

Managed Telephony <strong><strong>Service</strong>s</strong> which include;<br />

Managed Traditional Telephony <strong><strong>Service</strong>s</strong><br />

Managed Next Generation Telephony <strong><strong>Service</strong>s</strong> (Unified Communications as a <strong>Service</strong>)<br />

Telephony Handset Provision;<br />

Telephony Call Logging <strong>Service</strong>;<br />

Voicemail & Voice Processing <strong>Service</strong>;<br />

Voice Mobility <strong><strong>Service</strong>s</strong>;<br />

Voice Disaster Recovery <strong><strong>Service</strong>s</strong>;<br />

Voice Call packages;<br />

voice minutes;<br />

DDI, premium rate numbers;


non-geographic numbers;<br />

118 enquiries;<br />

call preference services,<br />

SMS, pager/mobile/fixed line telephone.<br />

<strong>Service</strong> Management which includes:<br />

809<br />

Telephony Maintenance and Support <strong><strong>Service</strong>s</strong>;<br />

Telephony Software & Hardware Moves and Changes;<br />

Traditional Telephony <strong><strong>Service</strong>s</strong><br />

Logicalis provides Traditional Telephony <strong><strong>Service</strong>s</strong> which are fully managed services using supplied,<br />

premise based, PBXs connected which can remain stand alone and managed on premise or connected to<br />

Logicalis’ centralised IP based Telephony platform.<br />

The PBX supports the extensions at the Customer site and also remote workers and hot-desking<br />

staff that are associated with the site. Solutions provide support for analogue, digital handsets and IP<br />

handsets.<br />

The Traditional Telephony <strong>Service</strong> can provide each user with the below functionality depending on<br />

the end user requirements:<br />

access to a port on the Traditional Telephony <strong>Service</strong>;<br />

an analogue telephone handset (if the Customer does not require a digital or IP handset);<br />

A DDI number;<br />

A full suite of Telephony functionality such as call divert, group pickup, manager/secretary<br />

working etc.;<br />

Voicemail;<br />

Voice Mobility (voice nomadic features, e.g. hot-desking and remote working);<br />

Telephone Operator <strong>Service</strong>;<br />

Access to “always on” and “event based” audio conference services.


The Traditional Telephony <strong>Service</strong> supports sites with as few as two extensions to very large sites<br />

and campuses hosting many hundreds or thousands of extensions. For the smaller sites a PBX may be<br />

deployed but some small sites are served by a “satellite” device hosted off a large site PBX.<br />

Calls between telephony sites (designated ‘on-net’ calls) are carried over the <strong>PSN</strong> with calls to non-<br />

<strong>PSN</strong> sites breaking out to the PSTN at an appropriate point.<br />

For PBXs which are not connected directly to the <strong>PSN</strong> network are connected to the PSTN network<br />

via ISDN or SIP with the call traffic being onward routed to the destination through this medium. Such<br />

sites are deemed indirectly connected sites.<br />

Standard & Additionally Charged Offerings<br />

The table below lists the Traditional Telephony <strong>Service</strong> functionality currently delivered. The table<br />

shows which services are provided by Logicalis as part of the standard quarterly extension (SAP) rental<br />

and which are additionally charged.<br />

810<br />

<strong>Service</strong> Provision/ Functionality<br />

Provision and ongoing management of required<br />

premises-based PBXs<br />

Provision and ongoing management of required<br />

“satellite” equipment (for small sites)<br />

Included in<br />

standard<br />

quarterly<br />

extension<br />

rental<br />

√<br />

√<br />

Additionally<br />

priced<br />

Provision and management of all network links √<br />

Access to a port on the premises based PBX or<br />

satellite equipment for each user<br />

Full Direct Dialling (DDI) for each user √<br />


811<br />

<strong>Service</strong> Provision/ Functionality<br />

Included in<br />

standard<br />

quarterly<br />

extension<br />

rental<br />

Calls within Logicalis’s estate (on-net calls) √<br />

24 hour proactive service management √<br />

Additionally<br />

priced<br />

Hot-Desking & remote working capabilities √<br />

Access to a call logging facility √<br />

Access to Audio Conferencing (calls are additionally<br />

charged)<br />

Central management capabilities for moves and<br />

changes to be undertaken<br />

Software remote moves and changes √<br />

Project Management resources for initial<br />

implementation.<br />

System management training for new site<br />

installations<br />

Floor walking services on first day of service for a<br />

new site installation<br />

Telephone Operator <strong>Service</strong> for incoming calls and<br />

directory support<br />

Voicemail for each user √<br />

<strong>Service</strong> Centre service for user assistance and fault<br />

resolution<br />

Calls to the PSTN (however, note that currently<br />

Buying Solutions aggregates the call charges and bill<br />

customers a standard call inclusive quarterly charge)<br />

Directory enquiry service √<br />

Provision and ongoing management of a range of<br />

analogue, digital, IP and soft client terminals.<br />

Basic rate ISDN connectivity to the desktop √<br />

Call Handling Solutions √<br />

Onsite moves and changes by the Contracator √<br />

Refresher handset or system functionality training √<br />

Telephone directory update service (providing entries<br />

to BT and Hull telephone directories)<br />

√<br />

√<br />

√<br />

√<br />

√<br />

√<br />

√<br />

√<br />

√<br />


812<br />

<strong>Service</strong> Provision/ Functionality<br />

Included in<br />

standard<br />

quarterly<br />

extension<br />

rental<br />

Additionally<br />

priced<br />

Non-geographic number services √<br />

Standard & Optional Offering –Traditional Telephony <strong>Service</strong><br />

Traditional Telephony <strong>Service</strong> - Operator and <strong>Service</strong> Management Consoles<br />

Depending on the PBX being pre-existing or provided, this will dictate the Console provision.<br />

Traditional Telephony <strong>Service</strong> - Network <strong>Service</strong><br />

Logicalis assumes that the <strong>PSN</strong> will be used to provision private circuits to all sites. Where these are<br />

not provided, Logicalis can provision these at additional cost.<br />

Sites can be provided with fallback analogue exchange lines to enable a limited number of<br />

Customer’s access to the PSTN in the event of a catastrophic PBX switch failure. In the event of a<br />

complete power failure or catastrophic PBX system failure, a bypass feature is automatically invoked<br />

(where provided) so that direct connections between designated fallback analogue exchange lines and<br />

certain extensions are made.<br />

Each SAP is capable of least cost routing to On Net and PSTN.<br />

Telephone Handset Provision


For the Traditional Telephony service Logicalis provides, operates and maintains the telephone<br />

handsets and key systems. All SAPs (except SAPs supporting facsimile machines, modems and ISDN<br />

ports or where more advanced handsets are requested by the Customer e.g. digital or IP handsets) are<br />

provided with a standard analogue handset as part of the SAP <strong>Service</strong> Charge.<br />

The standard analogue telephone handsets have a specification that, as a minimum, provides the<br />

following facilities:<br />

813<br />

Redial last number;<br />

Speaker volume control;<br />

Ring tone adjustment;<br />

5 number memory - each accessible by a single key;<br />

visual message waiting indication.<br />

The Managed Next Generation Telephony <strong>Service</strong> – Unified Communications (UC) as a <strong>Service</strong><br />

Logicalis UC as a <strong>Service</strong> is provisioned by Logicalis’ G-Cloud platform using the underlying Compute,<br />

Storage and Network as a <strong>Service</strong>, underpinned by the Hosting <strong>Service</strong>.<br />

Logicalis provides a centrally hosted, next generation (IP Telephony-IPT) <strong>Service</strong> which provides an<br />

IP-based alternative to traditional on-site PBX. UC functionality is provided from Logicalis’ hosted Cloud<br />

based softswitch which is host to Skinny Call Control Protocol (SCCP) or Session Initiation Protocol (SIP)<br />

endpoints located on Customers’ sites. SCCP/SIP endpoints include SIP telephone handsets, PC-based<br />

soft-clients and Integrated Access Device (IADs) that provide analogue connectivity for telephones, fax<br />

machines and modems.<br />

The operating environment of the software layer is customised to the Customer requirements<br />

through the features and capabilities of the product set.


Endpoints are capable of being connected to the UC <strong>Service</strong> via a <strong>PSN</strong> connection or via a Customer<br />

(or third party) provided data network. If a Customer or third party data network is used, a network<br />

gateway (optionally duplicated) is established between the third party network and the <strong>PSN</strong> which<br />

supports the IPT service.<br />

Integration between UC as a <strong>Service</strong> and Traditional Telephony <strong><strong>Service</strong>s</strong> can be provided, allowing<br />

seamless connectivity for calls and facilitates communication during the transition of service from TDM<br />

to IPT. This is not provided as standard.<br />

The current UC as a <strong>Service</strong> and Traditional Telephony <strong><strong>Service</strong>s</strong> are not accredited. Logicalis is<br />

presently awaiting approval for our DNSP status. Following approval Logicalis will move to accredit our<br />

<strong><strong>Service</strong>s</strong>.<br />

Additional service resiliency options, such as the provision of Survivable Media Gateways (SMGs),<br />

are supported (where the accreditation will support their use). A SMG is an on-site softswitch that can<br />

facilitate on-site desk to desk dialling and PSTN connectivity in the event of complete network failure or<br />

IPT service outage.<br />

The UC as a <strong>Service</strong> package provides each user with:<br />

Access to a port on the IPT service;<br />

A DDI number;<br />

A full suite of Telephony functionality such as call divert, group pickup, manager/secretary<br />

working etc.;<br />

‘Follow-me’ extension (aka hot desking) – i.e. a user can login at any access point within their<br />

organisation and have their extension automatically redirected to that IP phone/softphone;<br />

Audio/Video conferencing – allowing any user to set up an ad hoc multi-party conference call<br />

without the need for any advance notification or third party involvement.<br />

Software based moves, adds and changes.<br />

The following features are also available to the Customers’ users as service options:<br />

814


Voicemail;<br />

Telephone Operator <strong><strong>Service</strong>s</strong>.<br />

The table below summaries the UC as a <strong>Service</strong> functionality that is provided as standard (that is as<br />

part of a quarterly rental charge per IP service access point) and that which is provided as an option, at<br />

an additional charge;<br />

815<br />

UC as a <strong>Service</strong> Provision/ Functionality<br />

Provision and service management of IPT<br />

endpoints<br />

Included as<br />

standard<br />

Full Direct Dialling (DDI) per user √<br />

On-net calls i.e. calls within the <strong>PSN</strong> √<br />

√<br />

Additionally<br />

charged<br />

Local, national, mobile and international calls √<br />

24 hour proactive management √<br />

Hot-Desking capabilities √<br />

Access to a Call logging facility √<br />

Desktop audio conferencing facility √<br />

Software remote moves and changes √<br />

Project management resources for initial<br />

implementation<br />

Floor walking services on a site on first day of<br />

service<br />

Self service web portal √<br />

<strong>Service</strong> Centre service for user assistance and<br />

fault resolution<br />

Directory Enquiry <strong>Service</strong> √<br />

Handset or system functionality training. √<br />

LAN provision and management √<br />

LAN UPS provision and maintenance service<br />

(for powering IP handsets)<br />

LAN/WAN assessment consultancy √<br />

Network Gateway(s) from Customer’s data √<br />

√<br />

√<br />

√<br />


816<br />

UC as a <strong>Service</strong> Provision/ Functionality<br />

network into <strong>Service</strong> Provider’s network<br />

Included as<br />

standard<br />

Additionally<br />

charged<br />

Non-geographic number services √<br />

Out of Office telephone working capabilities √<br />

Survivable Media Gateway √<br />

Telephone directory update service (providing<br />

entries to BT and Hull telephone directories)<br />

Telephone Operator <strong>Service</strong> for incoming calls<br />

and directory support<br />

Voicemail for each user √<br />

Network Gateway<br />

Standard & Optional Offerings – UC as a <strong>Service</strong><br />

Logicalis provides Network Gateways for Customers who wish to utilise their existing Wide Area<br />

Network (WAN). This Network Gateway connects the customer’s WAN with the IPT <strong>Service</strong>. There are<br />

two Network Gateway options:<br />

Premium Gateway Connection<br />

Standard Gateway Connection<br />

The premium gateway connection provides two geographically diverse connections, the first from<br />

one of the Customer’s WAN points-of-presence to Logicalis’ point-of-presence and the second from<br />

another of that same Customer’s WAN point-of-presence to another Logicalis point-of-presence.<br />

The standard gateway connection provides a single connection between one of the Customer’s<br />

WAN points-of-presence and one of Logicalis’ points-of-presence.<br />

√<br />


Telephone Handset Provision<br />

Logicalis provides a selection of digital, IP and advanced telephone handsets which will vary based<br />

on the existing or provisioned PBX or the UC as a <strong>Service</strong>.<br />

UC as a <strong>Service</strong><br />

The UC platform operates on Logicalis’ G-Cloud platform utilising our Computing as a <strong>Service</strong>,<br />

Storage as a <strong>Service</strong> and Network as a <strong>Service</strong> to deliver the underlying <strong><strong>Service</strong>s</strong>.<br />

follows:<br />

Computing as a <strong>Service</strong><br />

Specification and <strong>Service</strong> Description<br />

Logicalis has standardised on the half width Cisco UCS Blades for this service which are configured as<br />

MK2 Blades<br />

Dual 2.66GHz Xeon E5640 processors with 8Mb cache (i.e. 2 x quad core = 8 core);<br />

80Gb of RAM;<br />

Qlogic Converged Network Adapter with dual 10Gb uplinks;<br />

10Gb boot LUN of storage.<br />

Further storage capacity is available using Logicalis’ Storage as a <strong>Service</strong>. Connectivity to the system<br />

is provided through a resilient 10Gb Ethernet network connection which can be accessed using Logicalis’<br />

Network as a <strong>Service</strong>.<br />

The Customer has the following service options within Computing as a <strong>Service</strong>:<br />

817


Dedicated Blade <strong>Service</strong> – A commitment to providing a dedicated Blade for 365 days per year,<br />

24hrs a day.<br />

Guaranteed Blade <strong>Service</strong> – A commitment to provide a dedicated Blade for 30 days per annum<br />

to be invoked by the Customer as required. Logicalis will provide the Blade according to the<br />

SLA. This service is typically used to support a customer’s Business Continuity Plan (BCP) by<br />

providing computing resources in a DR situation and to allow for the invocation and testing of the<br />

service during the contracted period. Each invocation utilises one MAC.<br />

Uncommitted Blade Days – Provides a dedicated Blade for a number of days per annum, but<br />

delivered on the basis that Logicalis may revoke such provision should another customer invoke a<br />

DR requirement through the Guaranteed Blade <strong>Service</strong>. Each invocation utilises one MAC.<br />

Blade Harbour Option – provides a managed full or half slot in a Cisco UCS chassis for the<br />

installation of a UCS Blade to the Customer’s own specification.<br />

The following service facilities will be provided:<br />

Setup of Computing as a <strong>Service</strong><br />

1. Design and documentation of connectivity and configuration options;<br />

2. Implementation of connectivity to Computing as a <strong>Service</strong> and configuration of service options.<br />

Day to Day Operation & <strong>Service</strong> Management<br />

As defined within the Managed <strong><strong>Service</strong>s</strong>.<br />

Computing as a <strong>Service</strong> can be combined with other Logicalis ‘as a <strong>Service</strong>’ offerings such as<br />

‘Network as a <strong>Service</strong>’ and ‘Storage as a <strong>Service</strong>’, to generate a bespoke managed service environment<br />

to meet a customer’s business needs.<br />

Computing as a <strong>Service</strong> can be supplemented with additional managed services to provide higher<br />

level management of operating systems and applications if required.<br />

Storage as a <strong>Service</strong><br />

818


Specification and <strong>Service</strong> Description<br />

Storage is available in multiples of 1Gb and can be provided as two storage types:<br />

819<br />

Application Storage Units – Based on high speed SAS disks for application style workloads.<br />

Archive Storage Units – Based on higher density SATA disks for archival style workloads.<br />

Both types can be scaled to provide the storage capacity and peak IOPS rating required by the<br />

Customer.<br />

The service is based on a consumption model that provides a specified amount of storage allocation,<br />

the required IOPS performance and SAN connectivity.<br />

Logicalis provides a ‘multi protocol’ approach to storage provisioning that supports the following<br />

standards:<br />

CIFS – Common Internet File System, that provides native Windows file services with access<br />

managed through Windows Server Manager (on an associated Windows host). Server Manager<br />

allows for remote connection to allocated storage units, share definition and management of<br />

security.<br />

NFS – Network File System, that provides a method of volume exports typically utilised and<br />

mounted in Unix style environments and managed using RSH/SSH command line scripts.<br />

iSCSI – Allows for the provisioning of LUNs over IP infrastructure. Mounted by hosts to be<br />

formatted with native file systems and seen as local disk by O/S and applications. LUN creation,<br />

associated presentation and security can be defined and managed using RSH/SSH command line<br />

scripts.<br />

Logicalis is able to provide customers with additional NetApp SnapDrive / SnapManager<br />

management products as separately priced services should these be required by the Customer.<br />

The total storage allocated to the customer is limited to the storage volume capacity included in the<br />

Contract Particulars. Where the Customer uses functions such as Snapshots and Mirroring, storage<br />

space in the supporting volumes will need to be reserved for this and other storage changes.


Storage as a <strong>Service</strong> standard features comprise:<br />

Backup and Recovery - Snapshot - This feature is only available within a customer’s storage<br />

allocation and can be used to secure a single file or a complete data infrastructure. It is managed<br />

using RSH/SSH command line scripts – allowing the Customer to trigger individual snaps while<br />

applications are running or to set them up on a scheduled basis. File level recovery is available using<br />

Windows Explorer through the browsing of the .snapshot directory, or RSH/SSH command line<br />

access. Up to 253 Snapshot copies per volume can be created, instantly, to provide online backups<br />

in minimal storage space.<br />

In addition, if agreed, a daily backup to tape media of a single named snapshot per volume will<br />

be taken, and once written, securely transported and stored offsite. The taking of the snapshot will<br />

either be at a customer defined time (hour and minute) or via Customer initiated snapshot as<br />

described earlier, and retained by the Customer for the 24hr period starting and finishing at 00.01<br />

hrs. The timing of taking the Snapshot to tape will be at the discretion of Logicalis within the 24hour<br />

period.<br />

820<br />

Storage space consumed by, and reserved for, snapshots is counted within the total storage<br />

footprint of the Customer and limited to the storage volume capacity agreed within the Contract<br />

Particulars.<br />

Data Replication – Asynchronous SnapMirror – This service feature offers a data replication<br />

solution that can provide disaster recovery protection for business-critical data. Leveraging the<br />

unified storage architecture, SnapMirror simplifies the management of data replication so a<br />

customer can use a single solution across all NetApp storage arrays and protocols for any application<br />

in both virtual and traditional environments in a variety of configurations. The feature would<br />

typically be used to mirror data from, say, the Logicalis Storage as a <strong>Service</strong> allocation to a<br />

customer’s own NetApp array running within their organisation (or perhaps in the Logicalis Data<br />

Centre). This service feature uses asynchronous replication with replication periods no lower than<br />

30mins. The recovery process also supports low recovery time objectives, enabling businesses to get<br />

back on-line faster.<br />

The following service facilities will be provided:<br />

Setup of Storage as a <strong>Service</strong><br />

1. Design and documentation of connectivity and configuration options.


2. Implementation of connectivity to Storage as a <strong>Service</strong> and configuration of service options.<br />

Day to Day Operation & <strong>Service</strong> Management<br />

As defined within the Managed <strong><strong>Service</strong>s</strong>.<br />

Storage as a <strong>Service</strong> can be combined with other Logicalis ‘as a <strong>Service</strong>’ offerings such as ‘Network as<br />

a <strong>Service</strong>’ and ‘Computing as a <strong>Service</strong>’ to generate a bespoke managed service environment to meet a<br />

customer’s business needs.<br />

Storage as a <strong>Service</strong> can be supplemented with additional managed services to provide higher level<br />

management of operating systems and applications if required.<br />

Network as a <strong>Service</strong><br />

Specification and <strong>Service</strong> Description<br />

Network as a <strong>Service</strong> allows customers to choose a range of fully managed connectivity options<br />

including Data Centre LAN <strong><strong>Service</strong>s</strong> which provide interconnection between services within the Data<br />

Centre and Data Centre WAN services, providing resilient Internet access and WAN access to other<br />

services.<br />

Data Centre LAN <strong><strong>Service</strong>s</strong> provide a variety of connectivity options for customers ranging from a<br />

resilient pair of ports up to a complete network service; all delivered using a resilient, flexible and secure<br />

underlying network infrastructure.<br />

821


This service is delivered using a resilient architecture of Cisco Data Centre-class switches. This<br />

infrastructure is fully managed by the Logicalis Managed <strong>Service</strong> Centre (MSC) using the CA Spectrum<br />

Infrastructure Manager and eHealth Performance Manager toolsets.<br />

The following connectivity packages are offered:<br />

822<br />

10/100/1000Mb Access Port – This option provides a resilient pair of RJ45 presented copper<br />

based Ethernet ports delivered as one port from each pair of resiliently connected Cisco<br />

Switches.<br />

1GbE Access/Core Port – This option provides a resilient 1GbE Fibre Access Port Pair delivered<br />

as one 1GbE port from each of a pair of resiliently connected Cisco switches. If a core port is<br />

specified this may be used for Layer 3 switching.<br />

10GbE Access/Core Port – This option provides a resilient 10GbE Fibre Access Port Pair<br />

delivered as one 10GbE port from each of a pair of Cisco switches. If a core port is specified this<br />

may be used for Layer 3 switching.<br />

Rack Level Switching – This option uses a dedicated Cisco Nexus 2000 with 48 x 100/1000-T<br />

Ports delivered within a Customer Rack with resilient up-links to the distribution layer.<br />

All ports are provided in pairs, with the service level being measured as the availability of the service<br />

via either port, not simultaneously.<br />

The following configurations are supported:<br />

Segregation - VLANs are available and can be scaled depending on the number of ports taken.<br />

However, in order to support high numbers of VLANs on a low number of ports an additional<br />

charge may be made. This will be agreed with the Customer during the design phase.<br />

Addressing - A customer’s own IP addressing is supported with IPV4 and IPV6 options<br />

available supporting public and private structures based on best practice principles. The<br />

addressing structure will be agreed with the Customer during the design phase.<br />

Resilience – The service provides a pair of resilient ports where the aim is to use these either,<br />

to connect a single device in a resilient fashion or to connect to two devices operating their own<br />

resilience. Where a ‘Top of Rack’ switch is provided, port configurations will be agreed with the<br />

Customer during the design phase.<br />

Logicalis’ Data Centre WAN services are based on a carrier neutral approach to the provision of<br />

bandwidth services and have the potential to support any carrier within its Data Centres.


823<br />

External Carrier <strong><strong>Service</strong>s</strong>: To provide resilience for carrier services Logicalis has dual diverse<br />

routes into its Slough Data Centre from both sides of the site. These terminate in separate<br />

‘Meet-Me’ rooms providing termination points for the Carrier services. The service profile for<br />

each Customer will be agreed during the design phase and the agreed network connectivity will<br />

be delivered directly to the Customer’s rack.<br />

Internet as a <strong>Service</strong>: Those Customers requiring Internet access can contract with Logicalis<br />

for an agreed bandwidth rate (such as 10Mb) at an agreed rate, for which charges will be<br />

invoiced separately. Where a Customer requires additional bandwidth, the service can be<br />

‘flexed’ (either permanently or for a period of time) by simply ordering more bandwidth from<br />

Logicalis. This will be implemented quickly and simply under change management control,<br />

typically requiring no service downtime or the installation of physical upgrades.<br />

JANET Connectivity: Logicalis can provide connectivity to the JANET network for authorised<br />

Customers.<br />

The following service facilities will be provided:<br />

Setup of Network as a <strong>Service</strong>:<br />

1. Design and documentation of connectivity and configuration options<br />

2. Implementation of connectivity to Network as a <strong>Service</strong> and configuration of service options<br />

Day to Day Operation & <strong>Service</strong> Management<br />

As defined within the Managed <strong><strong>Service</strong>s</strong>.<br />

Network as a <strong>Service</strong> can be combined with other Logicalis ‘as a <strong>Service</strong>’ offerings such as ‘Storage as<br />

a <strong>Service</strong>’ and ‘Computing as a <strong>Service</strong>’ to generate a bespoke managed service environment to meet a<br />

customer’s business needs.<br />

Network as a <strong>Service</strong> can be supplemented with additional managed services to provide higher level<br />

management of operating systems and applications should this be required.


Information assurance – Impact Level (IL) at which the G-Cloud <strong>Service</strong> is accredited to hold and<br />

process information<br />

Logicalis does not formally hold accreditations for this service, however the security architecture<br />

under which the Cloud operates has been modelled on the Welsh PSBA architecture which has been<br />

accredited up to IL3.Our expectation is that CESG would have no issue with accrediting Logicalis’<br />

Cooperative Cloud.<br />

Having been awarded G-Cloud status, Logicalis is working towards this accreditation.<br />

Details of the level of backup/restore and disaster recovery that will be provided<br />

The ‘As a <strong>Service</strong>’ service provides a fully managed backup and recovery solution and is managed<br />

and monitored by our MSC. The service utilises a mature, enterprise-class data protection platform that<br />

provides broad interoperability across all leading IT environments, as well as superior integration. The<br />

service delivers fast backup and recovery of dozens of major applications used by enterprises. The<br />

solution includes provision of LTO5 data cartridges for use in the tape rotation cycle, schedule on a<br />

nightly basis and defined within Logicalis' ITIL retention policy. All tapes are rotated on a daily basis and<br />

relocated to a secure off-site facility provided by Iron Mountain.<br />

Logicalis manages all scheduled maintenance in accordance with the operational change control<br />

process. The scheduled maintenance is controlled by our MSC. All configuration changes are updated<br />

and maintained in the dedicated CMDB, held in our CA toolset, and controlled in line with ISO27001<br />

accreditation. These processes and controls are followed across our whole business and in place for all<br />

of our current customers.<br />

824


As a <strong>Service</strong> SLA<br />

The <strong><strong>Service</strong>s</strong> comprise a number of discrete components, namely Contact/Call Centre as a <strong>Service</strong>,<br />

Computing as a <strong>Service</strong>, Storage as a <strong>Service</strong> and Network as a <strong>Service</strong>. This section defines the <strong>Service</strong><br />

Level Agreement (SLA) between the Customer and Logicalis for the delivery of the <strong><strong>Service</strong>s</strong>.<br />

This SLA identifies and defines the <strong>Service</strong> Levels to be provided by Logicalis to the Customer in<br />

respect of the monitoring, maintenance, management and provision of the <strong><strong>Service</strong>s</strong>. Logicalis will be<br />

responsible for the provision of the <strong><strong>Service</strong>s</strong> in accordance with this SLA.<br />

Availability Definition and <strong>Service</strong> Levels<br />

Definition: The following formula will be used to calculate Availability for each individual <strong>Service</strong> for<br />

the measurement period expressed as a percentage:<br />

where:<br />

c = number of hours of service during the measurement period (e.g. 31 days per month, 24 hours<br />

per day = 744)<br />

f = duration (measured in hours) within the measurement period during which an individual <strong>Service</strong><br />

was not available (i.e. did not respond to a poll)<br />

825


k = duration (measured in hours) within the measurement period during which an individual <strong>Service</strong> was<br />

unavailable due to circumstances beyond Logicalis’ control.<br />

Availability metrics for the <strong><strong>Service</strong>s</strong> are detailed below:<br />

826<br />

<strong>Service</strong> Component Availability Metric<br />

Measurement Period 1 calendar month<br />

Network as a <strong>Service</strong> 99.99%<br />

Internet as <strong>Service</strong><br />

(Component element of<br />

Network as a <strong>Service</strong>)<br />

External Carrier <strong><strong>Service</strong>s</strong><br />

(Component element of<br />

Network as a <strong>Service</strong>)<br />

99.99%<br />

As specified by the relevant Carrier<br />

in its SLA<br />

Computing as a <strong>Service</strong> 99.99%<br />

Storage as a <strong>Service</strong> 99.99%<br />

Where elements of a <strong>Service</strong> are provided in pairs, including but not limited to the Network as a<br />

<strong>Service</strong> port pairs, the availability SLA will be deemed to be met whilst either port in the pair is<br />

available. The availability metric of either port will be 99%.


Where multiple <strong><strong>Service</strong>s</strong> are taken by the Customer, each SLA metric will apply only to the element<br />

of the <strong>Service</strong> to which it is stated to apply.<br />

Should more than one SLA metric be applicable to any one element of the <strong>Service</strong>, only the lowest<br />

SLA metric will apply to that element of the <strong>Service</strong>.<br />

Should the failure of a <strong>Service</strong> be caused by the failure of an Enabling <strong>Service</strong>, only the failure of the<br />

Enabling <strong>Service</strong> will be applicable for <strong>Service</strong> Credits<br />

Typical Changes<br />

Logicalis will ensure that all changes are carried out in a planned and authorised manner. The<br />

following lists the implementation timetable for standard changes. The implementation timetable for all<br />

other changes will be agreed in advance with the Customer.<br />

827<br />

Completion<br />

Time<br />

Network as a <strong>Service</strong><br />

Change<br />

24 hours Reconfigure physical networks (i.e. ports).<br />

24 hours Reconfigure logical networks.<br />

Internet as a <strong>Service</strong><br />

4 hours Reconfigure connectivity services (e.g. customer WAN, Internet


828<br />

Completion<br />

Time<br />

Computing as a <strong>Service</strong><br />

bandwidth).<br />

24 hours Reconfigure Blades.<br />

Change<br />

1 hour Activate/deactivate Blades provided under Guaranteed Blade<br />

service.<br />

2 hours Activate/deactivate Blades provided under Uncommitted Blade<br />

Storage as a <strong>Service</strong><br />

Days service.<br />

2 hours Reconfigure/grow/shrink volumes.<br />

2 hours Create/delete flex clones.<br />

2 hours Create/delete/revert to storage snapshot.<br />

48 hours Recover storage volume from tape backup.<br />

2 hours Snapshot of boot LUNS<br />

<strong>Service</strong> Interruptions


Planned maintenance of the hosting equipment, facility, software or other aspects of the services<br />

that may require interruption of the service will not be performed during normal working hours.<br />

Logicalis may however, interrupt the services outside of normal working hours for planned<br />

maintenance, provided that it has given the Customer at least three days' notice. Any maintenance<br />

events which occur during normal working hours, and which were not requested by the Customer, will<br />

be considered downtime for the purpose of service availability measurement. Logicalis will at all times<br />

endeavour to keep any service interruptions to a minimum.<br />

<strong>Service</strong> Reports<br />

Logicalis will provide the following monthly reports:<br />

Communication as a <strong>Service</strong><br />

<strong>Service</strong> reporting:<br />

829<br />

<strong>Service</strong> availability for the month;<br />

Summary of network Incidents in the month (total Incidents, % within SLA);<br />

Performance trends and issues to monitor.<br />

Network as a <strong>Service</strong><br />

<strong>Service</strong> reporting:<br />

<strong>Service</strong> availability for the month;<br />

Summary of network Incidents in the month (total Incidents, % within SLA);<br />

Port utilisation (average and peaks);


830<br />

Port errors (frame loss and CRCs);<br />

Internet service analysis;<br />

Performance trends and issues to monitor.<br />

Computing as a <strong>Service</strong><br />

<strong>Service</strong> reporting:<br />

<strong>Service</strong> availability for the month;<br />

Summary of computing Incidents in the month (total Incidents, % within SLA);<br />

Guaranteed Blade <strong>Service</strong> – Summary of days used;<br />

Uncommitted Blade Days – Summary of usage.<br />

Storage as a <strong>Service</strong><br />

<strong>Service</strong> reporting:<br />

<strong>Service</strong> availability for the month;<br />

Summary of storage Incidents in the month (total Incidents, % within SLA);<br />

Storage space utilisation (average and peaks).<br />

Contract Management<br />

<strong>Service</strong> reporting:<br />

Number of MACS implemented in the month;<br />

Number of additional MACS purchased in the month;<br />

Number of unused MACS carried forward to next month;<br />

<strong>Service</strong> Credits payable.<br />

<strong>Service</strong> Credits


To be agreed with Customer.<br />

<strong>Service</strong> Management<br />

<strong>Service</strong> Management will be in line with the processes defined within our Support <strong><strong>Service</strong>s</strong>.<br />

Logicalis Hosting and aaS Security<br />

Logicalis can locate our Data Centre within the Security Boundary of the <strong>PSN</strong> and can therefore<br />

provide Hosting and aaS at IL2-2-x and IL 3-3-x in accordance with:<br />

831<br />

HMG CESG/CPNI Guidance<br />

NIST Guidelines<br />

Industry best practice<br />

In order of preference and where available.<br />

Generic Telephony <strong><strong>Service</strong>s</strong><br />

Call Logging<br />

Logicalis provides a Call Logging <strong>Service</strong> for Customers (with the exception of the Indirectly<br />

Connected Sites). Logicalis:<br />

provides self service call logging reports;<br />

for Customers with multiple Sites, provides the capability to produce reports for all Sites from<br />

a single point;<br />

provides call logging training for new system managers at the agreed prevailing Charge


ensures that each Telephony platform (except those located on Indirectly Connected Sites) is<br />

equipped to provide call record information;<br />

ensures that records are created for all calls made or received;<br />

The call management system is configured to provide reports at all levels within the managed<br />

service from individual extensions to the whole <strong>Service</strong>.<br />

Logicalis provides access to the following set of reports. Three Months worth of data is available on<br />

line. Data between 3 Months and 6 Months old is available on request at nil Charge.<br />

832<br />

Summary by most used extension;<br />

Calls listed as recorded;<br />

Calls listed by extension;<br />

Summary by time and operator;<br />

Summary by extension and response;<br />

Extensions and calls reports;<br />

Summary by extension and rate;<br />

Summary by extension and zero-rated calls;<br />

Summary by time and line;<br />

Summary by daily response;<br />

Summary by department and category;<br />

Mobility summary transaction;<br />

Mobility per site per extension;<br />

Summary by department and area;<br />

Summary by extension and area.<br />

The Customer can request additional reports from Logicalis at additional charge.<br />

Logicalis provides reports on calls that pass between switching nodes. An additional record set gives<br />

details of the identity of local and remote parties to allow tracking of network break-in and breakout<br />

activity. Additional information includes:<br />

Date & time at termination of call<br />

Duration of call<br />

Answer delay response time<br />

Meter pulses (if available)<br />

Trunk access code


833<br />

Call account code<br />

Remote party details<br />

Trunks that have been reported as being faulty are indicated in the reports.<br />

The Telephony Call Logging <strong>Service</strong> is provided as an optional service for Indirectly Connected Sites<br />

at additional charge.<br />

Voicemail and Voice Processing <strong>Service</strong><br />

Logicalis operates a centrally controlled/located voicemail service. The voicemail service is available<br />

for all users of the Managed Telephony <strong><strong>Service</strong>s</strong> (with the exception of those users on Indirectly<br />

Connected Sites) and offers:<br />

voicemail boxes to users;<br />

the ability to call forward through the voice-processing systems to locations wherever<br />

Customers might be, together with the ability to change the location remotely;<br />

remote alarming of the delivery of a message into a mailbox;<br />

digital access to the switching infrastructure;<br />

access to mailboxes from any DTMF telephone:<br />

o internally by dialling the voicemail service number which is pre-configured on their site;<br />

o externally by dialling a PSTN number which gives access to the voicemail service;<br />

o the numbers dialled depend on the programming of the host voice switch; and<br />

o access to mailboxes is controlled by a security code, which is set by the mailbox user.<br />

sending of messages to other voicemail service users on an individual or group basis;<br />

full system management;<br />

full integration with the switching infrastructure;<br />

help desk available for Customers 24 hours a day 7 days a week;<br />

fault reporting facility available 24 hours a day 7 days a week;<br />

implementation of new voice processing services to both existing and new Sites.<br />

Calls to the voicemail are made in one of four ways:<br />

automatic redirection;<br />

user invoked or configured diversion;<br />

direct access;


guest access.<br />

The method of message waiting notification for the centrally controlled/located voicemail service<br />

depends on the type of PBX system the SAP is attached to and the type of telephone itself. The<br />

following message notifications are available:<br />

"tinkle" - a short, distinctive burst of ringing repeated at intervals;<br />

"light" - a visual indication of message waiting either on a lamp or LCD screen. This is the<br />

standard deployment for new installations;<br />

"stutter DT" - a form of interrupted dial tone which indicates a message waiting;<br />

"out dial" - involves the voicemail system dialling the extension and announcing a message;<br />

high pitch tone - an audible change in dial tone when handset lifted;<br />

notification to an appropriate pager where no manual intervention from a paging bureau is<br />

present. Where this facility is used, the Customer funds any resultant call usage costs;<br />

a combination of light and stutter dial tone is the standard deployment for all new<br />

installations.<br />

All centrally controlled/located voicemail service Customers are provided with a personal assistance<br />

facility that provides the caller with the option of pressing "0" and being transferred by the voicemail<br />

system to a SAP. The personal assistance SAP must also be a voicemail user. If the personal assistant<br />

fails to answer or is itself diverted to voicemail, the caller is transferred back to the voicemail system<br />

that then offers a choice of leaving a message or being transferred to the operator appertaining to the<br />

Site.<br />

Voice Mobility <strong><strong>Service</strong>s</strong><br />

Voice mobility services are offered to Customers with sites served by certain PBX systems. Voice<br />

Mobility is not available for Indirectly Connected Sites. The voice mobility service supports remote<br />

working and hot desking.<br />

834


Remote Working<br />

The Remote Working <strong>Service</strong> provides Customers with the ability to work remotely from their<br />

normal place of work. Once a Site is mobility enabled, Customers are configured for the remote working<br />

service by Logicalis upon request by the Customer. Once configured, the Customer is referred to as a<br />

“remote worker”.<br />

Remote workers are able to invoke the following features by using the appropriate feature codes<br />

(where the PBX supports these features):<br />

835<br />

Call back when free;<br />

Conference call;<br />

Inquiry call;<br />

Busy extension diversion;<br />

Call forwarding;<br />

Call offer;<br />

Call park;<br />

Call pick up;<br />

Call waiting indication;<br />

Do not disturb;<br />

Enquiry;<br />

Executive assistance;<br />

Executive intrusion;<br />

Group pick up;<br />

Hunt and distribution groups;<br />

Immediate extension diversion;<br />

Pull diversion;<br />

Ring no reply extension diversion;<br />

Save/repeat dialled number;<br />

Stored number dialling;<br />

Transfer.<br />

Hot-Desking


Hot-desking service provides Customers with the ability to work from either their normal place of<br />

work or certain other Sites. The Customer’s telephone number will terminate on the physical<br />

extension/SAP at which they are hot desking.<br />

The following aspects are applicable to the hot desking service:<br />

836<br />

A User becomes a hot desker by having their DDI number changed from a physical<br />

extension/SAP to a personal number. The personal number may be associated with a physical<br />

extension if the Customer has their own allocated SAP. Alternatively, it does not need to be<br />

associated with a physical extension at all, if the Customer does not have a physical<br />

extension/SAP at a Site.<br />

When a User is hot desking, the extension at which they work assumes the numbering and<br />

features of their own personal number, including dial access and divert settings.<br />

A hot desking user guide is made available in electronic format only.<br />

A personal number may be configured for either remote working or hot desking, or both. A<br />

personal number may be associated with a physical SAP or have no SAP associated with it.<br />

The PIN associated with a personal number (for remote working, hot desking, or both) should be<br />

changed from the default PIN the first time the service is used.<br />

Numbering <strong><strong>Service</strong>s</strong><br />

Non Geographic Number <strong>Service</strong><br />

Where requested by the Customer, Logicalis provides all or any of the following Non Geographic<br />

Number <strong><strong>Service</strong>s</strong> (NGNs) to Customers:<br />

0800 numbers which will provide a freephone number facility;<br />

0845 numbers which will provide a local call rate number facility;


0870 numbers which will provide a national call rate number facility;<br />

Golden Numbers;<br />

Platinum Numbers.<br />

Where the Customer has no preference as to the number allocated then Logicalis allocates a Non<br />

Geographic Number that is neither a Golden Number nor Platinum Number.<br />

Non Geographic Numbers which can be used from overseas locations can be made available by<br />

Logicalis upon request by the Customer.<br />

Directory Enquiry <strong><strong>Service</strong>s</strong><br />

Logicalis provides access to national and international directory enquiry services through the 118<br />

number range.<br />

Data Centre<br />

Logicalis’ Data Centre <strong><strong>Service</strong>s</strong> delivers the following<br />

837<br />

Internet services;<br />

email/website services;<br />

co-location/hosting;<br />

on-line storage.<br />

Conferencing/Messaging <strong><strong>Service</strong>s</strong><br />

Logicalis ImmersiV hosted conferences services, on demand, can be enabled via Customer’s own<br />

video-enabled network, or if the network cannot guarantee Quality of <strong>Service</strong> (QoS), Logicalis can


connect individual video-enabled sites to Logicalis’ Managed Video Network (MVN) and provide a full<br />

out-of-band service. That removes the requirement for costly and lengthy network upgrades, and<br />

ensures video doesn’t compete with your other business critical applications for bandwidth or<br />

resources.<br />

ImmersiV<br />

<strong>Service</strong><br />

Endpoint<br />

Subscription<br />

Network Trunk<br />

Connection<br />

Overlay Network<br />

Connection<br />

Personal Client<br />

User Account<br />

838<br />

Description Consumption Model<br />

The fee payable for a video endpoint<br />

(hardware-based system) to be registered<br />

to and managed by the ImmersiV service<br />

platform. <strong><strong>Service</strong>s</strong> include:<br />

Dialing Address Allocation (URI and<br />

Number)<br />

Address Book Provision<br />

Internet calling capability<br />

Network Security (Firewall and<br />

Firewall traversal)<br />

A high bandwidth connection between the<br />

customer WAN and the ImmersiV service<br />

platform. Inclusive to the connection is the<br />

provision of hardware required for endpoint<br />

registration and management, and firewall<br />

traversal to serve multiple video systems<br />

concurrently.<br />

A network connection dedicated for video<br />

traffic, which does not interact with the<br />

customer WAN. Overlay connection carry<br />

video traffic directly between endpoints and<br />

the ImmersiV service platform.<br />

A software based video communications<br />

tool, providing High Definition video and<br />

audio, address books, presence and<br />

content sharing, collaboration, email<br />

/desktop messaging-services; real-time<br />

information services.<br />

Per user per month<br />

Per connection<br />

Per connection<br />

Per user per month


Virtual Meeting<br />

Room (VMR)<br />

Video Personal<br />

Assistance<br />

(VideoPA)<br />

Video Call<br />

Recording<br />

Audio<br />

Conferencing<br />

Audio Personal<br />

Assistance<br />

Internet <strong><strong>Service</strong>s</strong><br />

839<br />

A centralized resource, available 24/7<br />

provided by the ImmersiV service platform,<br />

allowing up to 5 video systems to connect<br />

in the same call at the same time.<br />

Online personal video support to help set<br />

up single or multi-way calls and provide<br />

Quality of Experience interventions.<br />

Video recording for compliance or<br />

cataloguing and sharing of video<br />

conferences<br />

A reservation-less, on demand<br />

conferencing service available 24 hours,<br />

365 days a year. No end user equipment<br />

is provided by Logicalis. Logicalis provides<br />

every registered Customer with access<br />

numbers to access the conferencing<br />

service. To access this service each<br />

participant must call their local number and<br />

enter the participant PIN. All calls will be<br />

launched and managed by the<br />

chairperson.<br />

Online personal audio support to help set<br />

up single or multi-way calls and provide<br />

Quality of Experience interventions.<br />

Per VMR per month<br />

Per VideoPA interaction<br />

Per recorded minute<br />

Per minute<br />

Per minute<br />

Logicalis provides a resilient and scalable managed Internet Gateway solution for all Framework<br />

members that can be selected as an optional service.<br />

The Internet Gateway is a high speed un-contended solution that ensures maximum reliability with<br />

connectivity from multiple Internet transit providers and Internet Exchange points. The solution<br />

provides enhanced service levels with the ability to ‘flex’ the bandwidth rapidly and on demand.<br />

Logicalis manages the distribution of internet traffic depending on the most efficient routing to the<br />

destination network. In the event of a failure of a carrier’s network, traffic is automatically re-routed<br />

across the remaining connected networks at no additional cost.


840<br />

Schematic: Internet Gateway <strong>Service</strong><br />

Logicalis’ <strong>Service</strong> Catalogue provides all framework members with a detailed guide to framework<br />

inclusions such as WAN <strong><strong>Service</strong>s</strong>, Internet and Centralised Internet <strong><strong>Service</strong>s</strong> and Voice solutions so that<br />

service selection and the associated price are easy to understand.<br />

Email/website services


Logicalis provides a range of software from a range of vendors. These solutions are bespoke to the<br />

client’s environment.<br />

Co-location/Hosting<br />

Logicalis provides racks from 4 to 32kws within our facilities which are a perfect environment for<br />

even the highest performance computing environments.<br />

Our co-location service provides options covering - floor space, power and cooling according to your<br />

requirements. Optional ancillary services offered include:<br />

Local hands and eyes for routine support like tape/library maintenance and cyclic changes;<br />

Media rotation services and off-site storage for backups;<br />

Local and wide area network connection services;<br />

Local electrical connection work to cater for specific rack power supplies;<br />

Receiving and storing previously notified deliveries and despatch of equipment;<br />

Liaison with the customer’s technical and engineering staff and contracted third parties.<br />

Security management of access to the site is through formal pre-approval and identification<br />

processes. A dedicated rack level security package offers remote access management, control and<br />

monitoring negating the need for caged areas.<br />

On-line storage<br />

Logicalis delivers our On-line storage solutions via our Storage as a <strong>Service</strong> described within the<br />

previous sections.<br />

841


Security<br />

Logicalis’ Security <strong>Service</strong> delivers the following:<br />

Antivirus<br />

842<br />

antivirus;<br />

email scanning/filtering;<br />

firewalls;<br />

intrusion/spyware detection;<br />

authentication/access management;<br />

web/application sign-on services.<br />

Logicalis provides a range of antivirus software from a range of vendors. These solutions are<br />

bespoke to the client’s environment.<br />

Email scanning/Filtering<br />

Logicalis proposes a central Internet Filtering service, delivered from the PSAS platform, The service<br />

provides consistent Internet Filtering capabilities, features, functionality and levels of security to <strong>PSN</strong><br />

customers. It has been specifically engineered to integrate and operate as a single platform within a<br />

service provider grade network - delivering high performance, high availability, massive scalability and<br />

granular management, through a unique multi-tenant architecture.<br />

A high-level, topological overview of the Internet Filtering service is shown in the schematic below.


843<br />

Diagram: High-Level Topology – Internet Filtering<br />

Internet Filtering <strong>Service</strong> – Capability/Feature Summary<br />

A summary of the capabilities and features of the Internet Filtering service is summarised below:<br />

Internet Filtering Security Controls


844<br />

supports controlling bi-directional traffic flows (e.g. filter outgoing web requests, virus scan<br />

incoming content);<br />

URL Categories and Application Control for filtering access to websites, file types and<br />

applications;<br />

flexible, customisable white-lists; black-lists; usage quota; and time-of-day policies;<br />

end-user policy actions to block; allow; inform/coach when accessing sites possibly against<br />

policy; or restrict access against a usage quota;<br />

blocking content deemed illegal, explicit and/or inappropriate;<br />

support enforcement from legal authorities like the Internet Watch Foundation (IWF);<br />

filtering of traffic to block and/or remove any, spyware, virus, malware, phishing or other<br />

malicious content;<br />

real-time analysis, cleaning and/or blocking of content via an antivirus scanning mechanism;<br />

enforcement of browser standards (reducing exposure to browser vulnerabilities);<br />

transparent, in-line, deployment mode provides the ability to intercept evasive applications,<br />

such as Skype and peer-to-peer traffic; and identifying and blocking evasive outbound "phone<br />

home" traffic such as Bots;<br />

bandwidth management capabilities to ensure that internet traffic ; applications; and<br />

protocols, do not affect important network services;<br />

caching of internet content;<br />

inspection and control of SSL encrypted web content.<br />

Internet Filtering Security Management<br />

web based administrative GUI for the provider level and Partner/User level management,<br />

control and reporting;<br />

customisable <strong>Service</strong> Provider/Global, Partner and User-level policies;<br />

directory integration for individual username authentication, authorisation, accounting; group<br />

association; and policy mapping;<br />

each <strong>PSN</strong> Partner/User has access to their own management portal to where they can apply<br />

their own Internet Filtering configuration options, including the ability to generate reports;<br />

full multi-tenancy architecture which enables each <strong>PSN</strong> Partner/User to have a different<br />

experience and a self-customised service adapted to their specific requirements;<br />

policies and rules provisioned at the service provider level take a higher priority than the<br />

policies and rules provisioned at the Partner/User level, allowing centralised enforcement of<br />

rules like the IWF black list, if required.<br />

Internet Filtering Security Reporting<br />

hierarchical reporting, with global summary reports generated at a provider level, and then<br />

Partner/User level detailed reporting;


845<br />

reporting module to provides standard reports, with more than 100 templates and/or<br />

customised programmed reports, on-demand or by schedule;<br />

reporting on information for a predefined time period or set reports including daily, weekly,<br />

monthly and yearly;<br />

client level reporting provides the ability for each <strong>PSN</strong> Partner/User to self-generate reports<br />

for their organisation’s web activity, down to the individual username level.<br />

Firewall <strong><strong>Service</strong>s</strong><br />

Logicalis offers Firewall-as-a-<strong>Service</strong> and Managed Firewall <strong>Service</strong> options as an alternative to<br />

current in-house firewall solutions.<br />

Firewall-as-a-<strong>Service</strong><br />

Firewall-as-a-<strong>Service</strong> consists of highly available, EAL4 certified, hosted firewalls, to provide access<br />

controls, network address translation and connectivity to a variety of networks, including, but not<br />

limited to, the following:<br />

Internet & Remote Access Systems;<br />

GCSx;<br />

N3 National Health Network;<br />

<strong>Government</strong> Conveyance Network (GCN);<br />

Joint Academic Network (JANET);<br />

Other External and Third-Party networks (3rd Party Landing Zone).<br />

Stateful-inspection firewalls are used to provide access controls to enable controlled<br />

internetworking between the various networks and to limit the external attack surface of the network.<br />

The firewall technology has been specifically engineered to integrate and operate as a single platform<br />

within the network, delivering high performance; high availability; scalability; and management, with a<br />

unique multi-tenant architecture.


In order to meet various Codes of Connection, there are two products used to deliver the Firewall-<br />

as-a-<strong>Service</strong>; Cisco and Juniper. However Logicalis is open to exploring the use of Checkpoint in to the<br />

<strong>Service</strong> if necessary.<br />

In addition, Logicalis provides a Managed Firewall <strong>Service</strong> to facilitate communication between<br />

MPLS VPNs and VRFs if necessary. The Customer may additionally elect to take the Managed Firewall<br />

<strong>Service</strong>, from the <strong>Service</strong> Catalogue, and apply it to their Firewall-as-a-<strong>Service</strong> instance.<br />

Managed Firewall <strong>Service</strong><br />

The delivery of high-quality security is a function of the time to respond effectively to an incident.<br />

That time includes the time required to get to the problem, the time to understand the problem, and<br />

the time to instigate a resolution process for the problem. Dedicated service and specialist input is the<br />

only way to provide low response times for business critical services. Where incidents occur out of<br />

normal working hours, this becomes even more critical.<br />

A brief summary of the Managed Firewall <strong>Service</strong> is summarised below:<br />

846<br />

24x7 remote monitoring and management of firewall infrastructure;<br />

support staff available on a 24x7 basis;<br />

monitoring is delivered using industry standard protocols such as SNMP and Syslog, and<br />

through vendor-specific channels, integrated into the management and security event<br />

monitoring systems;<br />

monitoring and management technologies are a mixture of intellectual property, open source<br />

software and commercial applications, developed and integrated to provide security specific<br />

system management and monitoring capabilities;<br />

management at a service level to diagnose and correct problems associated with the complex<br />

traffic flow and inter-operation of service elements, and at a security level to ensure that no<br />

weak points exist in this critical infrastructure;<br />

administrative management and maintenance of software and hardware licences;<br />

minor patching and updating of system to deal with security threats;


installation of upgrades under software and hardware licences;<br />

pro-active notification of system upgrades, required or desirable, to deal with security threats<br />

(dealt with under Change Management process)<br />

careful and timely preventative maintenance, particularly the implementation of patches,<br />

bug-fixes and upgrades;<br />

incident response, action, updates and resolution in accordance with SLA;<br />

managed change and incident control;<br />

security assessment of system change requests;<br />

replacement/repair in the event of failure;<br />

reports and management information available to back up the service provided.<br />

By working with the Customer, third parties and accreditors, the detailed design, configuration and<br />

documentation of the firewalls, is confirmed and implemented. Once live, further changes are<br />

undertaken through a change control process. Regular assessment of the configuration, including formal<br />

annual health checks, is an important part of any accreditation and re-accreditation assessment and is<br />

done at agreed intervals.<br />

Managed Intrusion Detection <strong>Service</strong> (IDS)<br />

Logicalis offers Managed Intrusion Detection <strong><strong>Service</strong>s</strong> options across key Core WAN aggregation<br />

points, Customer Edge (CE) routers and individual customer deployments. The service provides real-time<br />

monitoring and interpretation of important system events throughout the managed network, including<br />

unauthorised activity, malicious attack, early-warning of malware infection such as worms, anomalous<br />

behaviour and trend analysis, providing the first, and most critical, step in an incident response process.<br />

The Managed Intrusion Detection <strong>Service</strong> provides the following benefits to customers:<br />

847<br />

lower total cost of ownership – managing your host and network intrusion detection systems<br />

on your behalf saves you time and money by reducing your staffing, training, and maintenance<br />

costs;<br />

enhanced capability to assess return on security investment;<br />

24x7 management, monitoring, and support – security analysts work nights, weekends, and<br />

holidays because hackers and malware pose a threat all day, every day;


848<br />

reduce the window of exposure of systems, thereby limiting spread and damage of attack;<br />

reduce network down-time through measured response to intrusions;<br />

increase the accuracy of detection of attacks against networks;<br />

provide visibility of malicious activity right down to critical components;<br />

highlight anomalous network activity due to malware and badly configured hosts;<br />

trained and dedicated professionals – an extensive team of certified security professionals<br />

who are trained to manage the intrusion detection systems of leading industry vendors;<br />

receive comprehensive threat investigation through trusted processes, people and<br />

technology;<br />

receive early notification of worm activity and other malicious activity.<br />

Managed IDS - Core WAN Aggregation Points<br />

Logicalis uses a variety of automated methods to monitor the Core WAN and identify malicious<br />

traffic. The solution is monitored in accordance with CESG recommendations and Logicalis uses the<br />

Incident Management processes to manage security incidents, to take appropriate actions as required,<br />

and to notify affected parties.<br />

The Intrusion Detection <strong>Service</strong> monitors network traffic flows in the environment for anomalous,<br />

malicious and unwanted traffic, in turn feeding logs and events into a Protective Monitoring and Logging<br />

<strong>Service</strong>. The following data is consumed as part of the service:<br />

NetFlow Data to provide information about network behaviour and traffic patterns, which is<br />

used as a baseline for anomaly detection routines;<br />

Intrusion Detection/Prevention Systems (IDS/IPS) provide deep-packet level inspection as a<br />

further security control for enabling safe internetworking between various networks, and to<br />

monitor for unwanted and potentially malicious traffic;<br />

Network Telescopes (Darknets and Greynets) are used to observe traffic sent to the unused IP<br />

address-space of the network, as this is normally suspicious and one can gain information about<br />

possible attacks by observing it. Suspicious traffic is directed to a contained, black-hole<br />

environment, monitored by intrusion detection systems for further in-depth analysis by the<br />

following techniques:<br />

o stateful signature detection techniques are applied to relevant portions of the network<br />

traffic, determined by the appropriate protocol context, to help reduce false positives;


849<br />

o protocol anomaly detection confirms protocol usage against published RFCs is verified to<br />

detect any violations or abuse and proactively protects networks from undiscovered<br />

vulnerabilities;<br />

o heuristic-based anomalous traffic patterns and packet analysis detects trojans and<br />

rootkits, to prevent proliferation of malware, in case other security measures have been<br />

compromised;<br />

o traffic anomaly detection is done using heuristic rules to detect unexpected traffic<br />

patterns that may suggest reconnaissance or attacks. This can help proactively prevent<br />

reconnaissance activities or block Distributed Denial of <strong>Service</strong> (DDoS) attacks;<br />

o Denial of <strong>Service</strong> (DoS) detection using SYN cookie-based protection from SYN flood<br />

attacks is provided, to protect your key network assets from being overwhelmed with<br />

SYN floods;<br />

o Network Based Application Recognition (NBAR) is a classification engine within Cisco IOS<br />

software that uses deep and stateful packet inspection to recognise a wide variety of<br />

applications. When used in a security context, NBAR can detect worms based on<br />

payload signatures.<br />

Managed IDS - Customer Edge (CE) Routers<br />

Logicalis provides options for Customer Edge (CE) signature-based IPS that allow effective mitigation<br />

of a wide range of network attacks, which in turn allow the network to defend itself while accurately<br />

identifying, classifying, and stopping/blocking malicious or potentially damaging traffic in real time.<br />

The CE Router IPS services include the following:<br />

enables distributed network wide threat mitigation;<br />

protects against worms, viruses, and a large variety of network threats and exploits;<br />

Uses CE routing capabilities to deliver integrated functionality;<br />

supports inspection of traffic passing through any LAN/WAN interface in both directions;<br />

compliments dedicated IPS appliances and provides protection against a dynamic subset of<br />

network attacks;<br />

supports more than 1600 of the same attack signatures that the IPS appliances support;<br />

compliments CE Firewall and VPN solutions for superior threat protection at all entry points<br />

into the network.<br />

Managed IDS - Processes


The service follows approved processes in delivering high quality service management and security<br />

best practice. The key steps cover the following critical elements:<br />

850<br />

alert - data is gathered, aggregated, correlated and analysed from multiple network and<br />

security systems, and alerts raised when events occur which require attention;<br />

react – analysts provide skilled, intelligent and timely monitoring of threats as they are<br />

identified through the security management systems. As soon as the technology flags a warning,<br />

trained security analysts are cross-checking, reviewing and initiating response processes;<br />

prepare – analysts undertake threat reconnaissance, information gathering and<br />

countermeasure recommendations on the issue, communicating with appropriate teams to coordinate<br />

and agree the right response to the situation in hand;<br />

contain - as appropriate, assist or advise in the execution of action to limit the attack, end the<br />

attack in progress and recover from any damage caused;<br />

report - event collection and monitoring from servers as well as security devices enables the<br />

ability to provide the clearest and most detailed reports on threats and incidents;<br />

improve – the philosophy in security management is firmly grounded in the development of<br />

close communication and trust of our customers. Continuous feedback and review cycles<br />

improve customer’s security posture, ensuring that future incidents are handled more smoothly<br />

and that security gaps are plugged.<br />

Remote Access <strong>Service</strong> - Authentication/access management/web/application sign-on services<br />

The Remote Access <strong>Service</strong> consists of two main components:<br />

1. SSL VPN functionality, delivered by FIPS140-2 and CCTM certified, highly-available appliances;<br />

2. strong, two-factor authentication functionality, delivered using one-time password hardware<br />

fobs/tokens.<br />

Logicalis offers a central Remote Access <strong>Service</strong>, delivered from the PSAS platform, as an alternative<br />

to the current remote access solutions. The service provides consistent remote access capabilities,<br />

features, functionality and levels of security to <strong>PSN</strong> customers.<br />

It has been specifically engineered to integrate and operate as a single platform within the network -<br />

delivering high performance, high availability, scalability and granular management through a unique


multi-tenant architecture. It has the ability to scale to thousands of individuals with additional licenses<br />

and upgrades of hardware components as necessary.<br />

A high-level, topological overview, of the Remote Access <strong>Service</strong> is shown in the schematic below.<br />

851<br />

Diagram: Remote Access <strong>Service</strong>


Remote Access VPN <strong>Service</strong><br />

Logicalis offers a carrier class, managed and unmanaged, SSL VPN remote access service as an<br />

alternative to current in-house remote access VPN solutions. Logicalis is partnering with vendors that<br />

have over a decade of experience delivering carrier class solutions for service providers around the<br />

world, to deliver this service.<br />

The service is based on technology that has the CESG Claims Tested Mark (CCTM), while CESG<br />

Tailored Assurance <strong><strong>Service</strong>s</strong> (CTAS) is enlisted to evaluate and accredit the service where appropriate.<br />

The CCTM certificate covers the use of the technology for security environments up to and including<br />

IL2 (PROTECT), but the same technology has been approved by CESG for use at IL3 (RESTRICTED) –<br />

through specific guidance, and to meet CESG guidance indicated in:<br />

852<br />

GPG10 – Remote Working;<br />

GPG13 – Protective Monitoring;<br />

Manual T – Use of Transport Layer Security (TLS);<br />

Manual V – Use of IPsec.<br />

A description of the capabilities and features of the Remote Access VPN service is detailed below:<br />

Remote Access VPN - Access Methods<br />

The service uses SSL transport - the secure access protocol built into every standard web browser.<br />

SSL sessions enable any web-enabled device such as a corporate laptop, PDA, smartphone, or kiosk to<br />

securely access an organisation’s resources without the cost and complexity of installing, configuring,


and maintaining any client software on the user device. The temporary VPN connections that SSL<br />

browsers establish also eliminate the firewall and network address translation (NAT) issues of traditional<br />

IPsec VPN products.<br />

The service includes three different access methods. These different methods are selected as part of<br />

the user’s role, allowing the administrator to enable the appropriate access on a per-session basis,<br />

taking into account user, device, and network attributes in combination with enterprise security policies.<br />

The three different access methods are:<br />

Clientless Core Web Access provides access to web-based applications, including complex<br />

JavaScript, XML, or Flash-based apps and Java applets that require a socket connection, as well as<br />

standards-based email like Outlook Web Access (OWA), Windows and UNIX file share, telnet/SSH<br />

hosted applications, terminal emulation, Sharepoint, and others. This provides the most easily<br />

accessible form of application and resource access, and enables extremely granular security control<br />

options; completely clientless approach using only a Web browser.<br />

Secure Application Manager (SAM) is a lightweight Java or Windows-based download which<br />

enables access to client/server applications and also provides native access to terminal server<br />

applications, without the need for a preinstalled client. This enables access to client/server<br />

applications using just a Web browser; no client software is necessary.<br />

Network Connect provides complete network-layer connectivity via an automatically provisioned<br />

cross-platform download and users need only a Web browser to initiate the connection.<br />

Remote Access VPN - Capabilities & Features<br />

The service provides complete, end-to-end layered security, including endpoint client, device, data,<br />

and server layered security controls, including the following:<br />

Instant Virtual Systems (IVS) enable complete customer separation and provides segregation of<br />

traffic between multiple customers. Each customer is provided access to their own unmanaged, or<br />

optionally managed, virtual SSL VPN appliance, per customer. This enables the secure segregation of<br />

an individuals’ traffic, even if two customers have overlapping IP addresses.<br />

Logicalis can tailor the offering to control the degree of management and configuration that<br />

customers wish to have, using the built-in Role-Based Access Control of the service. The service is<br />

flexible enough to cater for variations and is agreed on a customer-by-customer basis.<br />

853


Resource Authorisation features deliver granular tailored access to resources through roles,<br />

policies, mappings, authorisation and individual look and feel for users.<br />

Single Sign-On allows users to access other applications or resources that are protected by<br />

another access management system without re-entering login credentials, alleviating the need for<br />

end-users to enter and maintain multiple sets of credentials for web-based and Microsoft<br />

applications.<br />

Cross-platform support delivers the ability for any platform to gain access to resources such as<br />

Windows, Mac, Linux, or various mobile devices including iPhone, Windows Mobile, Symbian, and<br />

Android. This provides flexibility in allowing users to access corporate resources from any type of<br />

device using any type of operating system.<br />

With the Host Checker, client computers can be checked, both prior to and during a session, to<br />

verify an acceptable device security posture requiring installed/running endpoint security<br />

applications (antivirus, firewall, encryption), other built in checks including verifying ports<br />

opened/closed; checking files/processes and validating their checksums; verifying registry settings;<br />

machine certificates; distinguish between managed/unmanaged devices; and more. This<br />

verifies/ensures that endpoint devices meet security policy requirements before granting access,<br />

remediating devices, and quarantining users when necessary.<br />

Secure Virtual Workspace provides a secure and separate environment for remote sessions that<br />

encrypts all data and controls I/O access (printers, drives). A cache cleaner that erases all proxy<br />

downloads and temp files at logout. This ensures that no potentially sensitive data and/or metadata<br />

is left behind on the endpoint device and all corporate data is securely deleted from a kiosk or other<br />

unmanaged endpoint after a session.<br />

Virtual Desktop Infrastructure (VDI) support, allows interoperability with VMware View Manager<br />

and Citrix XenDesktop to enable administrators to deploy virtual desktops with the <strong>Service</strong>. This<br />

provides seamless access to remote users to their virtual desktops hosted on VMware or Citrix<br />

servers, dynamic delivery of the Citrix ICA client or the VMware View client, including dynamic client<br />

fallback options to allow users to easily connect to their virtual desktops.<br />

granular auditing and logging can be configured to the per-administrator/user, per-resource, perevent<br />

level for security purposes as well as capacity planning. This provides fine-grained auditing<br />

and logging capabilities in a clear, easy to understand format.<br />

optional Enhanced Endpoint Security provides a full-featured, dynamically deployable antimalware<br />

module that is an OEM of an industry-leading spy sweeper product, using a signature<br />

database to detect and remove a wide array of contemporary threats including types of malware,<br />

trojans, worms, and adware. New anti-malware updates and capabilities are delivered to each user<br />

device via a .msi package, downloaded to each endpoint and silently installed during the remote<br />

access VPN logon process<br />

optional In-Case-of-Emergency (ICE) licensing enables the service to temporarily support a large<br />

number of users, for up to eight weeks, during unexpected events like disasters; pandemics; mass<br />

travel disruptions; weather conditions; etc.<br />

the optional Premier Java RDP Applet is a platform independent solution for accessing Microsoft<br />

Terminal/Remote Desktop <strong><strong>Service</strong>s</strong>, centralising administration of all user and configuration data -<br />

including extensive print functions to cut administration and avoid hassles with local and/or network<br />

printing.<br />

854


Section 9 Support <strong><strong>Service</strong>s</strong><br />

Logicalis is able to provide differing levels of support services for Communication solutions, including<br />

all network, voice, data centre and storage fabric elements and interfaces to other systems – firewalls<br />

etc. Support services include Break/Fix Maintenance and Fully Managed <strong><strong>Service</strong>s</strong>.<br />

Customers are offered the flexibility to mix and match these services within their estate.<br />

Break/Fix Maintenance<br />

Parts Replacement & Reactive Break/Fix<br />

Logicalis offers customers the ability to maintain their estate through a reactive support contract<br />

providing either a ‘parts replacement’ service or a ‘break/fix’ service where Logicalis provides<br />

replacement parts and an engineer to correct any faults.<br />

These services are modular and can be tailored to meet exact fix time requirements based on each<br />

unit of hardware covered, depending on the business critical nature of that piece of hardware and the<br />

SLA required.<br />

Support of Legacy Equipment<br />

Where Logicalis is assuming support for legacy equipment, Logicalis audits the estate. The audit<br />

provides us with a base inventory to work from.<br />

On completion of the audit, the equipment list is analysed to identify those with a simple cost<br />

effective support route, normally with a vendor involvement for software and third line<br />

855


support. Products which are more difficult to support will require analysis to ensure the best support<br />

service such as using legacy spares holdings or replacement with new, on failure.<br />

Take-on of Existing Equipment<br />

The first stage of the take on of existing environments is to ensure the current standards actually<br />

fulfil service to a best practice standard. This is important to understand the potential costs of the setup<br />

of a service and also allows analysis of the gap between the standard and the current solutions that are<br />

in place.<br />

Should a full refresh be required this is undertaken through a consultancy process and charged in<br />

accordance with the rate card included in the <strong>Service</strong> Catalogue. Consultants used for this exercise are<br />

qualified with vendor accreditations for the equipment specified.<br />

<strong>Service</strong> Levels<br />

Hours of cover can be split across three different services levels:<br />

24x7;<br />

856<br />

8 am to 6 pm (in hours operation);<br />

6 pm to 8 am (out of hours operation).<br />

Fault Reporting and Diagnosis<br />

In the event of the Customer detecting any fault in the maintained equipment the Customer will<br />

notify Logicalis’ <strong>Service</strong> Desk during cover hours specifying the maintained equipment concerned, the<br />

serial number(s) and site address and whatever information is available regarding the fault, including<br />

any results of any the Customer-performed diagnostics.


Following the reporting of a fault by the Customer (or the detection of a fault by Logicalis through<br />

monitoring of the Equipment where this service is provided) Logicalis will raise an incident on the<br />

Incident Management System (IMS).<br />

The <strong>Service</strong> Desk will assess the nature of the fault giving rise to the incident and attempt to provide<br />

a resolution.<br />

Initially, the <strong>Service</strong> Desk and the Customer may if necessary conduct a discussion over the<br />

telephone, or an exchange of emails, to attempt to carry out diagnosis and resolution of the fault in<br />

question.<br />

The <strong>Service</strong> Desk may also use remote access to carry out diagnosis of faults; subject always to<br />

complying with pre agreed security controls.<br />

Logicalis will be responsible for notifying the Customer of the incident reference number, entering<br />

updates on the IMS regarding the status of the Incident, resolving the fault remotely and or dispatching<br />

an engineer and/or replacement parts to Site.<br />

Following resolution of the fault giving rise to an Incident, the <strong>Service</strong> Desk will be responsible for<br />

obtaining the Customer’s agreement that the fault has been resolved to the Customer’s<br />

satisfaction. Logicalis will record who, at the Customer, agreed that the fault had been resolved in the<br />

call log comments. The log will then be closed.<br />

If Logicalis diagnoses that the problem lies with equipment that is not Maintained Equipment it will<br />

confirm this with the Customer to update and close the Incident.<br />

On Site <strong><strong>Service</strong>s</strong><br />

Any part of the Maintained Equipment which develops a fault will at Logicalis’ option either:<br />

857


Be repaired; or<br />

Be replaced by parts with equivalent functionality on an exchange basis, whereby the removed part<br />

will become the property of Logicalis and the replacing part will become the property of the Customer<br />

(if the Customer does not to allow the removed part to be taken by Logicalis then Logicalis reserves the<br />

right to charge the Customer for the replacing part); or<br />

Be replaced by parts with equivalent functionality on a loan basis, whereby Logicalis will continue to<br />

own the replacing part and will repair and reinstall the original part as soon as is reasonably possible.<br />

The services include the replacement of disk drives subject to the <strong>Service</strong> Exceptions and provided<br />

that the fault is not caused by the use of storage media not recommended by Logicalis. Should a<br />

replacement disk be required,Logicalis will, at the request of the Customer, reinstall the operating<br />

system.<br />

If a service call is made and Logicalis is unable to gain access to the Maintained Equipment, Logicalis<br />

reserves the right to charge for any call-out at Logicalis’ then standard time and materials rates.<br />

Advance Hardware Replacement<br />

Logicalis will supply replacement parts to the Customer to replace the Customer’s faulty Maintained<br />

Equipment before, or at the same time as the Customer returns the faulty equipment to Logicalis.<br />

Logicalis retains the right to charge the Customer for the replacement part or an equivalent piece of<br />

equipment with similar specification should the Maintained Equipment in question not be returned to<br />

Logicalis within five (5) working days of delivery of the replacement part.<br />

The Customer will retain all packaging for the replacement part provided in accordance with this<br />

paragraph and re-utilise the same, or provide packaging of similar performance for the return of<br />

858


Maintained Equipment. The Customer will take all due care to pack the faulty Maintained Equipment in<br />

such a way as to protect it from damage during transit.<br />

Logicalis will pass to the Customer so far as it is legally able to do so, any warranty provision<br />

applicable to the replacement part and provided by the original manufacturer of the replacement part.<br />

<strong>Service</strong> Exceptions<br />

Logicalis will not be obliged to provide <strong><strong>Service</strong>s</strong> to remedy faults in the Maintained Equipment<br />

caused by:<br />

1. Installation or repair of the Maintained Equipment (including electrical work) by someone other<br />

than Logicalis;<br />

2. Failure to comply with the conditions of use of the Maintained Equipment or (save where the<br />

Maintained Equipment is also Co-location Equipment) environmental conditions as set out in the<br />

manufacturer’s documentation;<br />

3. Accident, fire or water damage, neglect, misuse or abuse of the Maintained Equipment other than<br />

by Logicalis;<br />

4. The relocation, modification or addition to any of the Maintained Equipment without the approval<br />

of Logicalis or a defect caused by equipment not supported by Logicalis or by any other service not<br />

performed by Logicalis;<br />

5. Use or connection of the Maintained Equipment to or with software or equipment not suitable for<br />

such use or connection or which interferes with the proper functioning thereof, other than by<br />

Logicalis;<br />

6. Maintained Equipment is End of Life. Logicalis will use reasonable endeavours and in accordance<br />

with the original manufacturers recommendations advise the Customer when Maintained<br />

Equipment is coming towards its end of life to give the Customer an opportunity to bring the<br />

Maintained Equipment up-to-date;<br />

7. The Customer failing to implement Quality of <strong>Service</strong> on its data network as required to operate a<br />

Voice <strong>Service</strong>.<br />

The <strong><strong>Service</strong>s</strong> do not include:<br />

859<br />

Supply of consumables;<br />

Replacement of impact or inkjet print heads;<br />

Replacement of laser printer fuser units or transfer/pick up rollers;<br />

Replacement of flat screens, displays or liquid crystal displays;


Repair or replacement of additional items installed in PCs or servers unless the item is listed<br />

on the Equipment Schedule or fitted as standard by the manufacturer;<br />

Failures caused by faulty media.<br />

If on investigation Logicalis reasonably determines that a fault is as a result of any of the matters<br />

referred to in the Exceptions then the Customer will pay Logicalis for all time and materials reasonably<br />

expended by Logicalis in investigating the same.<br />

Logicalis will not be obliged to provide <strong><strong>Service</strong>s</strong> at any Site if Logicalis reasonably considers that the<br />

conditions at the Site represent a risk to the health or safety of any Logicalis personnel.<br />

Access to the Sites<br />

Where Logicalis requires access to the sites in order to remedy a fault or suspected fault in the<br />

Maintained Equipment it will arrange such access via the Customer. The Customer will provide Logicalis’<br />

<strong>Service</strong> Desk with all necessary information to enable Logicalis’ representative to gain access to the<br />

relevant Site, including site rules and security arrangements, the name and telephone number of a<br />

contact at the Site, parking arrangements, specific access requirements for the Site and any out of hours<br />

access arrangements which apply.<br />

Logicalis will abide by such health and safety, site access and security procedures of the Customer as<br />

are made known to Logicalis in advance.<br />

Escalation<br />

Logicalis has a published escalation procedure and will implement this escalation procedure in<br />

agreement with the Customer.<br />

Additions and Deletions<br />

The Customer may add Equipment to or delete Equipment from this Agreement in accordance with<br />

the Additions and Deletions of the main contract.<br />

860


Contractor Items<br />

Logicalis Items remain the exclusive property of Logicalis. The Customer may use such Logicalis<br />

Items only for activities related to the <strong><strong>Service</strong>s</strong> and may not modify, remove or transfer Logicalis Items<br />

or make them, or any resultant diagnostic or system management data, available to other parties<br />

without Logicalis’ written consent. Upon termination of this Agreement the Customer will, at Logicalis’<br />

option, destroy or return all Logicalis Items in its possession.<br />

Fully Managed <strong><strong>Service</strong>s</strong><br />

This service provides pro-active life-cycle management of the Customer’s infrastructure and is<br />

delivered to compliment the work of the ICT department. It takes away their day-to-day operational<br />

tasks and is serviced by front-line MSC staff providing first and second line support services backed up<br />

by a third line support team and 4th line going backed off to the equipment vendor or manufacturer.<br />

The service is typically provided remotely, but can be enhanced by the deployment of on-site<br />

resource which may involve TUPE considerations.<br />

The remote and on-site resources operate the same toolsets and processes across the infrastructure<br />

management service, utilising Logicalis’ Enterprise Class Management platforms including CA’s Spectrum<br />

Infrastructure Manager and eHealth Performance Manager.<br />

Logicalis provides a front-line Single Point of Contact (SPOC) for the infrastructure which can include<br />

the management of third party resolution agencies. This ensures consistent and effective service<br />

management.<br />

The Fully Managed <strong>Service</strong> includes the following:<br />

861


862<br />

equipment procurement;<br />

implementation services;<br />

comprehensive 24 x 7 monitoring service;<br />

incident monitoring and notification;<br />

liaison with 3rd party resolution agencies such as carriers for line faults etc;<br />

hardware break/fix service;<br />

configuration backup and archival ;<br />

standard or enhanced <strong>Service</strong> Management – <strong>Service</strong> Delivery Manager (SDM);<br />

o regular service reviews<br />

o service review reports;<br />

o incident management visibility;<br />

o performance reports through portal<br />

additional Enhanced Level <strong><strong>Service</strong>s</strong>;<br />

full incident and problem management;<br />

managed change control;<br />

o configuration management;<br />

o moves, adds and changes;<br />

o patch and release management advice;<br />

The following <strong>Service</strong> Matrix summarises the service components that are provided as part of this<br />

service as standard:<br />

<strong>Service</strong> Component<br />

<strong>Service</strong> Delivery Management<br />

<strong>Service</strong> Desk<br />

Incident Management<br />

Provided<br />

for Voice<br />

Provided<br />

for ACD


863<br />

Problem Management<br />

Maintenance<br />

Proactive Monitoring<br />

Change Management<br />

Configuration Management<br />

Capacity Management<br />

Release Management<br />

Supplier Management<br />

<strong>Service</strong> Reviews & Reporting<br />

Continuity Management<br />

Equipment Reporting<br />

<strong>Service</strong> Credits<br />

Continuous <strong>Service</strong> Improvement<br />

Escalation Management<br />

Performance Standards


Logicalis will provide the <strong><strong>Service</strong>s</strong> in accordance with the performance standards as set out in this<br />

section and in the Maintenance <strong><strong>Service</strong>s</strong> section. Where applicable, Logicalis’ failure to meet a <strong>Service</strong><br />

Level will entitle the Customer to receive the financial credits.<br />

<strong>Service</strong> Desk<br />

<strong>Service</strong> Responsibilities<br />

A service desk facility will be provided within the MSC that will act as the focal point for the<br />

management and delivery of the <strong><strong>Service</strong>s</strong>.<br />

The service desk will co-ordinate the actions of the support staff, both on the Customer’s site and its<br />

own site, in the delivery of the <strong><strong>Service</strong>s</strong>.<br />

The service desk will interface with the Customer’s own service desk facility and not directly with<br />

the Customer’s end users.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

<strong>Service</strong> Element Hours Days<br />

<strong>Service</strong> Desk availability 24 per day 7 per week<br />

864


<strong>Service</strong> Level Targets<br />

The service desk will be staffed by appropriately qualified personnel.<br />

865<br />

the Customer Responsibilities<br />

the Customer will provide its own service desk facility that will be the first line of support for<br />

its end users.<br />

Incident Management<br />

The Logicalis Incident Management process for <strong>PSN</strong> is owned and operated by the MSC and <strong>Service</strong><br />

Desk. The MSC and <strong>Service</strong> Desk have a defined Disaster Recovery plan, so that in the event of a disaster<br />

service delivery and support functions can be moved to an alternate location, or otherwise switched<br />

across to another <strong>Service</strong> Centre.<br />

Logicalis acts as a seamless extension of the existing service management regime, interfacing with<br />

the Customer through clearly defined demarcations of responsibility, informational exchanges and –<br />

where relevant - common process workflows.


Logicalis’ standard service operating model is to provide a 2nd line <strong>Service</strong> Desk that integrates into<br />

a customer’s internal 1st line IT <strong>Service</strong> Desk (in this case the Customer). As such, we are experienced in<br />

understanding how to construct (or integrate into) common end-to-end service delivery and support<br />

processes that involve multiple parties taking part in multiple workflows, and the importance of<br />

demarcations of responsibility, handover regimes, and stop clock procedures. This involves providing an<br />

integrated peer-to-peer support environment (as can be seen from the diagram above) based on robust<br />

<strong>Service</strong> Desk processes and a <strong>Service</strong> Delivery Management and governance overlay.<br />

Logicalis utilises our standard ITIL based processes and systems to manage faults and incidents as<br />

required. Using our service management system Logicalis manages incident notification, the stopping<br />

and starting of support clocks and any escalations required (both internally and with the Customer). The<br />

system is also used to manage any Operating Level Agreements with the Customer. Monthly service<br />

866


eviews present the opportunity to identify, review and address any issues related to the operational<br />

interface between Logicalis and the Customer.<br />

The referential integrity of incident ticket data will be maintained between Logicalis and the<br />

Customer, with incident references from the respective <strong>Service</strong> Management systems being recorded<br />

for any given incident.<br />

As described earlier, integration of the Logicalis and the Customer’s service management systems<br />

(for incident ticketing) is possible, either by API, scripting, automated e-mailing of incident event data, or<br />

otherwise manual entry. Further dialogue is required to determine the most appropriate and effective<br />

mechanism to achieve timely population of the respective systems with information relating to any<br />

given incident, and ensuring referential integrity between the two.<br />

During the transition phase, a <strong>Service</strong> Definition Document and ‘Run Book’ is compiled, which<br />

defines all the operational touch points between Logicalis, the Customer, the processes for exchange of<br />

information and data, and any process or procedural anomalies that need to be taken into account with<br />

this particular <strong>Service</strong>. It is during this phase that requirements such as support scripts is captured and<br />

defined to assist the Customer with identification, triage and classification of issues at the 1 st line.<br />

A flexible approach is also taken to report generation, allowing specific metrics to be reported on<br />

directly to the Customer. The <strong>Service</strong> Delivery Manager is as the operational liaison between Logicalis<br />

and the Customer for matters of process, governance and escalation.<br />

<strong>Service</strong> Responsibilities<br />

867


Logicalis will provide, manage and support an incident management service through the service<br />

desk that will be the focal point for managing the resolution of incidents in accordance with service<br />

levels agreed between the Customer and Logicalis.<br />

The incident management service will be available on a 24 x 7 x 365 basis for incidents to be raised<br />

by authorised Customer staff, the Customer’s 3rd party staff and Logicalis’ own support teams.<br />

The following methods of raising incidents within Logicalis’ incident management service will be<br />

provided:<br />

By telephone call to Logicalis’ service desk;<br />

By email to Logicalis’ service desk;<br />

By raising an incident in the Customer’s service desk;<br />

By capturing an alert from Logicalis’ management platform.<br />

Logicalis’ service desk will proactively update the relevant the Customer teams of the progress of<br />

incident resolution at the agreed intervals.<br />

Logicalis’ service desk will be responsible for obtaining agreement from the Customer’s incident<br />

owner that the fault has been resolved to their satisfaction. Only once confirmation has been received<br />

will the incident be marked as “closed”.<br />

Where any incident is discovered in software forming part of the Equipment which cannot be fixed<br />

by replacing any units or parts of the Equipment, Logicalis will use its reasonable endeavours to provide<br />

a work-around and to obtain a permanent solution from the Equipment manufacturer.<br />

Connectivity <strong><strong>Service</strong>s</strong><br />

868


It will be the responsibility of the Customer to arrange the provision, installation and maintenance<br />

of the network services and associated termination equipment necessary to connect the infrastructure<br />

in Logicalis’ Data Centre to the Customer locations. Payment for all such works and services will be the<br />

responsibility of the Customer.<br />

The Customer and/or their nominated network service provider will liaise with Logicalis to ensure<br />

such network services conform to the standards required by Logicalis for performance of the <strong><strong>Service</strong>s</strong>.<br />

The performance of such network services will not be the responsibility of Logicalis, nor will Logicalis<br />

be liable for any service credits for the non-performance of such services.<br />

If Logicalis determines that an incident relates to equipment or services which are maintained or<br />

provided by the Network <strong><strong>Service</strong>s</strong> Provider, or otherwise that an Incident requires intervention from the<br />

Network <strong><strong>Service</strong>s</strong> Provider for it to be resolved, Logicalis will, subject to the Customer’s Responsibilities,<br />

liaise with the Network <strong><strong>Service</strong>s</strong> Provider to assist in resolution.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

<strong>Service</strong> Element Hours Days<br />

Management of Incidents 24 per day 7 per week<br />

869


<strong>Service</strong> Levels, Hardware<br />

The following service levels will apply for incident management of the hardware, service & remote<br />

management hardware and DC LAN switching hardware, where:<br />

870<br />

Target Remote Response Time is the time for an engineer to begin investigation of an<br />

Incident;<br />

Target Resolution Time is inclusive of Target Remote Response Time;<br />

Target Resolution Time includes any requirement for attendance to site.<br />

Priority<br />

Level<br />

P1<br />

-or-<br />

Critical<br />

Definition<br />

Serious business impact affecting<br />

production systems and cash flow is<br />

affected.<br />

Example: complete system<br />

failure, network down, total or major loss of<br />

functionality, one or more server outage,<br />

major business affecting problem where<br />

production is severely affected (for instance;<br />

loss of site, line or equipment).<br />

Target<br />

Remote<br />

Response<br />

Time<br />

30<br />

minutes<br />

(24 x 7)<br />

Target<br />

Resolution<br />

Time<br />

3 hours<br />

(24 x 7)<br />

P2 Significant business impact on 1 hour 6 hours


m<br />

Priority<br />

Level<br />

-or-<br />

Major<br />

P3<br />

-or-<br />

Mediu<br />

871<br />

Definition<br />

production or cash flow is affected.<br />

Example: Extremely slow system<br />

performance, an element of functionality is<br />

down or has a bug. Partial outage - Severe<br />

limitation to customer operations caused by<br />

a degraded network or server. Production is<br />

capable but business is affected.<br />

Serious impact affecting a single<br />

customer or group.<br />

Example: Extremely slow system<br />

performance, a piece of functionality is<br />

down or has a bug. Component failure,<br />

infrastructure problem or functional loss<br />

resulting in limitations to customer<br />

operations.<br />

P4 Impact on single customer or isolated<br />

device.<br />

Target<br />

Remote<br />

Response<br />

Time<br />

Target<br />

Resolution<br />

Time<br />

(24 x 7) (24 x 7)<br />

5 hours<br />

(Normal<br />

Office Hours)<br />

10 hours<br />

(Normal<br />

10 hours<br />

(Normal<br />

Office Hours)<br />

24 hours<br />

(Normal


Priority<br />

Level<br />

-or-<br />

Minor<br />

872<br />

Definition<br />

Example: Problem or incident where<br />

single users can operate some of the system<br />

activities normally, but a definite problem is<br />

identified. Assistance is required to aid in<br />

troubleshooting.<br />

Target<br />

Remote<br />

Response<br />

Time<br />

Target<br />

Resolution<br />

Time<br />

Office Hours) Office Hours)<br />

The service levels specified above will not apply to equipment that is obsolete and/or not eligible for<br />

active support from the corresponding Vendor; in which case all support will be provided on a<br />

reasonable endeavours basis.<br />

include:<br />

KPI, <strong>Service</strong> Levels, Reporting<br />

Metrics used to evaluate the effectiveness and efficiency of the service model integration will<br />

Percentage of incidents resolved/reclassified by the Customer’s Help Desk through use of<br />

support scripts<br />

Number of incident ticket reference codes incorrectly logged<br />

Number of staff suggestions, requests for transfer, disputes etc.


The following KPIs will apply for incident management of the hardware, service & remote<br />

management hardware and DC LAN switching hardware:<br />

Priority<br />

Level<br />

P1<br />

-or-<br />

Critical<br />

P2<br />

873<br />

-or-<br />

Major<br />

Definition<br />

Serious business impact affecting<br />

production systems and cash flow is<br />

affected.<br />

Example: complete system<br />

failure, network down, total or major loss of<br />

functionality, one or more server outage,<br />

major business affecting problem where<br />

production is severely affected (for instance;<br />

loss of site, line or equipment).<br />

Significant business impact on<br />

production or cash flow is affected.<br />

Example: Extremely slow system<br />

performance, an element of functionality is<br />

down or has a bug. Partial outage - Severe<br />

limitation to customer operations caused by<br />

Target<br />

Diagnostic<br />

Time<br />

1 hour<br />

(24 x 7)<br />

2 hours<br />

(24 x 7)<br />

Customer<br />

updates<br />

Every 30<br />

minutes or on<br />

status change<br />

Every 30<br />

minutes or on<br />

status change


m<br />

Priority<br />

Level<br />

P3<br />

-or-<br />

Mediu<br />

P4<br />

-or-<br />

Minor<br />

874<br />

Definition<br />

a degraded network or server. Production is<br />

capable but business is affected.<br />

Serious impact affecting a single<br />

customer or group.<br />

Example: Extremely slow system<br />

performance, a piece of functionality is<br />

down or has a bug. infrastructure<br />

component failure, network problem or<br />

functional loss resulting in limitations to<br />

customer operations.<br />

device.<br />

Impact on single customer or isolated<br />

Example: Problem or incident where<br />

single users can operate some of the system<br />

activities normally, but a definite problem is<br />

identified.<br />

<strong>Service</strong> Levels, IP Recording and Quality Monitoring Hardware<br />

Target<br />

Diagnostic<br />

Time<br />

6 hours<br />

(Normal<br />

Office Hours)<br />

12 hours<br />

(Normal<br />

Office Hours)<br />

Customer<br />

updates<br />

Every hour<br />

or on status<br />

change<br />

change<br />

On status


The following service level targets will apply for Incident Management of the IP Recording and<br />

Quality Monitoring hardware:<br />

Fault<br />

Severity<br />

P1<br />

-or-<br />

Critical<br />

or-<br />

P2<br />

-<br />

Major<br />

P3<br />

-or-<br />

Mediu<br />

m<br />

P4<br />

875<br />

Category of Impact<br />

Major impact to system; e.g., lines not<br />

being recorded<br />

Some impact to system; e.g., recording<br />

okay but no playback available or quality<br />

very poor<br />

Some impact to system; e.g., Recording<br />

and playback working, but other features not<br />

working<br />

Hours<br />

Hours<br />

Target<br />

Response<br />

Time<br />

Up to 6<br />

Up to 10<br />

Up to<br />

Hour 48<br />

Target<br />

Resolution<br />

Time<br />

5 days<br />

20 days<br />

40 days<br />

No functionality loss - recorder works Up to 40 days


Fault<br />

Severity<br />

-or-<br />

Minor<br />

Resolution<br />

876<br />

Category of Impact<br />

with no degradation of service but a minor<br />

fault or query<br />

Target<br />

Response<br />

Time<br />

Hour 48<br />

Following the diagnosis of the cause of a fault in the Equipment Logicalis will either:<br />

Target<br />

Resolution<br />

1. Where Logicalis considers that the fault can be remedied remotely Logicalis will use remote access<br />

to the Equipment to attempt to remedy the fault, subject always to Logicalis complying with preagreed<br />

security controls; or<br />

2. Where Logicalis considers that the resolution of the fault requires on site attendance and Logicalis<br />

has contracted to provide on-site break/fix maintenance to the Customer then Logicalis will initiate<br />

a response in accordance with the Maintenance service;<br />

3. Where Logicalis considers that the resolution of the fault requires on-site attendance and Logicalis<br />

has not contracted to provide on-site break/fix maintenance to the Customer then Logicalis will<br />

either inform the Customer or contact the relevant third party resolver group as previously agreed<br />

with the Customer.<br />

Customer Responsibilities<br />

Time<br />

The Customer will provide its own incident management process and function into which Logicalis<br />

will interface;<br />

The Customer will procure that the Network <strong><strong>Service</strong>s</strong> Provider will accept fault calls from Logicalis<br />

and will provide Logicalis with such management information as Logicalis reasonably requests in order<br />

to fulfil its obligations.


Problem Management<br />

below.<br />

The problem management process which Logicalis operates is shown in the workflow diagrams<br />

Problems are defined as the unknown underlying cause of one of more incidents, and a problem is a<br />

Known Error when the root cause is known and a temporary or a permanent alternative has been<br />

identified. As such, Logicalis employs Problem Management to minimise the effect on users of defects in<br />

services and within the infrastructure.<br />

The problem management process is instigated in all cases of recurring incidents, and in cases<br />

where a temporary work-around has been applied to close an incident and a permanent fix is required.<br />

Ownership of any particular problem depends on the nature and origin of the problem.<br />

The objective of Logicalis’ problem management process is to ensure that any problem is captured,<br />

properly identified, effectively resolved and its root causes established, so as to prevent recurrence,<br />

interruption to, or degradation of the service.<br />

877


In many cases a problem will have been identified through two or more incidents having been<br />

recorded and identified in the incident management database. However, this does not preclude anyone<br />

identifying a potential problem and escalating it to the Problem Management Forum.<br />

The problem reporter ensures that the problem is registered and sufficient information is recorded<br />

in the problem management database. If the problem reporter does not have direct access, the problem<br />

should be reported via the MSC <strong>Service</strong> Desk. Once the problem is recorded it is escalated via priority e-<br />

mail, with the subject ‘Problem Alert No. XXX’, to the group address ‘Problem Management Forum’.<br />

Upon receipt of a ‘Problem Alert’ e-mail, the leader of the problem management forum will convene<br />

a ‘Virtual’ meeting to address the problem.<br />

The Problem Manager will feed back to the forum when the problem is believed to be resolved. At<br />

the earliest opportunity the forum will review the records for each problem and agree closure. The<br />

Known Error Database is updated.<br />

878


Where a Problem has created an adverse situation between Logicalis and its Client, this is managed<br />

through the Critical Accounts Process. Action is taken by the Forum to minimise the risk of recurrence<br />

and to decide on any system or process improvements.<br />

The Forum regularly convenes on a monthly basis to discuss:<br />

879<br />

Trend and Pattern Analysis - Analysis of reports from the Known Error Database, to ascertain if<br />

there are high level Problem patterns which require a broader approach. Where a higher-level<br />

technical change is deemed appropriate, and has not been covered during Problem resolution, a<br />

change request may be a submitted by a person nominated by the forum, and submitted in<br />

accordance with the Change Control Procedure.<br />

Continuous Improvement - Analysis of any non-technical, process, system or organisational<br />

issues identified during the problem management process. Where potential improvements are<br />

identified these are agreed with the relevant department or team manager and recorded in the<br />

Continual <strong>Service</strong> Improvement Plan (CSIP) for action.<br />

Captured incidents are reviewed for similarities and the root causes identified. If this activity fails,<br />

the problem is reviewed and - if necessary - escalated in order to categorise the incident and apply<br />

appropriate resolution activities. <strong>Service</strong> Desk systems enable agents to translate incidents into problem<br />

records and as a result, helping in the tracking, notification, escalation, allocation and resolution of<br />

future incidents.<br />

In the case of major problems, a major problem review is undertaken after each occurrence, and<br />

reported upon at the next scheduled service review meeting, to ensure the Customer is aware of the<br />

steps taken and the plans put in place to avoid recurrence of the problem.


880<br />

Problem Management<br />

Logicalis also maintains a knowledge base of Problem data in the form of a Known Error Database,<br />

for referral to by service desk agents to allow quicker diagnosis and resolution if problems re-occur.


include:<br />

KPI, <strong>Service</strong> Levels, Reporting<br />

Metrics used to evaluate the effectiveness and efficiency of the problem management process will<br />

881<br />

Percentage of incidents defined as problems<br />

Number of problems logged<br />

Number of problems fixed<br />

The number of Major Problem Reviews completed successfully<br />

Number of problems outstanding.<br />

<strong>Service</strong> Responsibilities<br />

Where service is restored but an underlying fault still remains the Customer will invoke the<br />

Customer’s problem management process.<br />

Remedial action for hardware faults: Logicalis will manage the resolution of the fault through its<br />

own resources or through 3rd party suppliers as appropriate.<br />

Remedial Action for software faults: Logicalis will take appropriate remedial action to modify,<br />

restore or upgrade the device configuration, or provide a software work around, working with 3rd party<br />

suppliers and manufacturers as required.<br />

Logicalis will undertake all reasonable appropriate remedial action to diagnose and resolve<br />

problems that have been reported to the Customer’s <strong>Service</strong> Desk and assigned to Logicalis.


Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

<strong>Service</strong> Element Hours Days<br />

Problem management availability<br />

Implementation of a change to resolve<br />

the problem<br />

<strong>Service</strong> Level Targets<br />

882<br />

09.00 –<br />

17.00<br />

Monday -<br />

Friday<br />

24 per day 7 per week<br />

There are no specific metrics governing the delivery of this service element.<br />

Customer Responsibilities<br />

The Customer will provide its own change management process and function into which Logicalis<br />

will interface.<br />

Escalation<br />

Using standard processes Logicalis will ensure that the correct level of management visibility of<br />

incidents is maintained at all times to ensure a swift response to service problems when they arise.


The Logicalis MSC will perform initial incident diagnosis, triage, classification and initial resolution<br />

attempts. Where Level 2 support is required, incidents are escalated to the appropriate Logicalis<br />

Engineering Support Group, where skilled and experienced engineering staff investigates incidents<br />

further.<br />

If required, highly skilled technical resources (typically at CCIE level for Cisco equipment) will provide<br />

Level 3 support and if necessary escalate to the corresponding vendor for Level 4 support.<br />

Whilst this is the internal, technical escalation route associated with incident management, there is<br />

a comparable customer-driven escalation route that keeps the Customer notified of incident progress,<br />

allowing decisions to be made on the setting of priorities and the allocation of additional resources<br />

when required.<br />

Out of hours, escalation is to the Customer’s <strong>Service</strong> Duty Manager or an appropriate contact in a<br />

recipient organisation.<br />

883


Escalation Management<br />

<strong>Service</strong> Responsibilities<br />

Logicalis will operate an escalation management process in order to promote the rapid resolution of<br />

incidents. The escalation management process will be documented and will include as a minimum:<br />

1. Clear indication of the escalation path to be followed at specific incident resolution status points.<br />

2. Escalation contacts within Logicalis (fixed line telephone numbers, mobile telephone numbers,<br />

email addresses).<br />

3. Escalation contacts within the Customer (fixed line telephone numbers, mobile telephone numbers,<br />

email addresses).<br />

Logicalis will ensure that the escalation management process document is regularly updated to<br />

ensure that changes to personnel in both the Customer and Logicalis’ organisation are captured.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

<strong>Service</strong> Element Hours Days<br />

Escalation management availability 24 per day 7 per week<br />

Key Performance Indicators<br />

Logicalis will adhere to the following table for escalations within normal office hours.<br />

884


885<br />

Normal<br />

Office<br />

Hours<br />

lapsed Time<br />

0% of SLA<br />

5% of SLA<br />

0% of SLA<br />

00% of SLA<br />

The<br />

Contractor<br />

MSC Team<br />

Leader<br />

MSC<br />

Manager<br />

Head of<br />

Managed<br />

<strong><strong>Service</strong>s</strong><br />

<strong><strong>Service</strong>s</strong><br />

Director<br />

Severity 1 Severity 2<br />

E<br />

5<br />

7<br />

9<br />

1<br />

Client The<br />

Contractor<br />

MSC Team<br />

Leader<br />

MSC<br />

Manager<br />

Head of<br />

Managed<br />

<strong><strong>Service</strong>s</strong><br />

<strong><strong>Service</strong>s</strong><br />

Director<br />

Client<br />

Logicalis will adhere to the following table for escalations outside of normal office hours.<br />

Out of<br />

Hours<br />

Severity 1 Severity 2


lapsed Time<br />

0% of SLA<br />

5% of SLA<br />

00% of SLA<br />

886<br />

The<br />

Contractor<br />

MSC shift<br />

Engineer<br />

MSC Senior<br />

Shift Engineer<br />

Duty<br />

Manager<br />

Customer Responsibilities<br />

E<br />

5<br />

7<br />

1<br />

Client The<br />

Contractor<br />

MSC shift<br />

Engineer<br />

MSC Senior<br />

Shift Engineer<br />

Duty<br />

Manager<br />

Client<br />

The Customer will provide contact details of the functions, or individuals, which comprise the<br />

escalation matrix and timely notification of any changes thereto.<br />

Proactive Monitoring Interfacing to Incident Management<br />

Proactive monitoring forms an input into the incident management process, which Logicalis will<br />

provide from our <strong>Service</strong> Desk.<br />

The <strong>Service</strong> Desk provides the Customer’s 1 st line staff or nominated contacts with a centralised<br />

Single Point of Contact for service management. It is staffed with agents with a high degree of business


and technical knowledge, for the purpose of resolving the maximum number of service requests<br />

remotely and during first call.<br />

Agents receive and record calls, handle inquiries and complaints, monitor event data from the<br />

proactive monitoring systems, perform initial fault diagnostics and resolution attempts, transfer<br />

incidents to on-site resources, field engineers or the 2 nd line support of the MSC or 3 rd line support from<br />

the advanced technical resolver groups as required. They also manage SLA-based escalation, and<br />

communicate the progress and status of service requests to the Customer’s IT staff.<br />

Logicalis utilises field engineer resources, in those cases where incidents require on-site remediation<br />

and/or part replacement. Logicalis generally gain remote access and perform remote 2 nd line diagnosis<br />

prior to dispatching field or on-site resources. Where local attendance is required, then Logicalis’ field<br />

engineers are deployed.<br />

In addition, Logicalis manages all third parties under our contracted management, and provides<br />

cross-boundary communication where necessary.<br />

Logicalis is responsible for notifying the Customer of the incident reference number, and entering<br />

updates on the Logicalis service management system regarding the status of the incident.<br />

Following resolution of the fault giving rise to an incident, the Logicalis <strong>Service</strong> Desk is responsible<br />

for obtaining the Customer’s confirmation of service restoration. Logicalis records who, at the<br />

Customer, agreed that the fault had been resolved, in the call log comments. The log is then closed.<br />

If Logicalis diagnoses that an incident relates to equipment that is not managed or supported by<br />

Logicalis, we either inform the Customer, or manage with the problem through the relevant third party<br />

resolver group (where contractually agreed as part of the scope of the <strong>Service</strong>).<br />

887


Proactive Monitoring<br />

Logicalis operates the incident management process shown in the workflow diagrams below.<br />

For the purposes of proactive identification of incidents and degradations in service, Logicalis<br />

provides 24 x 7 proactive fault monitoring of the infrastructure. Logicalis monitors the Equipment and<br />

identifies service-affecting events or thresholds that have been exceeded in accordance with the<br />

parameters agreed with the Customer.<br />

Proactive Monitoring is delivered from our MSC on a 24x7 basis, via secure IP connectivity into the<br />

<strong>PSN</strong> network, utilising automated exception management to detect and notify any device or service<br />

availability or operational anomalies.<br />

All identified alerts are recorded in the Logicalis service management system and managed in<br />

accordance with the SLA.<br />

888


889<br />

Incident Management Part 1


890<br />

Incident Management Part 2<br />

Proactive Monitoring comprises two core components:<br />

1. monitoring the on-going availability and health of the infrastructure and CPE devices;


2. monitoring the on-going availability and capacity of the infrastructure.<br />

The availability, performance and health of equipment are monitored as part of the proactive<br />

monitoring service. Monitored metrics and threshold alerts are highly configurable and are agreed with<br />

our customers during consultation, but can include:<br />

891<br />

Bandwidth Buffer status<br />

Circuit status Cisco Traps<br />

Connectivity status CPU<br />

Discards Errors<br />

Fan Notification Interface up/down traps<br />

IP packet throughput ISDN Dial Backup<br />

Latency Link congestion<br />

Link connection status Memory<br />

Module Up /Down Packet loss rate<br />

Physical port status Quality of <strong>Service</strong><br />

Redundant Supply Notification Shutdown Triggers<br />

Temperature Up/Down Status<br />

Utilisation<br />

All identified alerts are recorded in the Logicalis <strong>Service</strong> Management system, and managed in<br />

accordance with the SLA.


All equipment and services, provided by Logicalis, are monitored and supported utilising a<br />

standardised platform. Logicalis utilises an integrated toolset consisting of CA Spectrum and CA eHealth:<br />

• CA Spectrum: Spectrum is the primary fault management tool employed by the MSC and<br />

provides status monitoring and a root cause analysis engine. Spectrum monitors the infrastructure by<br />

polling with SNMP. In addition to polling, it can process SNMP Traps to assist in the detection of<br />

faults.<br />

892<br />

All alarms are automatically correlated, have a ‘root cause’ highlighted and ‘probable cause’<br />

determined. This inherent functionality enables Logicalis to quickly identify faults on a Customer’s<br />

infrastructure and to quickly identify, resolve and prevent potential problems before they happen –<br />

to maximise system availability and efficiency.<br />

All event and alert data related to the performance and availability of the infrastructure is<br />

presented to Logicalis’ MSC agents via the Spectrum interface, so that Spectrum provides a central<br />

view of all fault event data across the whole <strong>PSN</strong> estate.<br />

• CA eHealth: In addition to the Spectrum Fault Monitoring platform, Logicalis also utilises<br />

the eHealth (Live Health) performance monitoring platform, in order to provide integrated fault and<br />

performance monitoring.<br />

eHealth integrates performance management across the most complex multivendor and multi-<br />

technology — encompassing IPv4, IPv6 and mixed dual stack IPv4/IPv6 environments — and presents<br />

it in a single, consolidated, actionable view.<br />

eHealth collects performance data, evaluates it for threshold violations and issues early warnings<br />

in real-time so Logicalis can address problems before they become critical. The data is stored in a<br />

historical database and used for a wide variety of out-of-the box reports to understand the<br />

availability and performance of IT infrastructure components.


893<br />

Reports are role-based to meet the specific needs of IT and business management, operations<br />

staff, administrators, engineers and capacity planners. Developing bottlenecks and impending<br />

failures can be spotted, and the need for repair, reconfiguration or additional capacity documented.<br />

Conversely, under-utilised assets can be identified.<br />

eHealth includes granular service level management for defining different classes of service and<br />

assigning goals, core thresholds and other performance metrics to them.<br />

<strong>Service</strong> Responsibilities<br />

Logicalis will monitor the Equipment during hours of cover and will perform the following specific<br />

activities:<br />

1. Logicalis will monitor the Equipment and identify service-affecting events or thresholds that have<br />

been exceeded in accordance with the parameters agreed with the Customer.<br />

2. Logicalis will liaise with the appropriate Customer contact to ensure that appropriate fault handling<br />

is initiated.<br />

3. Where Logicalis is responsible for remedying a fault in the Equipment it will raise an incident on<br />

Logicalis’ incident management system.<br />

4. If, due to equipment or circuit failure, Logicalis is unable to monitor the Equipment it will continue<br />

to provide all other aspects of the services that are not dependent on the monitoring of the<br />

Equipment. Logicalis will maintain the inventory of monitored Equipment by the:<br />

addition of new equipment to be monitored;<br />

removal of deleted equipment from monitoring;<br />

amendment of equipment configurations to facilitate monitoring.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:


<strong>Service</strong> Element Hours Days<br />

Monitoring of Equipment 24 per day 7 per week<br />

<strong>Service</strong> Level Targets<br />

Logicalis will adhere to the service levels as detailed within the following table:<br />

894<br />

Description Metric<br />

Performance data collection<br />

intervals<br />

LAN monitoring alerts,<br />

notification to relevant the<br />

Customer teams<br />

NOH<br />

OOH<br />

Updates for Severity 1 in<br />

Updates for Severity 1 in<br />

Customer Responsibilities<br />

None applicable.<br />

Every 5 minutes nominal<br />

Within 15 minutes<br />

30 minutes or status change<br />

30 minutes or status change


Change Management<br />

Logicalis assumes responsibility for the Logicalis-side change control process (i.e. where Logicalis<br />

make changes for supportability reasons) for the environment, and manages change requests from the<br />

Customer for infrastructure managed by us.<br />

For the avoidance of doubt, Logicalis assumes that the Customer retains responsibility for user-side<br />

change requests (i.e. interacting directly with end users), and Logicalis takes responsibility for<br />

infrastructure-side change requests from the Customer.<br />

Change Requests are accepted 24 hours a day, but the approval process only takes place during<br />

normal office hours, with relevant CABs being held on a weekly basis. Both Logicalis and the Customer<br />

can generate change request documents.<br />

The Logicalis MSC acts as a single point of contact for the receipt, acknowledgement and<br />

progression of changes raised and ensures that they are actioned in accordance with the SLA.<br />

Implementation of remote, simple or template, changes is done under defined change management<br />

and performed remotely from the Logicalis MSC.<br />

Implementation of changes requiring on-site work, and major changes (i.e. those requiring elements<br />

of technical design work) is treated as chargeable works or projects.<br />

Logicalis ensures that all changes are carried out in a planned and authorised manner. To this end<br />

Logicalis has categorised changes and change requests as shown in the table below.<br />

895


Logicalis is at any time entitled to re-classify the description of a change following submission. This is<br />

subject to justification by Logicalis and agreement with the Customer.<br />

All changes are subject to resource availability, with an implementation date being confirmed by<br />

Logicalis.<br />

Tasks carried out during the ‘authorisation window’ include ensuring that there is a business reason<br />

behind each change, identifying the specific configuration items and IT services affected by the change,<br />

planning the change and having a back-out plan should the change result in an unexpected state of the<br />

configuration items. For medium changes and above, this information is presented to the weekly CAB<br />

for authorisation. The ‘change window’ is the actual time within which Logicalis staff undertakes the<br />

authorised change.<br />

Logicalis will ensure that all changes are carried out in a planned and authorised manner. To this end<br />

changes and change requests will be classified as follows:<br />

896<br />

ry<br />

e<br />

Catego<br />

Routin<br />

Change type Authorisation<br />

Day to day minor<br />

changes that require<br />

minimal authorisation, have<br />

no design element with no<br />

service impact and require<br />

no system downtime. These<br />

window<br />

Chang<br />

e window<br />

Changes done within 24-48<br />

hours (may be longer if MSC is<br />

dealing with an exceptionally high<br />

level of severity 1 faults)


897<br />

Minor<br />

Major<br />

can typically be undertaken<br />

with no pre-planning and<br />

within short<br />

timescales (less than 2<br />

hours) during normal<br />

service operation.<br />

Template changes that<br />

have pre-agreed processes<br />

but require management<br />

authorisation. These are<br />

likely to be more<br />

complicated changes and<br />

may be implemented out of<br />

hours.<br />

These changes are<br />

complicated, service<br />

effecting and therefore<br />

require design validation<br />

and planning (typically less<br />

than a day’s effort). These<br />

are complicated changes<br />

and will be implemented<br />

Weekly<br />

CAB Weekly<br />

CAB/Senior CAB<br />

4<br />

Hours<br />

8<br />

hours


898<br />

ency<br />

Project<br />

Emerg<br />

out of hours<br />

Large scale projects<br />

typically involving additional<br />

equipment or system re-<br />

design that need to be<br />

scoped and costed<br />

accordingly.<br />

Urgent request typically<br />

as a result of a serious<br />

service affecting incident.<br />

Weekly<br />

CAB/Senior CAB<br />

Retrospective<br />

TBA<br />

Within<br />

4 hours<br />

Logicalis’ objective is to provide a simple, efficient and effective change management service for<br />

routine, non-service affecting changes, with a minimal approval overhead and time delay; such changes<br />

are typically authorised within the Logicalis MSC and/or by the SDM, and implemented at the earliest<br />

opportunity.<br />

In order to de-risk more complicated changes (i.e. those classified as ‘Minor’) a templated approach<br />

is used. This involves design agreement with the Technical Design Authority and technical team, where<br />

an agreed template is created to simplify requests for change and limit the possibilities of errors. These<br />

changes are approved at the weekly CAB meeting.<br />

Requests that fall into the ‘Major’ and ‘Project’ categories might require additional input from other<br />

areas. For these changes, a risk analysis of the potential impact of a change on existing live services is


carried out, a suitable schedule for the change is defined, and an implementation and fallback plan is<br />

agreed. Such changes are reviewed at a CAB, commensurate with the associated risk and implications.<br />

The following flow chart indicates the processes for Emergency, Major and Minor changes:<br />

899<br />

Emergency Changes


900<br />

Major Changes


<strong>Service</strong> Responsibilities<br />

901<br />

Minor Changes


Logicalis will be responsible for the Contractor-side change control process (i.e. where Logicalis<br />

makes changes for supportability reasons) for the environment, and will manage change requests from<br />

the Customer for infrastructure managed by Logicalis.<br />

For the avoidance of doubt, Logicalis assumes that the Customer retains responsibility for user-side<br />

change requests (i.e. interacting directly with end users), and Logicalis takes responsibility for<br />

infrastructure-side change requests from the Customer.<br />

Change Requests will be accepted 24 hours a day, but the approval process will only take place<br />

during normal office hours, with relevant Change Authorisation Boards (CABs) being held on a weekly<br />

basis. Both Logicalis and the Customer can generate change request documents.<br />

Logicalis’ MSC will act as the single point of contact for the receipt, acknowledgement and<br />

progression of changes raised and will ensure that they are actioned in accordance with the SLA.<br />

Implementation of remote, simple or template, changes will be under defined change management<br />

and performed remotely from Logicalis’ MSC.<br />

Implementation of changes requiring on-site work, and major changes (i.e. those requiring elements<br />

of technical design work) will be treated as chargeable works or projects.<br />

All changes will be subject to resource availability, with an implementation date being confirmed by<br />

Logicalis’ resource management function.<br />

Tasks carried out during the ‘authorisation window’ will include ensuring that there is a business<br />

reason behind each change, identifying the specific configuration items and IT services affected by the<br />

902


change, planning the change and having a back-out plan should the change result in an unexpected state<br />

of the configuration items.<br />

For minor changes and above, this information will be presented to the weekly CAB for<br />

authorisation. The ‘change window’ is the actual time within which staff will undertake the authorised<br />

change.<br />

Logicalis is at any time entitled to re-classify the description of a change following submission. This<br />

will be subject to justification by Logicalis and agreement with the Customer.<br />

An agreed number of remote routine or minor changes per annum will be included within the<br />

service charge, where requests for such are received during the working day. The following categories of<br />

changes will be chargeable:<br />

903<br />

Any remote routine or minor changes above the agreed allowance;<br />

Changes requiring attendance on site;<br />

Major changes (including changes requiring technical design work);<br />

Project changes;<br />

Any changes completed out of hours.<br />

Telephone Software and Hardware Moves and Changes<br />

Logicalis carries out modifications to the configuration of Telephony systems. These modifications<br />

are referred to as Moves and Changes (MAC) and cover changes including the following:<br />

Class of <strong>Service</strong>;<br />

Trunk access class;<br />

Move of an extension;<br />

Enabling a new extension;<br />

Disabling a disused extension;<br />

Set-up and amendment of communication groups;<br />

Set-up and amendment to hunt and distribution Groups.


MAC are covered up to a limited number for each annual service charge, these are agreed at the<br />

outset of the contract with each client. Where MAC have been consumed further top up can be<br />

purchased from the <strong>Service</strong> Catalogue.<br />

Logicalis also carries out the following Moves and Changes.<br />

External site relocations;<br />

Internal PBX relocations;<br />

External peripheral devices relocations;<br />

Internal peripheral devices relocations.<br />

Logicalis is able to recover all costs associated with relocation requests.<br />

Logicalis liaises with Customers to agree when the work should be carried out and to arrange access<br />

to Site where required. Logicalis has the right to charge for any aborted Site visits in the instances when<br />

Site access has been previously arranged with the Customer.<br />

Where a Site requests any element or elements of the <strong>Service</strong> to be re-located within the existing<br />

Site or campus (an internal move) then Logicalis is able to recover its full costs associated with the re-<br />

location.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

904<br />

<strong>Service</strong> Element Hours Days<br />

Change management process 09.00 – Monday -


905<br />

<strong>Service</strong> Element Hours Days<br />

Change Implementation<br />

<strong>Service</strong> Level Targets<br />

17.00 Friday<br />

09.00 –<br />

17.00<br />

Logicalis will adhere to the following service levels targets:<br />

updates<br />

Description Metric<br />

Configuration documentation<br />

Notification to the customer<br />

of planned down time<br />

Customer Responsibilities<br />

Monday -<br />

Friday<br />

3 working days from change<br />

completion<br />

14 working days prior to start<br />

of down time<br />

The Customer will provide the following:<br />

its own change management process and function into which Logicalis will interface.<br />

the relevant resources for participation in any required change authorisation and CAB process.


Availability Management<br />

Logicalis will employ availability management targets to sustain service availability to support the<br />

Customer’s business requirements at a justifiable cost. Associated high-level activities will include:<br />

realise availability requirements;<br />

compile availability plan;<br />

monitor availability;<br />

monitor maintenance obligations.<br />

Availability management is used to address the ability of the infrastructure components to perform<br />

at an agreed level over a period of time, and Logicalis will use this as a key process in measuring and<br />

controlling the level of service availability for use in the monthly service reviews with the Customer.<br />

In order to measure overall service availability Logicalis produces and agrees an availability plan,<br />

including:<br />

906<br />

Agreement statistics –what measurement statistics are included within the agreed service;<br />

Availability – agreed service times, response times, etc;<br />

<strong>Service</strong> desk calls – number of incidents raised, response times, resolution times;<br />

Contingency – agreed contingency details, location of documentation, Third Party<br />

involvement, etc;<br />

Capacity – performance timings for online transactions, report production, numbers of users,<br />

etc.<br />

Availability is typically calculated based on a model involving an availability ratio. Typically the<br />

calculation of this ratio includes the following elements:<br />

<strong>Service</strong>ability –the expected availability of a component;<br />

Reliability – the time for which a component can be expected to perform under specific<br />

conditions without failure;


907<br />

Recoverability – the time it takes to restore a component back to its operational state after a<br />

failure;<br />

Maintainability – the ease with which a component can be maintained, which can be both<br />

remedial and preventative;<br />

Resilience – the ability to withstand failure;<br />

Security – the ability of components to withstand breaches of security.<br />

Once agreed, the ratio metric is measured using the management tools to gather and alert on<br />

relevant elements, and reported on through the monthly service reviews.<br />

include:<br />

KPI, <strong>Service</strong> Levels, Reporting<br />

Metrics used to evaluate the effectiveness and efficiency of the availability management process will<br />

Agreed service hours, per service;<br />

Total down time per service;<br />

Response times per incident;<br />

Time taken to repair per incident;<br />

Actual versus contracted availability;<br />

Availability Ratio.<br />

Capacity/Performance Management<br />

Logicalis will utilise capacity and performance management to ensure that the availability of service<br />

resources meets the needs of <strong>PSN</strong> users. In order to keep the infrastructures running efficiently,


Logicalis utilises predictive capacity planning to obtain real-life data related to the current status of<br />

resources, identify congestion and trouble spots before they affect users, and plan capacity effectively<br />

for the future.<br />

Capacity planning is used to ensure current resources are being used efficiently, evaluate trends in<br />

demand, and project future resource needs, achieving the following:<br />

908<br />

Reduce costs through the reduction or elimination of under-used resources;<br />

Improve performance though identification of both over-used and under-used elements, and the<br />

re-balancing of capacity with demand;<br />

Reduce <strong>Service</strong> and downtime by anticipating overloads before they occur, and ensuring adequate<br />

capacity is in place;<br />

Improve budget predictability by tracking trends and modelling the effects of new services or<br />

infrastructure, avoiding unnecessary emergency purchases and ensuring an optimum profile of<br />

additional charges.<br />

Performance reporting will utilise CA eHealth Performance Manager to combine historical and real-<br />

time metrics with intelligent analysis, to generate role-based views that is used to rapidly pinpoint and<br />

correct developing performance degradations before service quality is jeopardised.<br />

The following reports are used to provide a high level of granularity related to trend analysis and<br />

capacity planning.<br />

AT-A-GLANCE REPORTS - provide a comprehensive view of the availability and performance of a<br />

particular resource, displaying the key statistics over a specified time interval. By automatically<br />

capturing performance data and presenting it uniformly, these reports can significantly reduce the<br />

time spent troubleshooting.<br />

HEALTH REPORTS - evaluate the health of groups of components by comparing current<br />

performance to historical performance over the course of a day, week or month. The report<br />

provides a list of situations to watch and identifies errors, unusual utilisation rates, or volume shifts<br />

that warrant investigation. The overall status of a component is measured by its Health Index, a<br />

performance metric based on multiple variables.


TREND REPORTS - track the value of one or more performance variables over a period of time.<br />

Trend Reports is used to reveal traffic patterns over time, and relationships between components<br />

and variables. Components that Logicalis can track this way include: CPUs, disks, LANs, WANs,<br />

processes, process sets and more.<br />

TOP N REPORTS - sorts the elements that meet user-defined criteria. Logicalis typically use Top N<br />

Reports to find the best, worst, fastest, slowest or least-utilised circuits or devices. Top N Reports<br />

can be scheduled to run automatically at specified intervals, and also make a useful on-demand tool.<br />

Logicalis agrees a set of these reports that is regularly generated and made available through the<br />

web portal. Further ad-hoc reporting can be provided when required and is managed through the<br />

service delivery process.<br />

Output recommendations from the above are fed into the Continual <strong>Service</strong> Improvement<br />

Programme (CSIP). The goal of this process is to ensure that customers are realising the greatest return<br />

on investment from the service, and have a clear understanding of where further investments will lead.<br />

This programme is based on three key enablers - firstly our experience and application of ITIL, secondly<br />

909


our experience in managing complex services on behalf of our customers, and thirdly the Logicalis<br />

consulting capabilities that have been developed and proven over many years of operation.<br />

The CSIP is delivered through the appointed Logicalis SDM, who is the primary point of contact for<br />

all management issues related to the service, and in turn chairs the monthly service review and<br />

performance meetings. One of the key aspects of these meetings is to provide a forum for the planning<br />

or review of activities related to the agreed CSIP, as well as the opportunity to discuss new initiatives<br />

(which may have been identified in the course of incident, problem or service delivery management, and<br />

could be undertaken to address known service defects or implement potential service enhancements<br />

and improvements).<br />

KPI, <strong>Service</strong> Levels, Reporting<br />

Metrics used to evaluate the effectiveness and efficiency of the capacity management process is<br />

agreed during transition but will typically include:<br />

910<br />

utilisation statistics;<br />

capacity summary;<br />

device performance summary;<br />

device performance detail;<br />

performance summary;<br />

performance detail.<br />

<strong>Service</strong> Responsibilities


Logicalis will produce a Capacity Plan covering the infrastructure. This is to include:<br />

1. Reporting of utilisation and performance statistics within the infrastructure and recommendations<br />

to relieve degradation of performance beyond agreed thresholds, specifically the production of:<br />

at-a-glance reports<br />

health<br />

trend reports<br />

top N reports<br />

2. Interpretation of forecasted demand (obtained from liaison with the Customer) for services, versus<br />

the available capacity in those services, and the making of appropriate recommendations.<br />

3. Interpretation of trends and changes to the Customer’s business requirements. Logicalis will<br />

recommend changes required to meet future capacity demand to ensure that the agreed service<br />

levels are met.<br />

4. Provision of recommendations for replacement of infrastructure components, should this be<br />

required to maintain service at the appropriate level.<br />

Hours of Cover<br />

The following table details the Hours of Cover for the above service elements:<br />

911<br />

<strong>Service</strong> Element Hours Days Exclusions<br />

Capacity<br />

Management<br />

<strong>Service</strong> Level Targets<br />

09.00 –<br />

17.00<br />

Monday -<br />

Friday<br />

Logicalis will produce the capacity plan twice a year.<br />

Customer Responsibilities<br />

Holidays


The Customer will:<br />

912<br />

provide forecast demand data related to capacity requirements on a quarterly basis.<br />

provide its own capacity management process and function into which Logicalis will interface.<br />

Release Management<br />

Logicalis will maintain software and firmware revisions within to an agreed minimum level. Logicalis<br />

offers access to features offered in later revisions of code if required to support the <strong>PSN</strong> service.<br />

Logicalis will provide recommendations (including risk analyses) as to software updates and patches<br />

within the service, together with an allocated amount of inclusive resource towards the implementation<br />

of such releases. Access to features offered in higher releases should be raised to Logicalis for us to<br />

prepare an analysis and recommendation for discussion at a CAB, so that the risks, implications, benefits<br />

and costs can be properly considered. Implementation of such releases - if agreed - is chargeable.<br />

Where a software fault is reported, Logicalis will work closely with the Customer, and the hardware<br />

vendor, to establish the impact to users, and from there agree a course of action. If necessary Logicalis<br />

will provide a workaround to establish business continuity, provided it is possible to do so technically.<br />

Any additional equipment required for a workaround may be charged at Logicalis’ discretion or loaned<br />

on a temporary basis. Subsequent patching or configuration changes required to resolve the fault is<br />

provided as part of the service.<br />

Through the service delivery process, Logicalis provides releases and version update<br />

recommendations for all supported devices. This is a consultative exercise, led by Logicalis, and carried<br />

out in conjunction with best practice principles and relevant 'Safe Harbour' recommendations from the<br />

Vendor(s), with Customer interaction and an understanding of future requirements. Any subsequent


upgrades are treated as a project in order to minimise risk to the business and to ensure that the<br />

implications of the upgrade, on the original design principles, do not unduly affect infrastructure<br />

stability.<br />

When agreed, minor patching within software versions and remote engineering to carry out this<br />

work (which requires a break in normal service to implement) is included in the service.<br />

KPI, <strong>Service</strong> Levels, Reporting<br />

Metrics used to evaluate the effectiveness and efficiency of the release management process will<br />

include:<br />

913<br />

the number of successful software updates;<br />

percentage of installations performed to time;<br />

number of failed or backed out implementations;<br />

number of unauthorised software versions detected within the environment.<br />

<strong>Service</strong> Responsibilities<br />

Where a software fault is reported, Logicalis will work closely with the Customer, and the associated<br />

hardware vendor, to establish the impact to the Customer, and from there will agree a course of action.<br />

If necessary Logicalis will use reasonable endeavours to provide a workaround to establish business<br />

continuity, provided it is possible to do so technically.<br />

Any additional equipment required for a workaround may be charged at Logicalis’ discretion or<br />

loaned on a temporary basis. Subsequent patching or configuration changes required to resolve the<br />

problem will be provided as part of the service.


On a bi-annual basis, Logicalis will provide release and version update recommendations for all<br />

supported devices. Any subsequent updates will be treated as a chargeable project in order to minimise<br />

risk to the business and to ensure that the implications of the update on the original design principles do<br />

not unduly affect stability.<br />

When agreed with Logicalis in advance, minor patching within software versions of software and<br />

remote engineering to carry out this work (which will require a break in normal service to implement)<br />

may be included in the provision of the service. However, lab testing, additional memory or any other<br />

hardware parts are not included, and therefore Logicalis reserves the right to make additional charges<br />

for them.<br />

Version upgrades (i.e non-maintenance or supportability-driven requirements) will be treated as a<br />

chargeable project.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

914<br />

<strong>Service</strong> Element Hours Days Exclusions<br />

Release Management<br />

<strong>Service</strong> Level Targets<br />

09.00 –<br />

17.00<br />

Monday -<br />

Friday<br />

Holidays


High priority notifications will be evaluated when received. Lower priority notifications will be<br />

evaluated once every 6 months.<br />

Customer Responsibilities<br />

The Customer will provide:<br />

915<br />

project funding where required to implement patches to supported devices uncovered by<br />

support agreements;<br />

facilitation of the required down time for the supported devices to enable the installation of<br />

patches.<br />

Configuration Management<br />

Logicalis is responsible for ensuring that all relevant element configurations and data are managed,<br />

controlled, current and up to date, and provides the Customer with electronic updates of all such<br />

information quarterly, or as otherwise agreed. Logicalis also provides details of all hardware and<br />

software under our management.<br />

The configuration management process monitors, deploys, manages and controls Configuration<br />

Items (CI) related to the infrastructure, in turn storing all CI data within a central Configuration<br />

Management Database (CMDb), which will act as a repository for information related to the authorised<br />

configurations of all elements within the <strong>PSN</strong> network.<br />

Configuration management activities are operated in-line with the prevailing change control<br />

procedures, with input and authorisation from the Logicalis SDM and, where relevant, the Project<br />

Manager. All scheduled engineering will take place outside normal working hours and in a mutually<br />

agreed time slot that is dependent on the affected infrastructure and the resultant impact on service.


For configuration management, Logicalis has standardised on the use of CA SPECTRUM<br />

Configuration Manager (NCM). This platform integrates with our overall management architecture and<br />

automates the management of critical device configurations, giving us the tools to capture, modify, load<br />

and verify configurations for hundreds of devices from leading equipment vendors. Each configuration is<br />

time-stamped and identified by the revision number and, with automatically scheduled configuration<br />

comparisons, delivers immediate notification of unauthorised changes.<br />

As part of the configuration management process Logicalis will undertake configuration changes as<br />

required using NCM, with all configuration changes being delivered remotely. In addition Logicalis is<br />

responsible for ensuring that all managed elements are backed up at agreed intervals, and before and<br />

after any change.<br />

Logicalis MSC staff will use NCM to correlate appropriate or inappropriate configuration changes<br />

against availability and performance failures of critical services, comparing configurations or viewing the<br />

configuration history of any selected device within the infrastructure.<br />

Further to this, configuration items, their versions and their changes are audited periodically by<br />

Logicalis to ensure their validity and accuracy.<br />

The MSC will perform the following tasks as part of configuration management:<br />

916<br />

manage configurations for supported devices;<br />

capture device configurations and store them in the NCM database;<br />

check running versus start-up configurations;<br />

export, backup and restore configurations;<br />

load/merge configurations to one or more devices of the same family type;<br />

verify that the correct configuration is running on a device;


917<br />

set up a schedule of automatic captures and policies to ensure reliable device configurations;<br />

detect performance problems by verifying device configurations;<br />

maintain a history of device configurations for comparison and reconfiguration purposes;<br />

provide automated software updates;<br />

create policies to monitor content in configurations and verify that device content is<br />

compliant.<br />

Telephony Configuration Management<br />

Logicalis carries out modifications to the configuration of Telephony systems where necessary<br />

and/or where explicitly requested. Such modifications include:<br />

modifications requested by the Customer in order to accommodate the connection of,<br />

modifications to and cessation of PTO provided network services to the Telephony systems;<br />

modifications requested by the Customer to alternate routing tables, route optimisation<br />

tables, digit translation tables;<br />

modifications requested by the Customer to implement lifting of barring at Sites of selected<br />

numbers or groups of numbers as requested by the Customer;<br />

modifications requested by the Customer to ensure that calls are correctly routed; and<br />

modifications requested by the Customer or other relevant authority, in order to comply with<br />

regulatory and statutory changes or enforcements.<br />

Logicalis carries out modifications described in the paragraph above provided that such<br />

modifications are within the configurable limit of the hardware and software of the Telephony systems<br />

concerned. These are provided without cost, where Moves, Add and Changes are available as part of the<br />

<strong>Service</strong>.<br />

KPI, <strong>Service</strong> Levels, Reporting


Metrics used to evaluate the effectiveness and efficiency of the configuration management process<br />

will include:<br />

918<br />

the number of successful configuration changes;<br />

the number of correct device configuration verifications;<br />

the number of successful configuration/CMDb audits;<br />

frequency and number of CMDb errors;<br />

number and severity of breaches in SLA caused by inaccurate CMDb information.<br />

<strong>Service</strong> Responsibilities<br />

Management of device configurations: All devices within the scope of the services are to be<br />

managed in accordance with best industry practice, in order that service level agreements are adhered<br />

to. Logicalis will be responsible for supplying, supporting and maintaining any management platforms<br />

required to deliver this service.<br />

Backup & Recovery: The configurations of all managed devices will be backed-up on a regular basis<br />

and, specifically, after changes to the device configuration have been made.<br />

Logicalis will be responsible for ensuring that all relevant configuration documentation in respect of<br />

equipment is current and up to date, and will provide the Customer with electronic updates of all such<br />

documentation annually or as otherwise agreed.<br />

Logicalis will deploy and manage configurations of the equipment where required. This will be done<br />

remotely from Logicalis’ <strong>Service</strong> Desk.


The above activities will be operated in-line with agreed change control procedures, with input and<br />

authorisation from the SDM and project manager. All scheduled remote engineering will take place<br />

during a mutually agreed time slot that will be dependent on the affected infrastructure and the<br />

expected resultant impact on service.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

919<br />

<strong>Service</strong> Element Hours Days<br />

Configuration management 24 per day 7 per week<br />

<strong>Service</strong> Level Targets<br />

Logicalis will adhere to the following SLA for configuration management actions:<br />

Description Metric<br />

Backup of Configuration Files and<br />

Access Control Lists<br />

Restoration of Configuration Files<br />

following Device Incident, Failure or<br />

Replacement<br />

In accordance with<br />

agreed Backup policy<br />

In accordance with<br />

<strong>Service</strong> Levels


Description Metric<br />

Device Configuration Backups To<br />

Management System<br />

920<br />

1 Working Day<br />

Management System Backup Monthly<br />

Restoration & Testing of<br />

Configuration Files<br />

Customer Responsibilities<br />

None applicable.<br />

<strong>Service</strong> Delivery Management<br />

<strong>Service</strong> Responsibilities<br />

Quarterly<br />

Logicalis will provide the services of a <strong>Service</strong> Delivery Manager (SDM).<br />

The SDM’s duties are to manage the <strong><strong>Service</strong>s</strong>, ensuring that adequate resources are made available<br />

by Logicalis so that Logicalis meets the <strong>Service</strong> Levels and that any new services introduced meet agreed<br />

service levels.<br />

The SDM will act as the Customer’s primary focal point for operations and support services during<br />

normal working hours.


The SDM will hold regular reviews with the Customer, co-coordinating and delivering service and<br />

performance report information.<br />

Hours of Cover<br />

To be agreed for each contract.<br />

<strong>Service</strong> Level Targets<br />

Logicalis will provide interim SDM services in order to cover for holiday and sickness.<br />

Customer Responsibilities<br />

The Customer will provide a business interface role through which the SDM may liaise and escalate<br />

service management issues as required.<br />

Supplier Management<br />

<strong>Service</strong> Responsibilities<br />

The Supplier will manage the commercial and operational relationship with its own 3rd party<br />

suppliers.<br />

921


Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

922<br />

<strong>Service</strong> Element Hours Days<br />

3 rd party supplier management 24 per day 7 per week<br />

<strong>Service</strong> Level Targets<br />

None<br />

Customer Responsibilities<br />

None<br />

Reporting<br />

Regular service review meetings between Logicalis and the Customer are an important control<br />

mechanism, to ensure that any potential issues can be identified before they become problems, and can<br />

be managed accordingly.


Such meetings present the opportunity for both parties to ensure the direction that the service is<br />

taking is the right one, and also provide a forum to ensure the development of the service is in line with<br />

expectations.<br />

Logicalis propose the following meetings be scheduled:<br />

923<br />

monthly service review meetings;<br />

quarterly service review meetings;<br />

annual strategic review meeting.<br />

The agenda and attendees of the above meetings are agreed between Logicalis and Customers,<br />

during the transition period, and reviewed as required at each meeting.<br />

<strong>Service</strong> Responsibilities<br />

<strong>Service</strong> Reporting: Logicalis will produce regular performance reports as shown below:<br />

Monthly <strong>Service</strong> Review Meeting<br />

Logicalis produces a report prior to the monthly service review meetings, and distributes this report<br />

to the agreed list of attendees for that meeting.<br />

The report summarises the service performance (against the contracted service levels) in text and<br />

graphical formats in the ‘Reporting Period’, and forms the basis of discussion at the monthly service<br />

review meeting.


The monthly service review meeting will follow the following agenda:<br />

924<br />

Continuous <strong>Service</strong> Improvement Plan;<br />

Performance against service level targets;<br />

Performance against service levels;<br />

<strong>Service</strong> performance summary;<br />

Commercial summary;<br />

Complaints summary;<br />

Change control summary;<br />

Updated service risk register;<br />

Integration of future projects and analysis of their impact on the operational environment.<br />

Quarterly <strong>Service</strong> Review Meeting<br />

The focus of the quarterly service review meetings is medium to long term, and is structured to<br />

focus on ongoing service provision and development of the service. The agenda comprises the following:<br />

Minutes of last meeting;<br />

Outstanding action points;<br />

<strong>Service</strong> level reports;<br />

Performance reports<br />

<strong>Service</strong> failures, service credits;<br />

Escalations;<br />

Feedback on customer performance;


925<br />

Considerations for continuous improvement;<br />

New business;<br />

AOB<br />

Date of next meeting.<br />

Annual <strong>Service</strong> Review Meeting<br />

An annual service review meeting is held at least one month prior to each anniversary of the full<br />

service date.<br />

The focus of an annual review meeting is long term and strategic, and designed to focus on a review<br />

of performance over the period, including strategic development of the service and a detailed price<br />

review.<br />

The agenda comprises the following:<br />

Minutes of last meeting;<br />

Outstanding action points;<br />

Review of service issues;<br />

Review of service failures, service credits;<br />

Review of escalations;<br />

Technology developments;<br />

Strategic opportunities for new business and service development;<br />

Considerations for continuous improvement;<br />

Review of new products and services;<br />

AOB;


926<br />

Date of next meeting.<br />

Web-based Portal - A web-based secure customer portal provides account-controlled access to<br />

reports including device availability, and performance from a summary and detail perspective. Portal<br />

reports include:<br />

Availability;<br />

Availability Detail<br />

Device Performance Summary<br />

Device Performance Detail;<br />

Performance Summary;<br />

Performance Detail.<br />

These reports are scheduled and available on a daily, weekly and monthly basis, and are<br />

retrospectively available for a rolling 12-month period. Data can be archived for longer periods if<br />

required.<br />

A documentation tab is also provided on the portal, which can be used as a depository for key<br />

project documentation; this is often used for storage of monthly service reports.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

<strong>Service</strong> Element Hours Days Exclusions


927<br />

<strong>Service</strong> Element Hours Days Exclusions<br />

<strong>Service</strong> Reviews and Reporting<br />

<strong>Service</strong> Level Targets<br />

Report<br />

09.00 –<br />

17.00<br />

Monday -<br />

Friday<br />

Description Metric<br />

English public<br />

holidays<br />

Issue of Monthly service report Within 10 working days of month end<br />

Issue of Annual <strong>Service</strong> Level<br />

Customer Responsibilities<br />

No later than 4 weeks after the end of the<br />

annual period.<br />

The Customer will ensure that representatives from its service management organisation attend the<br />

agreed service review meetings.<br />

Equipment Reporting<br />

<strong>Service</strong> Responsibilities<br />

Logicalis will maintain a document record of the equipment under their management (the<br />

Equipment List).


The Equipment List will consist of a list of equipment under management by Logicalis, including part<br />

numbers, quantities and locations.<br />

Logicalis will provide the Customer with an electronic copy of the Equipment List upon request and<br />

at 3 working days notice.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

928<br />

<strong>Service</strong> Element Hours Days Exclusions<br />

Equipment Reporting<br />

<strong>Service</strong> Level Targets<br />

None<br />

Customer Responsibilities<br />

None<br />

09.00 –<br />

17.00<br />

Monday -<br />

Friday<br />

Holidays


Continuity Management<br />

<strong>Service</strong> Responsibilities<br />

Logicalis will support the Customer’s business continuity planning process by attendance at the<br />

relevant planning meetings.<br />

Support of failover testing will be provided as required, as a chargeable activity.<br />

Logicalis will provide details of its own business continuity plan as relates to its service delivery<br />

activities for the Customer.<br />

Logicalis’ business continuity plan will be tested at least once per annum.<br />

Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

<strong>Service</strong> Element Hours Days<br />

Business continuity planning and testing<br />

929<br />

09.00 –<br />

17.00<br />

Monday -<br />

Friday<br />

Business continuity invocation 24 per day 7 per week<br />

<strong>Service</strong> Level Targets


Logicalis will resolve all issues arising from business continuity testing within the timescales agreed<br />

with the Customer’s Project Manager.<br />

Logicalis’ Business Continuity Plan will be tested at least once per annum.<br />

Customer Responsibilities<br />

The Customer will develop and maintain a business continuity plan.<br />

Continuous <strong>Service</strong> Improvement<br />

<strong>Service</strong> Responsibilities<br />

The Contractor will operate a process of Continuous <strong>Service</strong> Improvement, through which<br />

improvement initiatives to the managed services can be initiated, captured and managed through to<br />

implementation.<br />

<strong>Service</strong> improvements will be managed by means of a <strong>Service</strong> Improvement Plan (SIP). The SIP will<br />

be used to manage and log improvement initiatives triggered by Continual <strong>Service</strong> Improvement.<br />

The <strong>Service</strong> Improvement Plan will include:<br />

930<br />

The process or service concerned;<br />

The person in charge of the process (Process Owner) or service (<strong>Service</strong> Owner);<br />

The initiative owner, description of the initiative;<br />

The source of the measure (e.g. service review, process audit).<br />

The implementation schedule and status including target date, current status.


Hours of Cover<br />

The following table details the hours of cover for the above service elements:<br />

931<br />

<strong>Service</strong> Element Hours Days Exclusions<br />

Continual service<br />

improvement<br />

<strong>Service</strong> Level Targets<br />

None<br />

Customer Responsibilities<br />

09.00 –<br />

17.00<br />

Monday -<br />

Friday<br />

English public holidays<br />

The Customer will review and approve the SIP within a reasonable timescale in order that<br />

improvements may be implemented promptly.<br />

Additions and Deletions<br />

Additions<br />

Subject to the environmental considerations below, the Customer may at any time add Equipment<br />

to the service by giving Logicalis at least 30 days notice in writing and providing Logicalis with such<br />

information concerning the Equipment as Logicalis may reasonably require, including but not limited to:


the make and model of the equipment;<br />

the serial number of the equipment;<br />

the location of the equipment;<br />

any available service records relating to the equipment<br />

Logicalis may make a pro-rata additional charge for the added Equipment from the date that it is<br />

added to the service.<br />

Logicalis reserves the right not to add new equipment if thirty or more days have passed since the<br />

expiration of the original warranty period or the expiration of a previous maintenance agreement<br />

covering the Equipment, until the Equipment has been inspected by Logicalis to determine whether the<br />

Equipment is still in good condition. All time and materials required to place the Equipment in good<br />

operating condition will be charged at Logicalis’ current rates. Required repairs must be made prior to<br />

the beginning of cover under the service.<br />

Deletions<br />

No equipment may be deleted during the first <strong>Service</strong> Year. Thereafter the Customer may at any<br />

time delete equipment by giving Logicalis not less than 90 days notice in writing. Logicalis will make a<br />

pro rata adjustment to the Charges for the period from the date the equipment has been removed to<br />

the end of the term but reserves the right (i) to re-calculate its charges based on the amount of<br />

Equipment then supported under the Agreement and taking account of any volume discounts that are<br />

no longer applicable due to the reduced volume of Equipment being supported; and (ii) to make a<br />

reasonable administration charge; and (iii) to recover from the Customer the balance of any third party<br />

support charges incurred by Logicalis in respect of the Equipment and not previously charged to the<br />

Customer. Any refund then due to the Customer will be credited to the Customer once the deletion has<br />

been processed by Logicalis.<br />

<strong>Service</strong> Catalogue<br />

932


To facilitate the efficient and timely change management of frequently required, non-complex<br />

change requests, Logicalis will provide a <strong>Service</strong> Catalogue (SC). The service catalogue is typically a<br />

catalogue of charges for additional fixed price products and services. The SC both simplifies the ordering<br />

process (as the requestor orders a single SC item rather than all the component parts it contains), and<br />

assists the requestor with budgeting, as each SC item is fixed in price (within constraints).<br />

Each SC item can contain a mix of capital and recurring costs; in some cases (for example when a<br />

Smoothed Pricing model is being used for the main contract), SC items are priced on a recurring charge<br />

only, where that recurring charge typically includes the cost of any equipment (amortised over the<br />

Term), any associated professional services, bandwidth charges, maintenance and managed services.<br />

item.<br />

SC charges are inclusive of all components of cost related to the provision and support of each SC<br />

The specification of each SC item is fixed (i.e. the equipment and services configuration for each<br />

item are fixed, and defined in a Bill of Materials); this means that SC items are by their nature non-<br />

configurable. For this reason, only items that are fixed-content (and frequently ordered) are included in<br />

a SC. For requirements that are configurable, the prevailing quotation process is used. Typical SC items<br />

are professional services (rate card services), consumables, licenses and non-configurable equipment.<br />

If it becomes clear that any existing SC items are unlikely to be ordered, or conversely that there are<br />

fixed products & services which are frequently required, then SC items can be added and removed as<br />

needed - usually following an annual review.<br />

KPI, <strong>Service</strong> Levels, Reporting<br />

933


None<br />

Environmental Considerations<br />

Infrastructure<br />

This section describes the conditions that the Customer must ensure are in place for the effective<br />

operation of the equipment at each site:<br />

934<br />

mains electrical supply as required;<br />

sufficient 13A power outlets;<br />

sufficient 32A or 16A “commando” power outlets;<br />

space for 19” equipment racking of sufficient size with front and rear access, where required.<br />

Air Conditioning<br />

The temperature in the equipment rooms must be maintained below agreed temperatures (typically<br />

24°C) as required by the equipment specifications.<br />

Customer’s Obligations<br />

The Customer will:<br />

Provide access to the sites during hours of cover to facilitate Logicalis’ provision of the<br />

services;<br />

Maintain in good condition the accommodation of the equipment, the cables and fittings<br />

associated therewith and the electricity supply thereto;<br />

Ensure that the equipment is operated by competent staff;<br />

Advise Logicalis in writing of any modification to the equipment;


935<br />

Keep and operate the equipment in accordance with the manufacturer's operating<br />

instructions, ensuring that the external surfaces of the equipment are kept clean and in good<br />

condition, including, where appropriate, changing the air filters;<br />

Notify Logicalis if the equipment is to be moved from its installed sites, specifying the date<br />

and thereafter to comply with any reasonable instructions from Logicalis in relation to such<br />

equipment stipulated prior to such relocation. <strong><strong>Service</strong>s</strong> in relation to equipment moved from its<br />

original sites will be provided at Logicalis’ discretion and may be subject to additional charges to<br />

be agreed between the parties. Logicalis’ provision of services will not be unreasonably<br />

withheld;<br />

Bring to the attention of Logicalis the Customer’s policies and procedures in respect of<br />

security and health and safety and notify Logicalis of any potential health or safety risks that<br />

may exist at any site;<br />

Provide Logicalis with full, safe access to and adequate working space in the sites for the<br />

purposes of Logicalis’ provision of the services;<br />

Make available to Logicalis free of charge all facilities and services reasonably requested by<br />

Logicalis to facilitate Logicalis’ performance of the <strong><strong>Service</strong>s</strong>;<br />

Provide remote access facilities and procure that such facilities can be used without restriction<br />

or fee by Logicalis to gain remote access to the maintained equipment;<br />

Enable Quality of <strong>Service</strong> on its data network.<br />

The Customer must provide Logicalis with 5 Working Days notice of all planned power downs.<br />

Logicalis provides, at the request of the Customer, staff with the appropriate expertise and<br />

experience to attend Sites to ensure that the Telephony Systems are taken out of service and restored<br />

to full operation in an orderly fashion as and when required as a result of power supply testing, planned<br />

mains power outage and other building and works maintenance activities.<br />

Notes:<br />

A standard power down service will include the following:<br />

o Attendance at site to power down the Telephony System (maximum 3 hours on site<br />

visit);<br />

o Software back up prior to re-load;<br />

o Revisit to site to power up switch;<br />

o Post power up check and acceptance test to include all supplied peripherals (maximum 3<br />

hours on site visit);


936<br />

On site peripherals such as screen based consoles, ACD management terminals etc. are not<br />

included in the power down activities and any data back up of these peripherals is the<br />

responsibility of the Customer.<br />

Routine Maintenance<br />

Logicalis, through our Partners, provides routine maintenance services at all Managed Telephony<br />

<strong><strong>Service</strong>s</strong> sites so as to:<br />

verify or ensure that the PBX systems, including uninterruptible power supply (UPS) and<br />

batteries, perform in accordance with the manufacturer's specification or as may be required by<br />

the Customer; and/or<br />

verify or ensure that the PBX systems, including uninterruptible power supply (UPS) and<br />

batteries continue to comply with any current condition contained in an approval of each<br />

component PBX under section 22 of the Telecommunications Act 1984 or in the designation of a<br />

standard under the section; and/or<br />

to verify or ensure that any terms or conditions regarding the PBX, systems including<br />

uninterruptible power supply (UPS) or its connection or use that may be stipulated by any of the<br />

operators of any of the Public Switched Networks to which the PBX systems are, or are to be,<br />

connected (and which must be observed if the PBX systems are or are to remain so connected)<br />

are observed.<br />

In providing the services outlined in above, Logicalis ensures that we:<br />

comply with the requirements of the manufacturer of the PBX systems, including UPS and<br />

batteries specification for routine maintenance;<br />

comply with Logicalis' own Quality Procedures for that equipment.<br />

If scheduled maintenance or planned work is considered by Logicalis to be service affecting, then<br />

Logicalis informs the Customer at least 10 Working Days in advance.<br />

Logicalis agrees with the Customer at least 48 hours in advance of any engineering attendance<br />

at a Site.<br />

If scheduled maintenance is not considered to be service affecting by Logicalis, then Logicalis agrees<br />

with the Customer in advance of any engineering attendance.


Site Documentation<br />

Logicalis amends the relevant documentation for Systems, to reflect any maintenance activities<br />

carried out on the systems.<br />

Logicalis updates the system documentation, following completion of the modification that<br />

necessitated the amendment.<br />

made.<br />

Logicalis ensures that all site documentation is updated within 5 Working Days of any changes being<br />

Boundary of Responsibility<br />

The boundary of responsibility for the equipment will be the “Entry/Exit Point” where the cables or<br />

fibres to equipment not covered by the Agreement are connected: these cables or fibres themselves are<br />

not covered.<br />

Where the equipment is connected to any other equipment both managed and maintained by<br />

Logicalis (whether under this or some other extant agreement), then the monitoring extends to the<br />

cables or fibres between the two items of equipment.<br />

Telephony <strong><strong>Service</strong>s</strong> – <strong>Service</strong> Boundaries<br />

For analogue and digital extensions the service management boundary of the Traditional Telephony<br />

<strong>Service</strong> is up to and including the test jack frame (TJF). The cabling system from the TJF/link cable<br />

interface is outside of the service provision scope for the <strong>Service</strong>. However the Logicalis provides the<br />

link cable and other cabling, mod taps, extension leads and splitters on a supply only basis at the initial<br />

time of site installation.<br />

937


For IP extensions within the Traditional Telephony <strong>Service</strong> the service management boundary of the<br />

<strong>Service</strong> is up to the LAN interface on the Telephony Switch (for those sites which have a switch capable<br />

of supporting IP handsets).<br />

For those sites which are being served by the Next Generation Telephony <strong>Service</strong> the service<br />

management boundary is up to the LAN interface of the on-site router. The Customer side LAN<br />

infrastructure is outside of the scope for the <strong>Service</strong> and Logicalis is not responsible for any loss of<br />

service due to the performance of the LAN unless the on-site LAN is supported by Logicalis.<br />

Only the handsets or other terminal equipment provided by Logicalis are the responsibility of<br />

Logicalis. Cabling, links, mod taps, extension leads and splitters are the responsibility of the Customer to<br />

provide and manage. For moves and changes the Customer is responsible for all on site cabling and<br />

patching, unless otherwise agreed.<br />

Block Wiring & Cabling<br />

Logicalis provides full routine and remedial maintenance services for the telephony block wiring at<br />

Sites where it has been agreed, on a Site by Site basis, that such maintenance is provided.<br />

Logicalis, at the request of the Customer, carries out a survey of the block wiring at any Site or<br />

prospective Site.<br />

Logicalis:<br />

938<br />

documents the survey fully and specify any remedial or upgrade work necessary to bring the<br />

wiring up to current technical and health and safety standards, and<br />

provides the Customer with a quotation to carry out the remedial work and the survey.


Logicalis prepares, where this is necessary, and maintains up to date block wiring diagrams and<br />

associated records for all Sites. Such activities attract additional charges.<br />

Logicalis makes copies of, and extracts from, block wiring diagrams and associated records which are<br />

available to the Customer on request. Such activities attract additional charges.<br />

Logicalis liaises, and co-operates with the Customers' own dedicated maintenance contractors,<br />

where such arrangements exist and where such arrangements have an impact on the provision of the<br />

<strong>Service</strong>. Such activities may attract additional charges.<br />

Logicalis provides cabling in accordance with the relevant technical specification, which is agreed on<br />

a per Site basis, where this is required in order to comply with the requirements of the <strong>Service</strong> Level<br />

Agreement.<br />

939


NextiraOne UK Limited<br />

NextiraOne offers a comprehensive set of services relevant to this Lot, built around the ITIL services<br />

lifecycle model, from requirements to design, from integration to deployment and incorporating<br />

operation, support, management and optimisation services.<br />

The services are listed below:<br />

940<br />

Assessment of Requirements – this service consists of: an information gathering phase carried<br />

out by our Consultants with the Customer; the production of a report defining the Customer’s<br />

business and technical requirements associated with the specific technology in scope; and a<br />

workshop with the Customer to review the findings. For this Lot, the service is applicable to:<br />

o Voice solutions (incorporating requirements for dial plans, calls and Voice minutes plans<br />

and packages, Call Routing options, call preferences, system distribution and resilience,<br />

handset and switchboard specifications, CTI requirements, migration strategies and<br />

Voicemail)<br />

o Communications solutions, specifically Audio/Web/Video Conferencing (desktop-based),<br />

Internet access, Email, Instant Messaging and Presence. The following are examples of<br />

what the assessment covers:<br />

§ For a corporate Email solution: details of the current messaging architecture, routing<br />

topologies, underlying directory services, storage and backup platforms, physical or<br />

virtual server infrastructure, current products being used including editions and<br />

versions<br />

§ For a desktop-based Conferencing solution: details of the existing underlying Voice<br />

solutions and call control architectures, directory services, storage and backup<br />

platforms, physical or virtual server infrastructure, mobility strategies, User usage<br />

profiles and current products being used<br />

o Security solutions for Communication systems, by addressing specific security requirements<br />

for Email and Instant Messaging, Anti-virus, Email scanning, Email filtering, Malware and<br />

Spyware identification and blocking, intrusion detection and prevention, identity and access<br />

management. As an example, the assessment service for the security of an Email solution<br />

covers a review of the Customer’s end user security policy and its alignment with existing<br />

Antivirus configuration settings, Firewall rules, Email content scanning & filtering policies<br />

and Malware and Spyware settings<br />

Technical Audit and Assessment – this service delivers a comprehensive view of the Customer’s<br />

current network and security infrastructure, its capability to support the systems and<br />

technologies relevant to this Lot and recommendations for changes and improvements. For


941<br />

example, the service ascertains the network readiness to support an IP-based Voice solution, or<br />

communication services such as Instant Messaging, Email, Audio/Web/Video Conferencing and<br />

Internet access. For a corporate Email solution, the assessment covers current storage capacity<br />

and scalability, mailbox capacity settings, volume of Emails, categories and profile of Users,<br />

bandwidth of Internet links used for the delivery/receipt of Email traffic and remote access<br />

capabilities. The information is delivered in a report supplemented by network diagrams as<br />

necessary<br />

Technical Architecture & System Design – this service provides the Customer with a fully<br />

defined design of a secure Communication solution, based on agreed requirements. It includes<br />

physical and logical network, infrastructure and architecture diagrams; details of the system<br />

physical installation and its configuration; full hardware and software equipment list; a<br />

description of the security, resilience and redundancy of the system; and the list of features that<br />

the solution will provide. As an example, for an IP-based Voice system, the following is<br />

delivered:<br />

o Network diagrams showing the physical and logical layout of Communication Servers,<br />

Voice Gateways and associated equipment<br />

o Diagrams showing Call Routing paths<br />

o Network logical diagrams showing the integration and interfaces between the telephony<br />

solution and existing Directory services and/or other applications<br />

o A full list of the system features that are enabled for this design<br />

o The distribution of handset models within the user population<br />

o Full details of dial plans<br />

o Full details of PSTN services<br />

o Full details of on-net routing services<br />

o IP addressing schemes<br />

o DHCP schemas<br />

o Disaster Recovery diagrams<br />

· Supply – we provision hardware and software relevant to this Lot:<br />

o we supply all elements of an IP-based Voice solution: Communication Servers, Voice<br />

Gateways, handsets, switches, headsets, call control software, Softphones, CTI clients, and<br />

Voicemail


942<br />

o for Internet access services, we provision circuits, routers, web access control software,<br />

web security software and appliances for protection against Malware and Spyware, and<br />

intrusion detection and prevention systems<br />

o for Email systems, we supply server, storage and backup hardware, Email software<br />

applications, Email archiving hardware and software, reverse proxy servers, Anti-virus<br />

software, hardware and software for Email content scanning and filtering<br />

· Installation – this service delivers the off-site pre-staging, factory testing, pre-build and test of<br />

hardware relevant to this Lot, ensuring that all the correct equipment for a specific solution has<br />

been delivered and is operational, followed by the physical delivery and installation of the<br />

equipment at its final location: Customer premises, co-location centre, or hosted Data<br />

Centre. For software, this service delivers the physical installation of software systems on the<br />

appropriate Customer hardware, or NextiraOne’s hardware (in the case of hosted<br />

solutions). Examples of how this service applies to Communication solutions are: installation of<br />

communication and application servers (Email, Messaging, desktop-based Conferencing), Voice<br />

and Media gateways, handsets, switches, storage and backup systems, Internet and Email<br />

security appliances, Anti-virus software, Email scanning and filtering software and Internet<br />

access login software<br />

· Transition and Integration – management of the transition of new services to operational/live<br />

status and their integration with existing business applications, IT systems and Directory<br />

environments. As an example, this service delivers the integration of a Voice solution with an<br />

existing Email system for Voicemails and unified mailbox management, or the integration of a<br />

desktop messaging and Audio Conferencing system with an existing telephony solution<br />

· Migration – this service delivers the physical and technical migration of legacy systems onto<br />

new platforms, or the upgrade of existing systems to the latest version. An example of this<br />

service can be illustrated by the migration from an Email solution based on Lotus Notes to a<br />

Microsoft Exchange environment. Another example is the migration from legacy TDM<br />

telephony to VoIP IP Telephony<br />

· Configuration – this service delivers the physical and logical configuration of a new<br />

Communication solution and is concerned with software and parameters settings. As an<br />

example, for an Email solution, it delivers the configuration of operating systems, server<br />

applications, databases, user and address lists, mailboxes, remote access and parameters for<br />

mailbox, storage and archiving management. As an example, for Voice or desktop Conferencing,<br />

it delivers the configuration of the servers and applications, including user databases and access<br />

lists. The final system design and configuration is documented as part of this service


· Testing – the definition and execution of agreed tests at various stages during its<br />

implementation. It covers: Factory Acceptance Tests, Site Acceptance Tests and final acceptance<br />

tests for system hand-over, mutually agreed between NextiraOne and the Customer. As an<br />

example, typical tests for an Email and Messaging solution include: server roles and services,<br />

external access services, public folder replication, remote and mobile access, unified messaging,<br />

backup and restore, user features and functionality, Email routing (in/out of the organisation)<br />

and server failover/failback in a DR scenario. Typical tests for a Voice solution include system<br />

resilience tests, PSTN and on-net routing of inbound and outbound calls, switchboard<br />

operations, user features including classes of service and system management functionality<br />

· System Training for Administrators and Trainers (Train-the-Trainer style) - delivers hands-on,<br />

practical knowledge on the day-to-day administration of the system, or training videos for ondemand<br />

access. As an example, for a Voice solution, the training covers setting up new users<br />

and removing old ones, adding/removing DDIs, changing Voicemail settings, setting up/changing<br />

hunt groups, setting up/changing user class of service profiles<br />

· End-User Training - delivers hands-on usage training to the users of the system, or training<br />

videos for on-demand access. As an example, for a Messaging & desktop Conferencing solution,<br />

this typically includes maintaining user lists, checking presence, instigating a text chat, starting<br />

an Audio Conference, starting a one-to-one or a multi-party Video Conference, recording<br />

conversations, sharing information and collaboration approaches<br />

· Project Management – this service delivers the required governance for the delivery of a<br />

Communication solution. The methodology followed, based on Prince2, is consistent for all<br />

technology projects delivered by NextiraOne, including Communication solutions. The service<br />

includes: Scope Definition (Statement of Works); Project Gantt chart; Test Definition;<br />

Acceptance Certificate; Hand-Over; Project Management Plan; System Design; Issue<br />

Management; Highlight Reporting; Scope Management; Performance Review; Risk Process &<br />

Management; Financial Planning; Quality Assurance Plan; Project Closedown<br />

· <strong>Service</strong> Management – this service provides governance for the delivery of Communication<br />

maintenance, support, management and optimisation services to Customers, management of<br />

<strong>Service</strong> Level Agreements and management of third parties. Delivered by ITIL-trained <strong>Service</strong><br />

Managers, this service includes: design and management of service and service strategy;<br />

management of service levels agreements; creating and managing scorecards, account plans,<br />

service improvement plans and service review meetings; management of transitions;<br />

management of escalations within NextiraOne and its partners; management of dedicated onsite<br />

resources; regular reporting and action plans on service levels; reporting on system<br />

943


944<br />

performance and Communication solutions’ optimisation plans; management of Customer’s<br />

third party providers. As an example for Voice solutions, this service provides management of<br />

carriers and <strong>Service</strong> Providers<br />

· Welcome Centre (<strong>Service</strong> Desk) - Our Welcome Centre provides first point of contact for our<br />

Customers worldwide, 24 hours a day, 7 days a week and 365 days a year, owning all of their<br />

service calls, incident reports and assistance requests from placement to resolution. The<br />

processes and procedures in place to support the operation of the Welcome Centre are<br />

consistent across all the solutions offered by NextiraOne and they apply to the Communication<br />

solutions and services provided for this Lot. This service delivers: incident logging; routing of<br />

calls to the appropriate team; allocation and management of Customer <strong>Service</strong> engineering<br />

resources; dispatch of spares; management of third-party service providers; incident lifecycle<br />

management - technical and management escalations<br />

· Maintenance and Support (Incident Management) – our Incident Management service<br />

delivers the logging, recording and solving of incidents, through remote and on-site technical<br />

support and break-fix services for solutions relevant to this Lot. The service restores ‘normal<br />

service operation’ as per agreed <strong>Service</strong> Levels Agreements. The service specifically includes:<br />

Remote Diagnostics; Remote Support (telephone support response to a service request;<br />

problem logging; diagnostic fault isolation; help with problem identification through technical<br />

advice; troubleshooting to verify causes of suspected errors or malfunctions); On-site<br />

Engineering Support; Hardware Replacement; Software Patches; Escalation Management<br />

· Moves, Adds and Changes (Change Management) – Our Change Management service delivers<br />

management and implementation of changes to a Communication solution including hardware,<br />

software, services or related documentation. The service minimises any potential disruption to<br />

the users of the solutions caused by change and keeps records of hardware, software, services<br />

and documentation up to date. Change Management deals with both software (remote) and<br />

hardware (on-site) changes. Typical examples of software changes for a Voice environment are:<br />

change DDI, change hunt group; change class of service profile; change handset model; add a<br />

new user, changing music on hold, reconfiguring handset keys. For an Email solution, typical<br />

software changes are: change of user name or Email address; change to a distribution list;<br />

change maximum size of a user mailbox. For security solutions relevant to this lot, typical<br />

software changes include: change of policy rules on firewalls or intrusion detection/prevention<br />

systems, updates of Anti-virus signature files (when not performed automatically); upgrades of<br />

Anti-virus software on servers and gateways<br />

· Remote Fault Monitoring - our Remote Fault Monitoring <strong>Service</strong> delivers 24x7x365 availability<br />

monitoring of key devices within a Customer’s network, by continuously checking the<br />

operational status of active network nodes and their interfaces. The service delivers: pro-active


945<br />

availability checking; incident identification and status analysis; classification, prioritisation and<br />

escalation, real-time access to status information via our Network Operating Centre <strong>Service</strong><br />

Information Portal. Incident tickets are generated when faults are detected and managed via<br />

our Incident Management service and according to the applicable <strong>Service</strong> Level Agreement. For<br />

Communication solutions, this service applies to all IP-based hardware components of such<br />

solutions, including but not limited to: Email and Voicemail servers; Call Managers; Messaging<br />

servers; Voice gateways, Presence servers; Internet Routers; and security devices such as<br />

firewalls, Anti-virus servers, intrusion detection and prevention appliances, Email scanning and<br />

filtering servers and website protection appliances<br />

· Remote Performance Monitoring - our Performance Monitoring service provides real-time<br />

collection of performance information for key network infrastructure devices and<br />

communication applications, 24x7, 365 days a year. The service delivers: continuous availability<br />

checking on monitored devices; continuous monitoring to agreed Key Performance Indicators;<br />

analysis and rapid reaction to problems; classification and prioritisation of incidents with<br />

escalation as per agreed <strong>Service</strong> Levels; real-time access to status information via the NOC<br />

information service portal; on-line technical reporting and periodic historical reporting. For<br />

Communication solutions, this service applies to the following IP-based hardware components:<br />

Email and Voicemail servers; Call Managers; Messaging servers; Voice gateways, Presence<br />

servers; Internet routers; and security devices such as firewalls, Anti-virus servers, intrusion<br />

detection and prevention appliances, Email scanning and filtering servers and website<br />

protection appliances<br />

· Remote Configuration Backup – this service delivers a regular backup of communications<br />

systems and applications configurations, performed daily, weekly or monthly as agreed with the<br />

Customer. The service is delivered from our Network Operations Centre (NOC) and is available<br />

for the following hardware components of communication solutions: Voice gateways, Internet<br />

routers, firewalls, intrusion detection and prevention appliances<br />

· Trend Analysis & Capacity Planning – this service provides:<br />

o Identification of trends in peaks and troughs of usage, finding points of failure that may<br />

have already occurred and identifying capacity issues in Communication solutions<br />

o Identification of improvements that can be made to prevent availability or capacity<br />

problems before they happen; this includes housekeeping or increasing capacity,<br />

identifying trouble spots and eliminating single points of failure<br />

For Communication solutions, this service applies to all servers, gateways, Internet routers, security<br />

appliances, and firewalls. As an example, for an Email solution, the service will review and analyse:


mailboxes quotas; mail send/receive quotas; utilisation of the server resources such as memory, CPU,<br />

network cards and storage; volume of mail sent/received; database sizes; backup times and windows;<br />

storage allocations and available capacities.<br />

· Software & Hardware Lifecycle Management – a preventative maintenance service which<br />

minimises downtime by delivering a consolidated report focused on the software and hardware<br />

status of the components of Communication solutions, which identifies:<br />

946<br />

o software patches, software updates and software upgrades, as released by<br />

manufacturers<br />

o security patches, as released by manufacturers<br />

o vulnerabilities, as announced by the manufacturers<br />

o end-of-life, end-of-development and end-of-support hardware components, as<br />

announced by the manufacturers<br />

The report is targeted to the specific Customer Communication solution and its components, and<br />

includes recommendations for installation of patches, updates and upgrades and hardware<br />

replacement. The service applies to all components of Communication solutions supported by<br />

NextiraOne, including servers, Call Managers, Voice gateways, Internet routers and security appliances.<br />

· Vulnerability Assessments and Penetration Tests – delivered by our own CLAS and CISSP<br />

Consultants and accredited ethical hackers, these services investigate, test and verify the level of<br />

protection and security of a Communication solution and infrastructure, evaluate any new risks,<br />

and recommend the measures to mitigate such risks. Security levels of solutions can be tested<br />

against Impact Levels 0-3. The services cover the following:<br />

o Vulnerability Assessments: identify potential weak areas in a Communication solution<br />

and attached systems<br />

o Penetration Tests: identify if the components of a Communication solution present an<br />

opportunity for an attacker to gain access to a trusted system<br />

As an example, PSTN access tests can be carried out to identify if the components of the<br />

Communication solution present an opportunity for unauthorised access to PSTN services via Voicemail,<br />

IVRs and users class of service profiles.


· Health Checks – these services deliver preventative maintenance for the components of a<br />

Communication solution, to minimise and prevent downtime which may be caused by faulty<br />

hardware, misconfiguration of hardware and software, and/or out of date software. As an<br />

example, for communication solutions, this service can be applied to all servers and storage<br />

elements, and typically includes routine testing of UPS battery performance and review of<br />

system logs. For an Email solution, typical checks include capacity and performance of servers<br />

and storage databases<br />

· Resident Expert – bespoke service for the provision of on-site technical expertise for<br />

Customers for an agreed period of time. Such technical resources are managed by a NextiraOne<br />

<strong>Service</strong> Manager and work at the Customer premises for the duration of the contract<br />

period. Their skills, accreditations, job function, role and responsibilities are agreed with the<br />

Customer prior to commencement of the contract and are appropriate for the Customer’s<br />

Communication solutions being supported. The resources remain employees of<br />

NextiraOne. Typical examples of this service are Resident Engineers specialising in Voice, Email<br />

and Messaging systems, and related security solutions<br />

· Hosted IP Voice <strong>Service</strong> – this service delivers an IP-based Voice solution to Customers, where<br />

the equipment and the software are physically located in a third party Data Centre, accredited<br />

as a minimum to Impact Level 2. No equipment is required on the Customer premises for the<br />

delivery of this service, except for handsets and connectivity devices. The service delivers all the<br />

features of a CPE (Customer Premise Equipment) IP telephony solution (requirements and<br />

features are agreed with the Customer via an Assessment of Requirements) and is fully managed<br />

by NextiraOne, via a <strong>Service</strong> Manager. For the duration of the contract, NextiraOne remain<br />

responsible for the maintenance, support and management of the solution, based on agreed<br />

<strong>Service</strong> Level Agreements. The management services included are: service management,<br />

incident management, change management, software and hardware lifecycle management,<br />

remote monitoring, backup, scheduled health checks and reporting<br />

· Managed <strong>Service</strong> for Communication solutions – this service delivers full management of<br />

Communication solutions (specifically, for IP-based Voice, Email, Messaging, Desktop-based<br />

Audio and Video Conferencing, Internet access and related security solutions). For the duration<br />

of the contract, NextiraOne takes on the responsibility for the maintenance, support and<br />

management of the solution, based on agreed <strong>Service</strong> Level Agreements. The Managed <strong>Service</strong><br />

includes the following: service management, incident management, remote monitoring, backup,<br />

change management, software and hardware lifecycle management, scheduled health checks,<br />

and reporting<br />

· Co-location service for Communication solutions – this service provides Customers with<br />

physical housing facilities for their own equipment for Communication solutions in a third party<br />

947


948<br />

Data Centre accredited, as a minimum, to Impact Level 2. This service can be combined with the<br />

NextiraOne Managed <strong>Service</strong> for Communication solutions


Siemens Communications<br />

1. Executive Summary<br />

949<br />

Summary of product range<br />

1.1 The Contractors <strong>Service</strong> comprises of the following <strong><strong>Service</strong>s</strong>;<br />

1.1.1 Voice and Unified Communications <strong><strong>Service</strong>s</strong> available as traditional and IP based voice<br />

<strong><strong>Service</strong>s</strong>; voicemail, a range of terminals, ACD or contact center facilities voice call packages;<br />

voice minutes; DDI, premium rate numbers; non-geographic numbers; 118 enquiries; call<br />

preference <strong><strong>Service</strong>s</strong>, audio conferencing, desktop video conferencing and collaboration<br />

tools; web conferencing; messaging <strong><strong>Service</strong>s</strong>; real time information <strong><strong>Service</strong>s</strong>; desktop<br />

messaging; messaging via email, SMS, pager and mobile or fixed line telephone; and<br />

Telephone Operator <strong>Service</strong>.<br />

1.1.2 Data <strong><strong>Service</strong>s</strong>, comprising of Internet <strong><strong>Service</strong>s</strong>; email and website <strong><strong>Service</strong>s</strong>; co-location and<br />

hosting; on-line storage; security <strong><strong>Service</strong>s</strong>; antivirus; email scanning and filtering; firewalls;<br />

intrusion and spyware detection. Delivered as a Hosted solution or on site with Managed<br />

<strong>Service</strong> options.<br />

1.1.3 Identity and Access Management <strong>Service</strong> (IAM) comprising of directory, authentication,<br />

certificate management (CM) and access management, and web and application sign on<br />

<strong><strong>Service</strong>s</strong>.<br />

1.1.4 The supply, installation, maintenance, technical architecture and system design, project<br />

management, and support for Equipment.<br />

1.2 The Contractor has defined Commodity as the availability of individual products (an<br />

Openstage SIP Terminal) and or <strong><strong>Service</strong>s</strong> (installation of a product/s, hosted email) or a<br />

combination of both available under this Lot 1. The Contractor shall make available such<br />

individual products and or <strong><strong>Service</strong>s</strong> for the Customer to purchase in accordance with the<br />

main Call of terms and associated schedules.<br />

2. Definitions<br />

The definitions used within this <strong>Service</strong> description are contained in paragraph 2.<br />

Term Definition<br />

Voice End Points Handsets for use by End Users<br />

Audio Conferencing<br />

<strong>Service</strong><br />

Calls to remote parties, both internally and outside the<br />

organisation<br />

Call Control Incoming and outgoing call control via the Unified


950<br />

Communication desktop application<br />

Call Exclusive Call package excluding the cost of calls<br />

Call Journal Provides record of incoming, outgoing and missed calls<br />

Call Logging Collecting and analysing phone call data to report on<br />

cost, performance, capacity and quality of <strong>Service</strong> (QoS)<br />

Communications<br />

<strong>Service</strong><br />

Shall mean all or part of the <strong>Service</strong> defined in this<br />

paragraph<br />

Contact Management Allows End Users to identify specific End Users in their<br />

regular contact lists, within groups and with various levels<br />

of control managed by the End User from the Unified<br />

Communication desktop application<br />

Contractors<br />

Telephone Operator<br />

<strong>Service</strong><br />

Customer Site<br />

Requirements<br />

Data Collection<br />

<strong>Service</strong><br />

Contractor employed operators will answer calls that<br />

are presented to Contractor Telephone Operator <strong>Service</strong> on<br />

behalf of the Customer.<br />

Defined Customer requirement for hosting On-Site<br />

Equipment<br />

Contractor offered <strong>Service</strong> to collect the configuration<br />

and routing information from existing Customer contact<br />

centres.<br />

Data Equipment Data <strong>Service</strong> that is On-Site Equipment<br />

DDA Compliant End<br />

Points<br />

Direct Dial Inwards<br />

(DDI)<br />

Voice endpoints compliant to the Disability<br />

Discrimination Act legislation<br />

Allow the Customer to have allow the user to have<br />

multiple telephone numbers<br />

Deployment Methods Implementation models for installing each <strong>Service</strong><br />

Desktop Video<br />

Conferencing<br />

Video calls to remote parties, both internally and<br />

outside the organisation


Directory Enquiry<br />

<strong>Service</strong><br />

951<br />

<strong>Service</strong> available, via 118, to locate telephone numbers<br />

Directory <strong>Service</strong> Web access to the Directory <strong>Service</strong> containing details<br />

of Customer End Users<br />

DNSP Direct Network <strong>Service</strong> Provider<br />

End Users Shall mean any staff of the Customer that uses the<br />

Communications <strong>Service</strong><br />

Equipment Shall mean Data Equipment, Voice, Unified<br />

Communications Equipment and application services<br />

Identity Management<br />

<strong>Service</strong><br />

Management of individual identities, their<br />

authentication, authorisations and permissions for system<br />

access<br />

Instant Messaging End Users can exchange real-time text messages with<br />

other End Users using an Instant Messaging (IM)-like<br />

interface<br />

IP Internet Protocol<br />

LAN Local Area Network<br />

Lightweight Directory<br />

Access Protocol (LDAP)<br />

Internet protocol that allows programs to look up<br />

information from a server.<br />

MAC Move, Add and Change<br />

Managed <strong>Service</strong> Management of day-to-day related tasks and<br />

procedures<br />

Meet Me <strong>Service</strong> As defined in 8.2.5<br />

Off-Net Calls Externally routed calls via the PSTN<br />

One Number <strong>Service</strong> Determines routing of calls via a single number<br />

delivered to an end Device defined by the End User via the


952<br />

Unified Communication desktop application, telephone<br />

user interface or mobile client<br />

On-Net Calls Calls routed within the Contractors Managed <strong>Service</strong><br />

On-Site Equipment Telephony Equipment located on the customers<br />

premises<br />

Presence End Users can view the availability and status of their<br />

contacts, enabling them to choose the best method and<br />

time to communicate<br />

Professional <strong><strong>Service</strong>s</strong> A range of <strong><strong>Service</strong>s</strong> that can be purchased from the<br />

Contractor<br />

<strong>Service</strong> Delivery<br />

Model<br />

<strong>Service</strong> Level<br />

Agreement<br />

Standard<br />

Configuration Plan<br />

Implementation strategy for supply of <strong><strong>Service</strong>s</strong><br />

Agreed performance levels<br />

The Contractors system configuration<br />

TDM Time Division Multiplexing<br />

UC Unified Communications<br />

Voice <strong>Service</strong><br />

Platform<br />

The Contractors Site that contains Equipment to deliver<br />

the Communications <strong>Service</strong><br />

Web Conferencing Ability to share desktop, multi-party video conferencing<br />

3. Voice and Unified Communications <strong><strong>Service</strong>s</strong><br />

3.1 <strong>Service</strong> Provision<br />

3.1.1 The Contractor shall provide the following <strong><strong>Service</strong>s</strong> for Voice and Unified Communications<br />

<strong><strong>Service</strong>s</strong>;<br />

(i) The Customer can request the Contractor to supply new Equipment, together with<br />

the associated and optional installation, and maintenance;


953<br />

(ii) The Customer can request the Contractor to upgrade the existing Contractors<br />

supplied Equipment, together with the associated and optional installation,<br />

maintenance or managed <strong>Service</strong>;<br />

(iii) The Customer can request the Contractor to provide a managed <strong>Service</strong> to include<br />

the support, maintenance, installation, upgrades, and can include management or<br />

replacement of legacy third party Customer owned Equipment, where paragraph<br />

3.5 will apply;<br />

(iv) The Customer can request the Contractor to provide a Hosted <strong>Service</strong> which<br />

combines the delivery of Equipment and high availability <strong>Service</strong> against fixed<br />

<strong>Service</strong> Levels hosted in the Contractors Datacenters;<br />

(v) Unless otherwise specified (in accordance with this paragraph 3.1.1 (iii)) by the<br />

Customer the following Equipment or <strong>Service</strong> options shall be provided by the<br />

Contractor;<br />

(a) HiPath 4000 software version 5 or higher (on site);<br />

(b) HiPath DX and software version 9 or higher (on site);<br />

(c) OpenOffice and software version 3 (on site);<br />

(d) OpenScape Voice and software version 6 (on site version);<br />

(e) The Contractors Hosted <strong>Service</strong> Platform (based on the Hosted OUCS) a<br />

managed <strong>Service</strong> offering only.<br />

3.1.2 The Contractor Telephony Equipment (3.1.1(e)) Hosted <strong>Service</strong> Platform shall be provided<br />

as a Managed <strong>Service</strong> from Contractor’s Datacenters.<br />

3.1.3 The deployment of <strong><strong>Service</strong>s</strong> provided by the Contractor shall be managed by the<br />

Contractors Project Management Office in accordance with paragraph 7.2.<br />

3.1.4 The Contractor shall provide <strong>Service</strong> Management and Maintenance of the <strong><strong>Service</strong>s</strong> in<br />

accordance with paragraphs 8 and 9.<br />

3.2 On-Site Equipment<br />

3.2.1 The Contractor will provide Licences Extension cards, Network Interfaces, Software and<br />

optional maintenance <strong><strong>Service</strong>s</strong> to meet the feature and functionality requirements of the<br />

Customer.<br />

3.2.2 On Site Equipment provided by the Contractor shall be subject to the configuration<br />

limitations as advised by the Contractor prior to <strong>Service</strong>.<br />

3.2.3 The Contractor shall meet the optional <strong>Service</strong> levels detailed in paragraph 9.<br />

3.2.3.1 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements<br />

as specified in Appendix 4, the Call-Off Form.<br />

3.2.4 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.


954<br />

3.2.4.1 Bespoke Customer requirements may be amended in accordance with Appendix<br />

4 Call Off Form.<br />

3.2.5 The Contractor shall provide a chargeable Moves Adds and Changes (MAC) <strong>Service</strong> for the<br />

On-Site Equipment. For those Customers that prefer to perform their own MAC, the<br />

Contractor shall provide the Customer through suitable privileges the ability to perform<br />

their MACs.<br />

3.2.6 For the Contractor supplied Equipment, IP and TDM Voice Endpoints shall be in accordance<br />

with paragraph 4.1.9.<br />

3.2.7 The Contractor shall provide an optional onsite call management system for the Customer<br />

to produce its own call logging reports.<br />

3.2.8 The Customer may source its own alternative handsets, provided they are compatible with<br />

the system. The Customer is responsible for the support and deployment of third party<br />

devices, if not supplied by the Contractor.<br />

3.2.9 The Contractor shall provide as a minimum the following headline system based<br />

functionality:<br />

· Call Forwarding<br />

· ACD functionality<br />

· Call Hold<br />

· Call Park<br />

· Consultation Hold<br />

· Call Transfer<br />

· Call Pickup<br />

· Hunt Groups<br />

· Call Waiting<br />

· Call Diversion<br />

· Call Back<br />

· Speed Dialling<br />

· Internal extension calling<br />

· Do Not Disturb<br />

· Manager/secretary working<br />

· Distribution groups<br />

· Conference calls<br />

· Executive Access Override / Busy Override<br />

· Last Number Redialled<br />

· Message Waiting


955<br />

· Music On Hold<br />

· Direct dialling in (DDI)<br />

· Mobility<br />

· Hot-desk<br />

· Ministerial listen and speak (HiPath DX only)<br />

· Access to Voicemail <strong>Service</strong><br />

· Conferencing<br />

· Support for Operator Console<br />

· Call Logging Port<br />

· Mobile Extension<br />

· Mobility <strong>Service</strong> by using Siemens HiPath Mobility <strong>Service</strong>.<br />

· Fraud Prevention<br />

3.2.10 The Customer may invoke a range of optional <strong><strong>Service</strong>s</strong> in accordance with paragraph 4.<br />

3.2.11 The Contractor shall offer Professional <strong><strong>Service</strong>s</strong> described in paragraph 7.<br />

3.2.12 The Contractor shall provide project management as described in paragraph 7.2 to deliver<br />

the On-Site Equipment.<br />

3.2.13 The Contractor shall offer a Call Exclusive <strong>Service</strong> where the Customer will be responsible<br />

for all PSTN connectivity and charges.<br />

3.2.14 The Contractor shall offer a Call Inclusive <strong>Service</strong> where the Contractor will be responsible<br />

for the provision of PSTN charges by way of a bundled call minute option.<br />

3.2.15 The Contractor shall provide Network Interfaces required to support connection to a<br />

Customer provided PSTN provider and DNSP provider. The Customer shall be responsible for<br />

all network connection charges.<br />

3.2.16 An Accredited <strong>Service</strong> supporting IL2 and IL3 requirements.<br />

3.3 Hosted Telephony <strong>Service</strong> (Managed <strong>Service</strong>)<br />

3.3.1 The Contractor will provide Licences, Network Interfaces Maintenance and all required<br />

Capacity Management to meet the feature and functionality requirements specified by the<br />

Customer, the Number of Licences required may be changed (with a corresponding increase<br />

or decrease in the Charges) on a quarterly basis by the Customer to reflect the number of<br />

users required.<br />

3.3.2 The Contractor shall provide the following Managed Hosted <strong><strong>Service</strong>s</strong>.<br />

3.3.3 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraph 9.<br />

3.3.4 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.


3.3.5 Bespoke Customer <strong>Service</strong> Levels shall be created to meet specific Customer requirements<br />

in accordance with Appendix 4, the Call Off Form.<br />

3.3.6 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> to agree additional capacity requirements and to provide an escalation point<br />

for the Customer in accordance with paragraph 8.<br />

3.3.7 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> in<br />

accordance with paragraph 8.<br />

3.3.8 The Contractor shall provide access to a secure web portal or the Contractors ITIL <strong>Service</strong><br />

Desk for the Customer to request moves adds or system changes, which shall be performed<br />

by the Contractor, charged on a per move basis.<br />

3.3.9 The Contractor shall provide inclusive moves add and changes <strong>Service</strong> for the Customer.<br />

The Customer may request via a secure web portal or the Contractors ITIL <strong>Service</strong> Desk<br />

moves adds or system changes, which shall be performed by the Contractor.<br />

3.3.10 The Contactor shall provide the Hosted <strong>Service</strong> IP Telephony Exclusive of any call bundle<br />

(PSTN minutes) but with DNSP connectivity using the IP Voice Endpoints described<br />

paragraph 4.2.13.<br />

3.3.11 The Contractor shall provider the Hosted <strong>Service</strong> IP Telephony Inclusive of a call bundle (UK,<br />

International and Mobile PSTN calls) and DNSP connectivity subject to a published fair usage<br />

policy.<br />

3.3.12 The Contactor shall provide the Hosted <strong>Service</strong> IP Telephony Exclusive of any call bundle<br />

(PSTN minutes) and DNSP connectivity using the IP Voice Endpoints described paragraph<br />

4.2.13.<br />

3.3.13 The Contractor shall provide an optional call management report <strong>Service</strong> which provides<br />

eight standard reports. Call management reports shall be accessed via the Contractors Web<br />

Portal or via alternative secure means as required by the Customer. The report formats<br />

(information) reporting method and access to ad hoc reports including the ability for the<br />

customer to create its own reports is included and shall be agreed between the Contractor<br />

and the Customer.<br />

3.3.14 The Customer may invoke a range of optional <strong><strong>Service</strong>s</strong> in accordance with paragraph 4<br />

3.3.15 The Contractor shall offer Professional <strong><strong>Service</strong>s</strong> described in paragraph 7.<br />

3.3.16 The Contractor shall provide Project Management for the deployment of <strong><strong>Service</strong>s</strong> in<br />

accordance in paragraph 7.2.<br />

3.3.17 An Accredited <strong>Service</strong> supporting IL2 and IL3 requirements.<br />

3.4 Onsite Managed Equipment <strong>Service</strong> (Managed <strong>Service</strong>)<br />

3.4.1 The Contractor will provide on site Licences, Network Interfaces Maintenance and all<br />

required Hardware or Server Capacity Management to meet the number of feature and<br />

functionality requirements specified by the Customer. The Number of Licences or Extensions<br />

may be changed (with a corresponding increase or decrease in the Charges) on a quarterly<br />

basis by the Customer, after a minimum period of twelve months from bring into <strong>Service</strong>.<br />

956


3.4.2 The Contractor shall provide the following managed Equipment <strong>Service</strong>.<br />

3.4.3 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraphs 9.<br />

3.4.4 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

3.4.5 Bespoke Customer <strong>Service</strong> Levels shall be created to meet specific Customer requirements<br />

in accordance with Appendix 4, the Call Off Form.<br />

3.4.6 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> to agree capacity requirements and to provide an escalation point for the<br />

Customer in accordance with paragraph 8.<br />

3.4.7 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> in<br />

accordance with paragraph 8.<br />

3.4.8 The Contractor shall provide access to a secure web portal or the Contractors ITIL <strong>Service</strong><br />

Desk for the Customer to request moves adds or system changes, which shall be performed<br />

by the Contractor, charged on a per move basis.<br />

3.4.9 The Contractor shall provide inclusive moves add and changes <strong>Service</strong> for the Customer.<br />

The Customer may request via a secure web portal or the Contractors ITIL <strong>Service</strong> Desk<br />

moves adds or system changes, which shall be performed by the Contractor.<br />

3.4.10 The Contactor shall provide Onsite Managed Equipment <strong>Service</strong> Exclusive of any call bundle<br />

(PSTN minutes) but with DNSP connectivity using Endpoints described in paragraph 4.3.14.<br />

3.4.11 The Contractor shall provide the Onsite Managed Equipment <strong>Service</strong> with an Inclusive of a<br />

call bundle (UK, International and Mobile PSTN calls) and DNSP connectivity subject to a<br />

published fair usage policy.<br />

3.4.12 The Contractor shall provide the Onsite Managed Equipment <strong>Service</strong> Exclusive of any call<br />

bundle (PSTN minutes) and DNSP connectivity.<br />

3.4.13 The Contractor shall provide an optional call management report <strong>Service</strong> which provides<br />

eight standard reports, which can be accessed via the Contractors Web Portal or via<br />

alternative secure means as required by the Customer. The report formats (information)<br />

reporting method and access to ad hock reports including the ability for the customer to<br />

create its own reports is included and shall be agreed between the Contractor and the<br />

Customer.<br />

3.4.14 The Customer may invoke a range of optional <strong><strong>Service</strong>s</strong> in accordance with paragraph 4.<br />

3.4.15 The Contractor shall offer Professional <strong><strong>Service</strong>s</strong> described in paragraph 7.<br />

3.4.16 The Contractor shall provide project management for the delivery of the <strong><strong>Service</strong>s</strong> in<br />

accordance with paragraph 7.2.<br />

3.4.17 An Accredited <strong>Service</strong> supporting IL2 and IL3 security requirements.<br />

3.5 Other Vendor (Legacy) Equipment Managed <strong>Service</strong><br />

3.5.1 The Contractor will provide Licences, Equipment Network Interfaces Maintenance and all<br />

required Capacity Management to meet the number of users specified by the Customer, the<br />

957


958<br />

Number of Licences or Extensions required may be changed (with a corresponding increase<br />

or decrease in the Charges) on a quarterly basis by the Customer, after a minimum period of<br />

twelve months from bring into <strong>Service</strong>.<br />

3.5.2 Upon request by the Customer for the Contractor to provide a managed <strong>Service</strong> for the<br />

Other Vendor (Legacy) Equipment, the Contractor shall;<br />

3.5.2.1 Confirm suitability of the Legacy Equipment and maintenance capability to<br />

support the <strong><strong>Service</strong>s</strong> required by the Customer for the term required, as advised<br />

by the relevant manufacturers and published support policies<br />

3.5.2.2 Advise the Customer of any <strong>Service</strong> impact, <strong>Service</strong> level impact and suitability to<br />

connect to the Legacy Equipment to the <strong>PSN</strong> or DNSP<br />

3.5.2.3 Create a Walk in and Take over <strong>Service</strong> description detailing any changes required<br />

to the Equipment, any impact to the published <strong>Service</strong> levels or <strong><strong>Service</strong>s</strong> detailed<br />

in this schedule, and any resulting commercial impact<br />

3.5.3 Bespoke <strong>Service</strong> Levels shall be offered to meet specific Customer requirements as<br />

specified in Appendix 4, the Call-Off Form.<br />

3.5.2 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

3.5.3 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

3.5.4 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> in<br />

accordance with paragraph 8.<br />

3.5.5 The Contractor shall provide access to a secure web portal or the Contractors ITIL <strong>Service</strong><br />

Desk for the Customer to request moves adds or system changes, which shall be performed<br />

by the Contractor, charged on a per move basis.<br />

3.5.6 The Contractor shall provide inclusive moves add and changes <strong>Service</strong> for the Customer.<br />

The Customer may request via a secure web portal or the Contractors ITIL <strong>Service</strong> Desk<br />

moves adds or system changes, which shall be performed by the Contractor.<br />

3.5.7 The Contactor shall provide the Other Vendor (Legacy) Equipment <strong>Service</strong> Exclusive of any<br />

call bundle (PSTN minutes) but with DNSP connectivity.<br />

3.5.8 The Contractor shall provide the Other Vendor (Legacy) Equipment <strong>Service</strong> with an<br />

Inclusive of a call bundle (UK, International and Mobile PSTN calls) and DNSP connectivity<br />

subject to a published fair usage policy.<br />

3.5.9 The Contractor shall provide the Other Vendor (Legacy) Equipment <strong>Service</strong> Exclusive of any<br />

call bundle (PSTN minutes) and DNSP connectivity.<br />

3.5.10 The Contractor shall provide an optional call management report <strong>Service</strong> which provides<br />

eight standard reports, which can be accessed via the Contractors Web Portal or via<br />

alternative secure means as required by the Customer. The report formats (information)<br />

reporting method and access to ad hock reports including the ability for the customer to


959<br />

create its own reports is included and shall be agreed between the Contractor and the<br />

Customer.<br />

3.5.11 The Contractor shall provide Project Management in accordance with paragraph 7.2.<br />

3.5.12 The Customer may invoke a range of optional <strong><strong>Service</strong>s</strong> in accordance with paragraph 4.<br />

3.5.13 The Contractor shall offer Professional <strong><strong>Service</strong>s</strong> described in paragraph 7.<br />

3.5.14 The Contractor shall confirm the security impact level the Other Vendor (Legacy) Equipment<br />

can support (if any) prior to deployment of the <strong>Service</strong> for the Customer.<br />

4. Optional <strong><strong>Service</strong>s</strong> available for the Customer<br />

4.1 Where the Customer has asked the Contractor to manage 3 rd party vendor Legacy<br />

Equipment the Contractor shall use its reasonable endeavours to provide a similar <strong>Service</strong> or<br />

Equipment, subject to compatibility. In all cases the Contractor will upon request confirm<br />

compatibility and lead times prior to deployment for the Customer.<br />

Optional <strong><strong>Service</strong>s</strong> for Contractor Provided Equipment (On-Site)<br />

4.1.1 The following Equipment or Applications shall be made available as an optional <strong>Service</strong><br />

from the Contractor which shall, unless otherwise advised, be deployed on the Contractors<br />

supplied Equipment Onsite. The system based features and functionality of the Equipment<br />

and Software shall be made available.<br />

4.1.2 Xpressions Voicemail, a unified messaging platform (Voice and Email integration) delivered<br />

as hardware and software to the Customer specification the number of users required will<br />

dictate the size of Xpressions server to be implemented. The minimum number of mailboxes<br />

shall be 30 UM mailboxes. The maximum number of UM mailboxes shall be 10,000 per<br />

cluster. The provision of any LAN or Firewall Equipment shall be excluded from this option.<br />

4.1.2.1 Number of Voicemail Licences;<br />

4.1.2.2 Number of Fax Mail Licences;<br />

4.1.2.3 Email / Interface Licences;<br />

4.1.2.4 SMS Option;<br />

4.1.2.5 Text to Speech Licences.<br />

4.1.3 The supply of additional extension cards or Licences to provide telephony <strong><strong>Service</strong>s</strong>. The<br />

Customer may source its own handsets or use the Contractors range as detailed in<br />

paragraph 4.1.9.<br />

4.1.4 <strong>PSN</strong> DNSP Interfaces and or Digital Line Interfaces based on Customer requirements.<br />

4.1.5 SIP Telephony Interfaces. For the connection to DNSP PSTN providers.<br />

4.1.6 Analogue Exchange Lines and Equipment Bypass Circuits for power fail conditions only.<br />

4.1.7 Operator Screen Based Consoles and internal Directory Schema.<br />

4.1.8 Provision of ISDN Adaptors to support Bent and or Legacy ISDN 2 devices.<br />

4.1.9 Handset or OpenStage Terminals or Soft clients and adapters.


960<br />

Point<br />

400<br />

Voice End<br />

Analogue<br />

Berkshire<br />

OpenStage<br />

Features Supported<br />

12 permanent memories<br />

external memory programming port<br />

memory programming disable switch<br />

pause key<br />

MF dialling<br />

latching mute<br />

last number redial<br />

switchable TBR/ELR<br />

switchable RI/MW<br />

ringing Indicator<br />

headset port<br />

adjustable headset volume<br />

adjustable ringer pitch<br />

adjustable ringer volume<br />

BT & RJ45 linecords<br />

hearing aid compatible<br />

desk & wall bracket (optional)<br />

RJ11 linecord (optional)<br />

available in light or dark grey<br />

8 programmable keys with red LEDs


961<br />

5 key labelling with paper strips<br />

15<br />

40<br />

OpenStage<br />

OpenStage<br />

control keys +/-<br />

wall-mountable<br />

full-featured full duplex speakerphone with<br />

display<br />

8 illuminated function keys<br />

graphical display<br />

2 lines monochrome (not tiltable)<br />

3 fixed function keys with red LEDs,<br />

8 programmable keys with red LEDs (upgradable<br />

with Key Module)<br />

key labelling with paper strips<br />

control keys +/-<br />

3 navigation keys<br />

wall-mountable<br />

tiltable 6 lines monochrome ,backlit graphical<br />

display<br />

optical call alert.<br />

8 fixed function keys (partly equipped with red<br />

LEDs)<br />

6 programmable touch keys (illuminated)with red<br />

LEDs<br />

(function, speed dialler line keys<br />

control keys +/-,<br />

5-way navigator,


962<br />

60<br />

Client<br />

OpenStage<br />

OpenStage<br />

DECT<br />

OpenStage<br />

acoustics Hands free talking (full duplex<br />

headset jack<br />

wall-mountable.<br />

tiltable graphical backlit colour TFT display<br />

320 x 240 pixel (QVGA),<br />

optical call alert.<br />

6 fixed function keys (partly equipped with red<br />

LEDs)<br />

8 programmable touch keys (illuminated) with<br />

blue LEDs (function, speed dialor line keys)<br />

6 mode keys (touch keys, illuminated) with blue<br />

or blue/white LEDs<br />

touchslider for volume adjustment with<br />

blue/white LEDs<br />

touchguide for navigation.<br />

hands free talking (full duplex)<br />

polyphonic ringer tones<br />

headset jack<br />

bluetooth facility (subject to security constraints)<br />

USB master. (subject to security constraints)<br />

The Contractor shall provide a soft phone device for<br />

IP telephony users only. Providing telephony functions<br />

and access to function keys via a PC. It can be optionally<br />

displayed and placed in any position on the screen. This<br />

device offers the option of integrating corporate<br />

directories and personal call lists via LDAP<br />

The provision of SIP DECT Handsets<br />

key modules – from 18 to 90 programmable keys


963<br />

Accessories Wall mounting kits.<br />

GN Netcom and Plantronic Headsets<br />

4.1.10 HiPath Mobility for the provision of Home working and Hotdesking with audio prompts and<br />

audit records (available for HiPath DX only).<br />

4.1.11 HiPath DX or HiPath 4000 system administrator for single or multi-user site management.<br />

4.1.12 Tiger Call Management for the production of Onsite call logging reports.<br />

4.1.13 The Provision of UPS systems for Customer On Site applications.<br />

4.1.14 The provision of dual server PBX systems or IPT systems for increased availability, and dual<br />

network connectivity as defined by the Customer in consultation with the Contractor.<br />

4.1.15 The provision of Onsite and Remote maintenance <strong><strong>Service</strong>s</strong> (with <strong>Service</strong> cover and response<br />

time options) and provision of a <strong>Service</strong> Desk in accordance with Paragraphs 8 and 9.<br />

4.1.16 Remote Moves and Changes <strong>Service</strong> (for non inclusive Managed <strong>Service</strong> contracts). A<br />

Remote Move and Change is defined as the creation, addition, deletion and the moving of<br />

Software extension details but not including hardware. The <strong>Service</strong> Provider will manage<br />

changes to link numbering plans, site codes, class of <strong>Service</strong> and trunk access levels. For the<br />

avoidance of doubt each number moved allocated deleted or created is the equivalent of<br />

one change. Remote Moves and Changes include: Moves & changes; User classifications;<br />

Abbreviated dialling; Clock changes; Translation over private network; Route optimisation<br />

tables; Routing tables; Trunk access tables; Route restriction tables; DDI changes; Network<br />

numbering.<br />

4.1.17 On Site engineering <strong>Service</strong> (simple moves) subject to a Site survey conducted by the<br />

Contractor, the <strong><strong>Service</strong>s</strong> available are;<br />

· Move Extension Sockets, up to 30 meters;<br />

· Re-configure system, including jumpering at TJF or MDF;<br />

· Visit Site to power up and power down system (inclusive of Software back up and<br />

reload);<br />

· Provide engineer labour on hourly basis (inclusive of minor consumables);<br />

· Provide engineer on a daily basis (09:00-17:00, 45 minutes lunch);<br />

· Provide engineer labour on weekly basis (5 Days, 7.25 hours per day);<br />

· Relocation of CPU TJF and Equipment;<br />

· Relocation of CPU to new location in same building;<br />

· Relocation of CPU to a different site or building;<br />

· Additional Equipment installation <strong>Service</strong>, to support the commissioning of<br />

analogue handsets, feature terminals and any additional site cabling, (subject to site<br />

survey).<br />

4.1.18 The Contractor shall provide Project Management in accordance with paragraph 7.2 to<br />

deploy the <strong><strong>Service</strong>s</strong>.


Optional <strong><strong>Service</strong>s</strong> for Contactor Provided Hosted Managed <strong>Service</strong><br />

4.2 The following Equipment or Applications shall be made available as an optional <strong>Service</strong><br />

from the Contractor Hosted Managed <strong>Service</strong>. The system based features and functionality<br />

of the Equipment and Software shall be made available.<br />

4.2.1 OpenScape Xpressions Hosted Voicemail Software:<br />

964<br />

4.2.1.1 Xpressions Voicemail Licences;<br />

4.2.1.2 Xpressions Unified Messaging Licences;<br />

4.2.1.3 Xpressions Integration Software to support voicemail or unified messaging<br />

solutions with MS Exchange or Lotus Notes.<br />

4.2.2 OpenScape Unified Communications Software, providing Unified Communication<br />

applications, voicemail, collaborative working presence and user mobility.<br />

4.2.3 OpenScape Fusion Software and associated Hardware required to support the integration<br />

of OpenScape Unified Communication Server into a third party applications such as but not<br />

limited to Microsoft OCS, Microsoft Exchange and or IBM Lotus Notes.<br />

4.2.4 OpenScape Branch Proxy, to provide an on site (up to IL2) Accreditable survivable media<br />

gateway. The following OpenScape Branch devices are available:<br />

4.2.4.1 OpenScape Branch 50;<br />

4.2.4.2 OpenScape Branch 250;<br />

4.2.4.3 OpenScape Branch 1000;<br />

4.2.4.4 OpenScape Branch 6000.<br />

4.2.5 OpenScape Concierge Operator Consoles Concierge Software and associated Hardware<br />

required. The following optional <strong><strong>Service</strong>s</strong> are available;<br />

4.2.5.1 OpenScape Concierge Business Group (per customer);<br />

4.2.5.2 OpenScape Concierge User Licences.<br />

4.2.6 OpenScape Call Management Software and associated Hardware. The following optional<br />

<strong><strong>Service</strong>s</strong> shall be available from the Contractor;<br />

4.2.6.1 OpenScape Call Management Interface SMDR per Business Group;<br />

4.2.6.2 Tiger Call Management Software (call logging system) based on a per user charge;<br />

4.2.6.3 Optional Managed Call Logging <strong>Service</strong> more fully defined in paragraph 5.17.<br />

4.2.7 The provision of Session Border Controllers (for DNSP connectivity). The provision,<br />

maintenance and support of appropriately sized Session Border Controllers for network<br />

security. The default number of concurrent SIP trunking Licences shall not exceed fifteen<br />

percent of the total number of active Licences connected to the Hosted Equipment.


4.2.8 A Non Live Test Environment (NLE) facility for the use of the Contractors Customers and<br />

DNSP’s. The System is designed and implemented to replicate the Contractors <strong>Service</strong><br />

Provider platform to test all DNSP and other <strong>Service</strong> Provider applications, including client<br />

model office installations (for UC integration). For the avoidance of doubt, a Non Live<br />

Environment is a test system for End Customer infrastructure and compatibility tests only.<br />

4.2.9 OSCILLA Directory schema and Management Application The provision of an optional End<br />

User Directory System partitioned per business group: The OSCILLA platform will be<br />

configured to provide a full directory schema provided by the Contractor. This application<br />

will provide End Customers with a directory solution, a Web based Phonebook for access by<br />

OpenStage devices, providing a White and Yellow Pages directory. The <strong>Service</strong> is more fully<br />

defined in paragraph 5.18.<br />

4.2.10 The Contractor shall provide optional alternative ISDN Media Gateways supporting E1<br />

Connections for Client DNSP PSTN providers who can not currently offer SIP PSTN Interfaces.<br />

4.2.11 Provision of Terminal Adaptors to support Bent and or Legacy ISDN 2 devices.<br />

4.2.12 Handset or OpenStage SIP Terminals or Soft clients and adapters<br />

965<br />

Point<br />

5<br />

15<br />

Voice End<br />

OpenStage<br />

OpenStage<br />

Features Supported<br />

8 programmable keys with red LEDs<br />

key labelling with paper strips<br />

control keys +/-<br />

wall-mountable<br />

full-featured full duplex speakerphone with<br />

display<br />

8 illuminated function keys<br />

graphical display<br />

2 lines monochrome (not tiltable)<br />

3 fixed function keys with red LEDs,<br />

8 programmable keys with red LEDs (upgradable<br />

with Key Module)


966<br />

40<br />

60<br />

OpenStage<br />

OpenStage<br />

key labelling with paper strips<br />

control keys +/-<br />

3 navigation keys<br />

wall-mountable<br />

tiltable 6 lines monochrome ,backlit graphical<br />

display<br />

optical call alert.<br />

8 fixed function keys (partly equipped with red<br />

LEDs)<br />

6 programmable touch keys (illuminated)with red<br />

LEDs<br />

(function, speed dialler line keys<br />

control keys +/-,<br />

5-way navigator,<br />

acoustics Hands free talking (full duplex<br />

headset jack<br />

wall-mountable.<br />

tiltable graphical backlit colour TFT display<br />

320 x 240 pixel (QVGA),<br />

optical call alert.<br />

6 fixed function keys (partly equipped with red<br />

LEDs)<br />

8 programmable touch keys (illuminated) with<br />

blue LEDs (function, speed dialor line keys)<br />

6 mode keys (touch keys, illuminated) with blue<br />

or blue/white LEDs


967<br />

Client<br />

OpenStage<br />

DECT<br />

OpenStage<br />

Accessories<br />

Mediatrix<br />

4102<br />

Mediatrix<br />

4104<br />

Mediatrix<br />

4108<br />

Mediatrix<br />

4116<br />

touchslider for volume adjustment with<br />

blue/white LEDs<br />

touchguide for navigation.<br />

hands free talking (full duplex)<br />

polyphonic ringer tones<br />

headset jack<br />

bluetooth facility (subject to security constraints)<br />

USB master. (subject to security constraints)<br />

The Contractor shall provide a soft phone device for<br />

IP telephony users only. Providing telephony functions<br />

and access to function keys via a PC. It can be optionally<br />

displayed and placed in any position on the screen. This<br />

device offers the option of integrating corporate<br />

directories and personal call lists via LDAP<br />

The provision of SIP DECT Handsets<br />

key modules – from 18 to 90 programmable keys<br />

Wall mounting kits.<br />

GN Netcom and Plantronic Headsets<br />

2 Port SIP Terminal Adaptor<br />

4 Port SIP Terminal Adaptor<br />

8 Port SIP Terminal Adaptor<br />

16 Port SIP Terminal Adaptor<br />

Phybridge An Adaptor to provide LAN connectivity over<br />

standard Customer supplied block wiring where IP<br />

Telephony can not be supported<br />

Terminal The Contractor shall provide extended warranty


968<br />

Maintenance services.<br />

4.2.13 The Provision of UPS systems to support any required Customer On Site applications.<br />

4.2.14 On Site engineering <strong>Service</strong> (simple moves) subject to a Site survey conducted by the<br />

Contractor, the <strong><strong>Service</strong>s</strong> available are;<br />

· Move Extension Sockets, up to 30 meters;<br />

· Re-configure system, including jumpering at TJF or MDF;<br />

· Visit Site to power up and power down system (inclusive of Software back up and<br />

reload);<br />

· Provide engineer labour on hourly basis (inclusive of minor consumables);<br />

· Provide engineer on a daily basis (09:00-17:00, 45 minutes lunch);<br />

· Provide engineer labour on weekly basis (5 Days, 7.25 hours per day);<br />

· Relocation of CPU TJF and Equipment;<br />

· Relocation of CPU to new location in same building;<br />

· Relocation of CPU to a different site or building;<br />

· Additional Equipment installation <strong>Service</strong>, (after the TJF demarcation) to support<br />

the commissioning of analogue handsets, feature terminals and any additional site<br />

cabling, (subject to site survey).<br />

4.2.15 The Contractor shall provide Project Management in accordance with paragraph 7.2 to<br />

deploy the <strong><strong>Service</strong>s</strong>.<br />

Optional <strong><strong>Service</strong>s</strong> for Contactor Provided Managed Equipment <strong>Service</strong><br />

4.3 The following Equipment or Applications shall be made available as an optional <strong>Service</strong><br />

from the Contractor which can be deployed on the Contractors supplied Managed<br />

Equipment Onsite. The system based features and functionality of the Equipment and<br />

Software shall be made available.<br />

4.3.1 Xpressions Voicemail, a unified messaging platform (Voice and Email integration) delivered<br />

as hardware and software to the Customer specification the number of users required will<br />

dictate the size of Xpressions server to be implemented. The minimum number of mailboxes<br />

shall be 30 UM mailboxes. The maximum number of UM mailboxes shall be 10,000 per<br />

cluster. The provision of any LAN or Firewall Equipment shall be excluded from this option.<br />

The <strong>Service</strong> may be delivered as On Site or use a of Site Server.<br />

4.3.1.1 Number of Voicemail Licences;<br />

4.3.1.2 Number of Fax Mail Licences;<br />

4.3.1.3 Email / Interface Licences;<br />

4.3.1.4 SMS Option;


969<br />

4.3.1.5 Text to Speech Licences.<br />

4.3.2 <strong>PSN</strong> DNSP Interfaces and or Digital Line Interfaces based on Customer requirements.<br />

4.3.3 SIP Telephony Interfaces. For the connection to DNSP PSTN providers.<br />

4.3.4 Analogue Exchange Lines and Equipment Bypass Circuits for power fail conditions only.<br />

4.3.5 OpenScape Unified Communications Software, providing Unified Communication<br />

applications, voicemail, collaborative working presence and user mobility.<br />

4.3.6 OpenScape Fusion Software and associated Hardware required to support the integration<br />

of OpenScape Unified Communication Server into a third party applications such as but not<br />

limited to Microsoft OCS, Microsoft Exchange and or IBM Lotus Notes.<br />

4.3.7 OpenScape Branch Proxy, to provide an on site and IL2 Accreditable survivable media<br />

gateway. The following OpenScape Branch devices are available:<br />

4.3.7.1 OpenScape Branch 50;<br />

4.3.7.2 OpenScape Branch 250;<br />

4.3.7.3 OpenScape Branch 1000;<br />

4.3.7.4 OpenScape Branch 6000.<br />

4.3.8 OpenScape Concierge Operator Consoles Concierge Software and associated Hardware<br />

required. The following optional <strong><strong>Service</strong>s</strong> are available.<br />

4.3.8.1 OpenScape Concierge Business Group (per customer);<br />

4.3.8.2 OpenScape Concierge User Licences.<br />

4.3.9 OpenScape Call Management Software and associated Hardware. The following optional<br />

<strong><strong>Service</strong>s</strong> shall be available from the Contractor;<br />

4.3.9.1 OpenScape Call Management Interface SMDR per Business Group;<br />

4.3.9.2 Tiger Call Management Software (call logging system) based on a per user charge;<br />

4.3.9.3 Optional Managed Call Logging <strong>Service</strong> more fully defined in paragraph 5.17.<br />

4.3.10 The provision of Session Border Controllers (for DNSP connectivity). The provision,<br />

maintenance and support of appropriately sized Session Border Controllers for network<br />

security. The default number of concurrent SIP trunking Licences shall not exceed fifteen<br />

percent of the total number of active Licences connected to the Managed Equipment<br />

<strong>Service</strong>.<br />

4.3.11 The Contractor shall provide optional alternative ISDN Media Gateways supporting E1<br />

Connections for Client DNSP PSTN providers who can not currently offer accredited SIP PSTN<br />

Interfaces.<br />

4.3.12 A PBX Operator Screen Based Consoles and internal Directory Schema.<br />

4.3.13 Provision of ISDN Adaptors to support Bent and or Legacy ISDN 2 devices.<br />

4.3.14 Handset or OpenStage Terminals or Soft clients and adapters


970<br />

Voice End<br />

Point<br />

Analogue<br />

Berkshire<br />

400<br />

5<br />

15<br />

OpenStage<br />

OpenStage<br />

Features Supported<br />

12 permanent memories<br />

external memory programming port<br />

memory programming disable switch<br />

pause key<br />

MF dialling<br />

latching mute<br />

last number redial<br />

switchable TBR/ELR<br />

switchable RI/MW<br />

ringing Indicator<br />

headset port<br />

adjustable headset volume<br />

adjustable ringer pitch<br />

adjustable ringer volume<br />

BT & RJ45 linecords<br />

hearing aid compatible<br />

desk & wall bracket (optional)<br />

RJ11 linecord (optional)<br />

available in light or dark grey<br />

8 programmable keys with red LEDs<br />

key labelling with paper strips<br />

control keys +/-<br />

wall-mountable<br />

full-featured full duplex speakerphone with display<br />

8 illuminated function keys<br />

graphical display<br />

2 lines monochrome (not tiltable)<br />

3 fixed function keys with red LEDs,<br />

8 programmable keys with red LEDs (upgradable


971<br />

40<br />

60<br />

OpenStage<br />

OpenStage<br />

with Key Module)<br />

key labelling with paper strips<br />

control keys +/-<br />

3 navigation keys<br />

wall-mountable<br />

tiltable 6 lines monochrome ,backlit graphical display<br />

optical call alert.<br />

8 fixed function keys (partly equipped with red LEDs)<br />

6 programmable touch keys (illuminated)with red<br />

LEDs<br />

(function, speed dialler line keys<br />

control keys +/-,<br />

5-way navigator,<br />

acoustics Hands free talking (full duplex<br />

headset jack<br />

wall-mountable.<br />

tiltable graphical backlit colour TFT display<br />

320 x 240 pixel (QVGA),<br />

optical call alert.<br />

6 fixed function keys (partly equipped with red LEDs)<br />

8 programmable touch keys (illuminated) with blue<br />

LEDs (function, speed dialor line keys)<br />

6 mode keys (touch keys, illuminated) with blue or<br />

blue/white LEDs<br />

touchslider for volume adjustment with blue/white<br />

LEDs<br />

touchguide for navigation.<br />

hands free talking (full duplex)<br />

polyphonic ringer tones<br />

headset jack<br />

bluetooth facility (subject to security constraints)<br />

USB master. (subject to security constraints)


972<br />

DECT The provision of SIP DECT Handsets<br />

Openstage<br />

Accessories<br />

Mediatrix<br />

4102<br />

Mediatrix<br />

4104<br />

Mediatrix<br />

4108<br />

Mediatrix<br />

4116<br />

key modules – from 18 to 90 programmable keys<br />

Wall mounting kits.<br />

GN Netcom and Plantronic Headsets<br />

2 Port SIP Terminal Adaptor<br />

4 Port SIP Terminal Adaptor<br />

8 Port SIP Terminal Adaptor<br />

16 Port SIP Terminal Adaptor<br />

Phybridge An Adaptor to provide LAN connectivity over<br />

standard Customer supplied block wiring where IP<br />

Telephony can not be supported<br />

Terminal<br />

Maintenance<br />

The Contractor shall provide extended warranty<br />

services<br />

4.3.15 HiPath Mobility for the provision of Home working and Hotdesking with audio prompts and<br />

audit records (available for HiPath DX only).<br />

4.3.16 HiPath DX or HiPath 4000 system administrator for single or multi-user site management.<br />

4.3.17 Tiger Call Management for the production of Onsite call logging reports.<br />

4.3.18 The Provision of UPS systems to support Customer On Site applications.<br />

4.3.19 The provision of dual server PBX systems or OUCS systems for increased availability, and<br />

dual network connectivity as defined by the Customer in consultation with the Contractor.<br />

4.3.20 Remote Moves and Changes <strong>Service</strong> (for non inclusive Managed <strong>Service</strong> contracts). A<br />

Remote Move and Change is defined as the creation, addition, deletion and the moving of<br />

Software extension details but not including hardware. In addition the <strong>Service</strong> Provider will<br />

manage changes to link numbering plans, site codes, class of <strong>Service</strong> and trunk access levels.<br />

For the avoidance of doubt each number moved allocated deleted or created is the<br />

equivalent of one change. Remote Moves and Changes include: Moves & changes; User<br />

classifications; Abbreviated dialling; Clock changes; Translation over private network; Route<br />

optimisation tables; Routing tables; Trunk access tables; Route restriction tables; DDI<br />

changes; Network numbering.<br />

4.3.21 On Site engineering <strong>Service</strong> (simple moves) subject to a Site survey conducted by the<br />

Contractor, the <strong><strong>Service</strong>s</strong> available are;


973<br />

· Move Extension Sockets, up to 30 meters;<br />

· Re-configure system, including jumpering at TJF or MDF;<br />

· Visit Site to power up and power down system (inclusive of Software back up and<br />

reload);<br />

· Provide engineer labour on hourly basis (inclusive of minor consumables);<br />

· Provide engineer on a daily basis (09:00-17:00, 45 minutes lunch);<br />

· Provide engineer labour on weekly basis (5 Days, 7.25 hours per day);<br />

· Relocation of CPU TJF and Equipment;<br />

· Relocation of CPU to new location in same building;<br />

· Relocation of CPU to a different site or building;<br />

· Additional Equipment installation <strong>Service</strong>, (after the TJF demarcation) to support<br />

the commissioning of analogue handsets, feature terminals and any additional site<br />

cabling, (subject to site survey).<br />

4.3.22 The Contractor shall provide Project Management in accordance with 7.2 to deploy the<br />

<strong><strong>Service</strong>s</strong>.<br />

5. Value Added <strong><strong>Service</strong>s</strong><br />

5.1.1 The Contractor shall provide Project Management of the deployment of the <strong><strong>Service</strong>s</strong><br />

detailed in this paragraph 5 in accordance with paragraph 7.2<br />

5.2 Voice Call (Bundle) packages<br />

5.2.1 The Contractor shall provide an optional Call Bundle packages based on a fair user policy to<br />

be defined with the Customer (charges against a live extension or virtual user). Voice Call<br />

bundles will be managed by the Contractor based on the aggregation of anticipated volume<br />

spend by the Customer. Calculation of volume can be a combination of spend by many<br />

customers all agreeing to share the fair user policy.<br />

5.2.2 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for the measurement of the Call Bundle to meet the specific Customer requirements<br />

and this will be specified in Appendix 4, the Call-Off Form.<br />

5.2.3 The Contractor shall review with the Customer /s the applicability of the voice call bundle<br />

to ensure value for money is maintained for the user. If it is identified by the Customer or<br />

the Contractor that savings or improved <strong>Service</strong> can be obtained, the Contractor shall after<br />

the expiry of any contract commitment replace the current scheme and suppliers with<br />

identified alternative suppliers.<br />

5.2.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.


5.2.5 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> by<br />

way of the call logging reports detailed in paragraph 5.17 in accordance with paragraph 8;<br />

Or as agreed with the Customer.<br />

5.2.6 The Contractor shall if requested by the Customer implement any call bundle package<br />

secured by the Customer direct and shall apply a fixed management charge of 7% against all<br />

relevant call charges.<br />

5.2.7 The minimum term for a call bundle package is 12 months. Thereafter the Customer may<br />

terminate the call bundle in favour of a DNSP provided <strong>Service</strong>.<br />

5.2.8 Upon termination of call bundles the Contractor will assist the customer in any porting or<br />

relevant information required by the Customers replacement <strong>Service</strong> provider, provided<br />

that the information requested is to support the transition of the call bundle <strong>Service</strong> for that<br />

Customer only.<br />

5.3 Voice Minutes<br />

5.3.1 The Contractor shall provide an optional Voice Minute charging tariff against a minimum<br />

call spend agreed between the Contractor and the Customer. Voice Call Minutes will be<br />

managed by the Contractor based on the aggregation of anticipated volume spend by the<br />

Customer, such volume can be a combination of spend by many customers.<br />

5.3.2 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for the measurement of the Call Bundle to meet the specific Customer requirements<br />

and this will be specified in Appendix 4 the Call-Off Form.<br />

5.3.3 The Contractor shall review with the Customer /s the applicability of the Voice Minute<br />

charges to ensure value for money is maintained for the user. If it is identified by the<br />

Customer or the Contractor that savings or improved <strong>Service</strong> can be obtained the<br />

Contractor shall after the expiry of any contract commitment replace the current scheme<br />

and suppliers with identified alternative suppliers.<br />

5.3.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.3.5 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> by<br />

way of the call logging reports detailed in paragraph 5.17 in accordance with paragraph 8 or<br />

as agreed with the Customer.<br />

5.3.6 The Contractor shall if requested by the Customer implement any Voice Minutes contracts<br />

secured by the Customer direct and shall apply a fixed maximum seven per cent (7%) third<br />

party pass through fee against all relevant call charges.<br />

5.3.7 The minimum term for Voice Minutes is 12 months thereafter the Customer may terminate<br />

the call bundle in favour of a DNSP provided <strong>Service</strong>.<br />

5.3.8 Upon termination of call bundles the Contractor will assist the customer in any porting or<br />

relevant information required by the Customers replacement <strong>Service</strong> provider, provided<br />

that the information requested is to support the transition of the call bundle <strong>Service</strong> for that<br />

Customer only.<br />

974


5.4 DDI<br />

5.4.1 Optional DDI <strong><strong>Service</strong>s</strong> will be provided as part of its <strong>Service</strong> by the Contractors DNSP or<br />

PSTN provider.<br />

5.4.2 The charges the Contractor incurs to provide additional DDI number ranges from its DNSP<br />

or PSTN provider shall be detailed to the Customer and the Contractor shall apply a fixed<br />

management charge of 7% against all relevant call charges.<br />

5.4.3 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for management of DDI’s numbers to meet the specific Customer requirements and<br />

this will be specified in Appendix 4, the Call-Off Form.<br />

5.4.4 The Contractor shall review with the Customer /s the applicability of DNSP or PSTN DDI<br />

Number charges to ensure value for money is maintained for the user. If it is identified by<br />

the Customer or the Contractor that savings or improved <strong>Service</strong> can be obtained the<br />

Contractor shall after the expiry of any contract commitment replace the current scheme<br />

and suppliers with identified alternative suppliers.<br />

5.4.5 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.4.6 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> by<br />

way of the call logging reports detailed in paragraph 5.17 and DDI spare number capacity in<br />

accordance with paragraph 8, or as agreed with the Customer.<br />

5.4.7 The Customer may choose to use its own DNSP to provide DDI whereas the Contractor<br />

provided the DNSP is accredited to provide PSTN <strong><strong>Service</strong>s</strong> shall connect to the DNSP DDI<br />

number range.<br />

5.4.8 The minimum term for the DDI <strong>Service</strong> is 12 months. Thereafter the Customer may<br />

terminate the <strong>Service</strong> favour of a Customer provided DNSP <strong>Service</strong>.<br />

5.4.9 Upon termination any DDI <strong>Service</strong> provided by the Contractor, the Contractor will assist the<br />

Customer in any porting or relevant information required by the Customers replacement<br />

<strong>Service</strong> provider, provided that the information requested is to support the transition of the<br />

DDI <strong>Service</strong> for that Customer only.<br />

5.5 Premium Rate Number and Non Geographic Numbers<br />

5.5.1 The Contractor shall provide the Customer an optional premium rate number <strong>Service</strong>. The<br />

following Non Geographic Number <strong><strong>Service</strong>s</strong> (NGNs) shall be made available;<br />

975<br />

5.5.1.1 0845 / 0844 numbers which will provide a local call rate number facility;<br />

5.5.1.2 0870 / 0871 numbers which will provide a national call rate number facility;<br />

5.5.1.3 09xx numbers which will provide a premium rate call rate number facility;<br />

5.5.1.4 0300 numbers which provide a local low call rate number facility.<br />

5.5.2 Premium rate and non geographic number <strong><strong>Service</strong>s</strong> will be provided by the Contractors<br />

DNSP or PSTN provider.


5.5.3 Any charges the Contractor incurs to provide Premium Rate Number and Non Geographic<br />

Numbers from its DNSP or PSTN provider shall be detailed to the Customer and the<br />

Contractor shall apply a fixed management charge of 7% against all relevant charges.<br />

5.5.4 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for management of Premium Rate Number and Non Geographic Numbers to meet<br />

the specific Customer requirements and this will be specified in Appendix 4, the Call-Off<br />

Form.<br />

5.5.5 The Contractor shall review with the Customer /s the applicability of DNSP or PSTN charges<br />

to ensure value for money is maintained for the user. If it is identified by the Customer or<br />

the Contractor that savings or improved <strong>Service</strong> can be obtained, the Contractor shall after<br />

the expiry of any contract commitment replace the current scheme and suppliers with<br />

identified alternative suppliers.<br />

5.5.6 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.5.7 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> by<br />

way of the call logging reports detailed in paragraph 5.17.<br />

5.5.8 The Customer may choose to use its own DNSP or PSTN provider to provide Premium Rate<br />

Number and Non Geographic Numbers provided that the Customers service provider is<br />

accredited to provide PSTN <strong><strong>Service</strong>s</strong>.<br />

5.6 118 Enquiries<br />

5.6.1 The Contractor will provide a national and international directory enquiry <strong>Service</strong> based on<br />

its DNSP and PSTN provider 118-150 <strong>Service</strong>. This <strong>Service</strong> provides up to two searches per<br />

call<br />

5.6.2 Any charges to provide 118 Enquiries from the Contractors DNSP or PSTN provider shall be<br />

detailed to the Customer and the Contractor shall apply a fixed management charge of 7%<br />

against all relevant call charges.<br />

5.6.3 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for management of Premium Rate Number and Non Geographic Numbers to meet<br />

the specific Customer requirements and this will be specified in Appendix 4 in the Call-Off<br />

Form.<br />

5.6.4 The Contractor shall review with the Customer /s the applicability of DNSP or PSTN charges<br />

to ensure value for money is maintained for the user. If it is identified by the Customer or<br />

the Contractor that savings or improved <strong>Service</strong> can be obtained the Contractor shall after<br />

the expiry of any contract commitment replace the current scheme and suppliers with<br />

identified alternative suppliers.<br />

5.6.5 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

976


5.6.6 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> by<br />

way of the call logging reports detailed in paragraph 5.17.<br />

5.7 Call Preference <strong>Service</strong> (TPS)<br />

5.7.1 The Contractor will provide the Customer access to the Call Preference <strong>Service</strong> Scheme<br />

(TPS). TPS is a free opt out service enabling the Customer to record its preferences on the<br />

official register and not receive unsolicited sales or marketing calls.<br />

5.7.2 Requests for TPS can be made to the Contractor <strong>Service</strong> Management Desk or upon request<br />

direct to TPS.<br />

5.8 Audio Conferencing<br />

5.8.1 The Contractor shall provide four audio optional conferencing <strong><strong>Service</strong>s</strong>. The availability of<br />

the <strong>Service</strong> or <strong>Service</strong> type will be dependant on the Onsite Equipment or Hosted Managed<br />

<strong>Service</strong> requested, the <strong>Service</strong> types are;<br />

977<br />

5.8.1.1 A user controlled using the inherent facilities of the Voice <strong>Service</strong> Platform.<br />

5.8.1.2 A user controlled audio conference using the inherent facilities of the Contractor<br />

Unified Communication Collaborative platform; Up to 50 parties with optional<br />

voice recording can be involved in a conference. This facility is provided to all<br />

users who have deployed the OpenScape UC application.<br />

5.8.1.3 An external conference bridge provided by the Contractors DNSP or PSTN<br />

Provider for example the Contractors BT Meet Me <strong>Service</strong>.<br />

5.8.1.4 An external conference bridge provided by the Contractors DNSP or PSTN<br />

provider with operator assisted <strong><strong>Service</strong>s</strong><br />

5.8.2 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for the measurement of the Contractors Audio Conference <strong>Service</strong> to meet the<br />

specific Customer requirements and this will be specified in Appendix 4, the Call-Off Form.<br />

5.8.3 The Contractor shall review with the Customer the applicability of the external conference<br />

bridge <strong>Service</strong>. If it is identified by the Customer or the Contractor that savings or improved<br />

<strong>Service</strong> can be obtained the Contractor shall after the expiry of any contract commitment<br />

replace the current scheme and suppliers with identified alternative suppliers.<br />

5.8.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.8.5 The Contactor shall produce regular performance reports on all aspects of the external<br />

audio bridge <strong>Service</strong>.<br />

5.8.6 The Contractor shall if requested by the Customer implement any external Audio<br />

Conferencing contracts secured by the Customer direct and shall apply a fixed management<br />

charge of 7% against all relevant call charges.


5.8.7 The Contractors BT Meet Me <strong>Service</strong> - provides the Customer with a reservation-less, on<br />

demand audio conferencing <strong>Service</strong> accommodating up to 300 concurrent users, with<br />

optional voice recording. The <strong>Service</strong> is available 24 hours, 365 days a year. No end user<br />

Equipment is provided by the Contractor. The Contractor will provide every registered<br />

Customer with a UK toll, freephone and series of international free phone numbers to<br />

access the conferencing <strong>Service</strong>. .<br />

5.8.8 The Contractors BT meet me plus provides the Customer with a fully managed, operator<br />

assisted audio conferencing <strong>Service</strong> accommodating up to 2000 concurrent users. The<br />

<strong>Service</strong> is available 24 hours, 365 days a year. All Event meetings must be booked with the<br />

Contractor with a minimum of one (1) Working Day’s notice. The Contractor will provide an<br />

operator to monitor and manage each meeting. The operator can greet every participant as<br />

they enter the call, provide an introduction to the meeting and manage any question &<br />

answer session.<br />

5.9 Desktop Video Conferencing and Collaboration Tools<br />

5.9.1 The Contractor shall provide an optional Desktop Video Conferencing and web<br />

conferencing <strong>Service</strong>, based on the Contractors Accredited Hosted Unified Communications<br />

Platform (OUCS).<br />

5.9.2 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraph 9.<br />

5.9.3 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements and<br />

specified in Appendix 4, the Call-Off Form.<br />

5.9.4 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

5.9.5 Bespoke Customer requirements may be amended in accordance with Appendix 4, the Call<br />

off Form.<br />

5.9.6 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.9.7 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> in<br />

accordance with paragraph 8.<br />

5.9.8 The Contractor shall provide the following features;<br />

978<br />

5.9.8.1 Desktop and Application Sharing – Presenters can broadcast or share visuals,<br />

applications, web pages, documents, software or any part of a desktop to<br />

conference participants. The use of a virtual whiteboard allowing presenters to<br />

draw, add text and highlight information with annotation tools. Integration with<br />

MS Exchange or IBM’s Sametime allows for single-click scheduling directly with<br />

predefined conferencing properties.<br />

5.9.8.2 Desk Top Video – Integrated with the Customer PC (the Customer will be<br />

responsible for the provision of suitable hardware). Linked to the Contractors<br />

Hosted OUCS application the user may switch from telephony to Video calling and<br />

nominate the Video as a telephony / video work point.


5.9.9 The Contractor shall be responsible for the provision of standard interfaces to link the<br />

Customer existing infrastructure to the Hosted Unified Communications Platform. The<br />

customer will be responsible for all network connectivity via its DNSP.<br />

5.9.10 The Contractor will be responsible for the provision of the <strong>Service</strong> from its Hosted<br />

Datacenters this will include Integrated backup and disaster recovery <strong><strong>Service</strong>s</strong><br />

5.9.11 The Contractor shall agree bespoke services with the Customer for any Single sign-on<br />

requirements and Active Directory integration requirements.<br />

5.10 Web Conferencing & Messaging <strong><strong>Service</strong>s</strong><br />

5.10.1 The Contractor shall provide an optional instant messaging (IM) and web conferencing<br />

<strong>Service</strong>, based on the Contractors Hosted Unified Communications Platform (OUCS).<br />

5.10.2 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraph 9.<br />

979<br />

5.10.2.1 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements<br />

and specified in Appendix 4 in the Call-Off Form.<br />

5.10.3 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

5.10.3.1 Bespoke Customer requirements may be amended in accordance with Appendix<br />

4, the Call Off Form.<br />

5.10.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.10.5 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> in<br />

accordance with paragraph 8.<br />

5.10.6 The Contractor shall provide the following features;<br />

5.10.6.1 Instant Messaging – Encrypted instant messaging between individual co-workers<br />

or groups using Outlook or Sametime. This includes rich presence capabilities with<br />

visual indicators of a colleagues’ availability based on their Exchange, telephony<br />

platform calendar and activities. Conversation histories are archived and<br />

searchable from the OUCS server.<br />

5.10.6.2 Web Conferencing – Integrated with the Customer PC (the Customer will be<br />

responsible for the provision of suitable hardware). Linked to the Contractors<br />

Hosted OUCS application the user may activate Web Conferencing in any<br />

application and subject to Accreditation enable a Web collaborative session.<br />

5.10.7 The Contractor shall be responsible for the provision of standard interfaces to link the<br />

Customer existing infrastructure to the Hosted Unified Communications Platform. The<br />

customer will be responsible for all network connectivity via its DNSP.<br />

5.10.8 The Contractor will be responsible for the provision of the <strong>Service</strong> from its Hosted<br />

Datacenters this will include Integrated backup and disaster recovery <strong><strong>Service</strong>s</strong>.


5.10.9 The Contractor shall agree with the Customer any Single sign-on requirements and Active<br />

Directory integration.<br />

5.11 Real Time Information <strong><strong>Service</strong>s</strong>;<br />

5.11.1 The Contractor shall upon request develop with the Customer applications to support Real<br />

Time Information <strong><strong>Service</strong>s</strong> or SIRI using an XML protocols.<br />

5.11.2 The Contractor defines SIRI as a Transmodel abstract model for (typically) public transport<br />

or mobile user information.<br />

5.11.3 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements and<br />

specified in Appendix 4, the Call-Off Form.<br />

5.11.4 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

5.11.5 The development by the Contractor of SIRI applications shall be a Bespoke Customer<br />

requirement which shall be detailed and amended in accordance with Appendix 4, the Call<br />

off Form.<br />

5.11.6 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.12 Desktop Messaging<br />

5.12.1 The Contractor shall provide an optional Desk Top instant messaging <strong>Service</strong>, based on the<br />

Contractors Hosted Unified Communications Platform (OUCS).<br />

5.12.2 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraphs 9.<br />

980<br />

5.12.2.1 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements<br />

and specified in Appendix 4, the Call-Off Form.<br />

5.12.3 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

5.12.3.1 Bespoke Customer requirements may be amended in accordance with Appendix 4<br />

Call Off Form.<br />

5.12.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.12.5 The Contractor shall provide the following features;<br />

5.12.5.1 Instant Messaging – Encrypted instant messaging between individual co-workers<br />

or groups using Outlook or IBM Sametime. This includes rich presence capabilities<br />

with visual indicators of a colleagues’ availability based on their Exchange,<br />

telephony platform calendar and activities. Conversation histories are archived<br />

and searchable from the OUCS server.


5.12.6 The Contractor shall be responsible for the provision of standard interfaces to link the<br />

Customer existing infrastructure to the Hosted Unified Communications Platform. The<br />

customer will be responsible for all network connectivity via its DNSP and will allow the<br />

Contractor to load a web based application and for any implications (as advised by the<br />

Contractor) on its infrastructure.<br />

5.12.7 The Contractor will be responsible for the provision of the <strong>Service</strong> from its Hosted<br />

Datacenters this will include Integrated backup and disaster recovery <strong><strong>Service</strong>s</strong>.<br />

5.12.8 The Contractor shall agree with the Customer any Single sign-on requirements and Active<br />

Directory integration.<br />

5.13 Messaging via email<br />

5.13.1 The Contractor shall provide email (messaging) <strong>Service</strong>.<br />

5.13.2 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraph 9.<br />

981<br />

5.13.2.1 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements<br />

as specified in Appendix 4 in the Call-Off Form.<br />

5.13.3 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

5.13.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.13.5 The Contractor shall provide the following features;<br />

5.13.5.1 High-availability Email built on Microsoft Exchange Server 2010;<br />

5.13.5.2 Advanced Collaboration integration with OpenScape UC providing Voice/VoIP,<br />

audio/Video/Web Conferencing, Group Chat, Instant Messaging and<br />

Presence, Public Instant Messaging Connectivity and Mobility;<br />

5.13.5.3 Email Security with Gateway, filtering and anti-virus security from MessageLabs<br />

and Microsoft ForeFront;<br />

5.13.5.4 Mobile and Remote access with Outlook Web Access 2010, BlackBerry Enterprise<br />

Server and Microsoft ActiveSync for Windows Mobile;<br />

5.13.5.5 Email Archival with personal archives and data retention policies. SOXcompliance<br />

and litigation-ready <strong><strong>Service</strong>s</strong> from Global Relay;<br />

5.13.5.6 Administration and self-<strong>Service</strong> with Active Directory integration and/or an<br />

optional Control Panel and Automation system.<br />

5.13.6 The Contractor shall be responsible for the provision of interfaces to link the Customer<br />

existing infrastructure to the Hosted Exchange Platform. The customer will be responsible<br />

for all network connectivity via its DNSP will allow the Contractor to load a web based<br />

application and for any implications (as advised by the Contractor) on its infrastructure.<br />

5.13.7 The Contractor will be responsible for the provision of the <strong>Service</strong> from its Hosted<br />

Datacenters this will include Integrated backup and disaster recovery <strong><strong>Service</strong>s</strong>.


5.13.8 The Contractor shall agree with the Customer any Single sign-on requirements and Active<br />

Directory integration.<br />

5.13.9 In addition the Contractor shall provide the following Hosted Email <strong><strong>Service</strong>s</strong>;<br />

5.14 SMS<br />

982<br />

· Email store-and-forward;<br />

· Web content caching and filtering;<br />

· Domain name <strong><strong>Service</strong>s</strong>;<br />

· Distributed Denial of <strong>Service</strong> (DDoS) protection;<br />

· In the event of a Customer’s email server becoming unavailable, the Contractor<br />

<strong>Service</strong> shall store received emails on our SMTP servers for up to seven days. Upon<br />

the restoration of the Customer’s email <strong>Service</strong> we shall deliver them as normal;<br />

· A web content caching and filtering capability that shall enable Customers to<br />

control and filter the material that may be accessed from within their business<br />

domain;<br />

· Ability to filter web-access based upon URL requests;<br />

· Ability to filter web-access based upon detailed site analysis, including images and<br />

video content;<br />

· Allowing the filtering of inappropriate web content by using a ‘black-list’ registry of<br />

URLs;<br />

· Web access policies shall be provided and shall be configurable by the Customer<br />

through an on-line portal;<br />

· Manageable through a web-portal, allowing the insertion of exceptions and<br />

inclusions;<br />

· Report generation of accessed URLs.<br />

The Contractor shall provide a <strong>Service</strong> option that enables domain name <strong><strong>Service</strong>s</strong> (DNS)<br />

for the Customer. Our <strong>Service</strong> includes both DNS registration and DNS hosting. The <strong><strong>Service</strong>s</strong><br />

options include:<br />

· Automatic renewal;<br />

· Hosted on our fully managed DNS servers;<br />

· Primary and secondary <strong><strong>Service</strong>s</strong>;<br />

· Zone file maintenance;<br />

· Weighted MX pointers (for SMTP delivery);<br />

· Host internet names (URL);<br />

· Reverse look-up;<br />

· Transfer in (from other hosting <strong><strong>Service</strong>s</strong>).


5.14.1 The Contractor will provide an optional SMS facility to integrate with the Customer<br />

infrastructure or Contractor supplied applications.<br />

5.14.2 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraph 9.<br />

983<br />

5.14.2.1 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements<br />

as specified in Appendix 4, the Call-Off Form.<br />

5.14.3 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

5.14.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.14.5 The Contractor shall provide the following features;<br />

· Send and schedule thousands of messages at once;<br />

· 2-way messaging including auto-replies and API functionality for integration with<br />

the Customers IT systems;<br />

· Advanced list management features including upload, opt-in/opt-out;<br />

· Database integration – e.g. personalise with name, ticket number, etc;<br />

· Detailed Delivery receipt information.<br />

5.14.6 The Contractor shall be responsible for the provision of standard interfaces to link the<br />

Customer existing infrastructure. The customer will be responsible for all network<br />

connectivity via its DNSP.<br />

5.14.7 The Contractor will be responsible for the provision of the <strong>Service</strong> from its Hosted<br />

Datacenters this will include Integrated backup and disaster recovery <strong><strong>Service</strong>s</strong>.<br />

5.14.8 The Contractor shall agree with the Customer any Single sign-on requirements and Active<br />

Directory integration.<br />

5.15 Pager, Mobile & Fixed Line Telephone <strong><strong>Service</strong>s</strong><br />

5.15.1 The Contractor shall provide optional Pager, Mobile and Fixed Line Telephone <strong><strong>Service</strong>s</strong>,<br />

based on agreed specification with the Customer.<br />

5.15.2 Upon request the Contractor shall manage the Customers existing Pager, Mobile and Fixed<br />

Line <strong><strong>Service</strong>s</strong> on its behalf including the provision of new <strong><strong>Service</strong>s</strong> using the Customers<br />

existing supply arrangements; or alternatively the Contractor shall provide alternative<br />

supply arrangements via its suppliers.<br />

5.15.3 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for management of Pager, Mobile and Fixed Line Telephone <strong><strong>Service</strong>s</strong> to meet the<br />

specific Customer requirements, this will be specified in Appendix 4, the Call-Off Form.<br />

5.15.4 The Contractor shall review on a regular basis with the Customer Pager, Mobile and Fixed<br />

Line Telephone <strong><strong>Service</strong>s</strong> charges. If it is identified by the Customer or the Contractor that<br />

savings or improved <strong>Service</strong> can be obtained the Contractor shall after the expiry of any


984<br />

contract commitment replace the current scheme and suppliers with identified alternative<br />

suppliers.<br />

5.15.5 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.15.6 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong>.<br />

5.16 Telephone Operator <strong>Service</strong><br />

5.16.1 The Contractors shall provide an optional Telephone Operator <strong>Service</strong>. This <strong>Service</strong> shall be<br />

delivered through a resilient accredited hosted operator <strong>Service</strong> whereby the Contractors<br />

operators or auto attendant systems will answer calls that are presented to Contractor<br />

Telephone Operator <strong>Service</strong> on behalf of the Customer.<br />

5.16.2 The Contractor can provide 24 hour Customer Operator <strong>Service</strong>, a night time Operator<br />

Facility or Operator overflow <strong>Service</strong>. The Contractor and Customer shall agree the scope of<br />

the Operator <strong>Service</strong> required and the hours of operation. The Operator <strong>Service</strong> may<br />

comprise of a manned station or the use of Auto Attendant voice recondition technology<br />

(with manned desk back up), with the agreement of the Customer.<br />

5.16.3 The Contractor shall work with the Customer to define the call handling policy document<br />

which will define the various policies that shall be adopted by the Telephone Operator<br />

<strong>Service</strong> when answering and the onward connecting of calls on behalf of the Customer.<br />

5.16.4 The Contractors Operator <strong>Service</strong> assumes the average call duration of six seconds and<br />

therefore is not suitable to act as an enquiry <strong>Service</strong> on behalf of the Customer.<br />

5.16.5 The Contractors Telephone Operator <strong>Service</strong> shall be available 24/7/365 days of the year<br />

and will be managed by a <strong>Service</strong> Delivery Manager. Processes and procedures with the<br />

Customer to deal with a range of Customer requirements for example, call handling, call<br />

processing, bomb threats and nuisance calls.<br />

5.16.6 The Contractor shall maintain a fully operational Disaster Recovery plan (DR). The DR shall<br />

be fully tested twice a year and a walk through exercise shall be performed monthly so as to<br />

ensure the duty managers are fully conversed with the DR procedure; the Contractor shall<br />

share the results with its Customers of any DR tests and emergency procedures.<br />

5.16.7 The Contractor will require access to the Customer extension data which will take the form<br />

of the current internal directory which will be used by the Operator <strong>Service</strong> to route calls to<br />

the correct destination. The Customer is responsible for the provision of updates to the<br />

Directory information to the Contractor and the process of updates and methods shall be<br />

agreed between the Contractor and the Customer.<br />

5.16.8 The Contractor shall provide directory software to allow the Customer to provide automatic<br />

updates to the directory data. The directory data will be shared with the Customer if a<br />

shared Operator <strong>Service</strong> is in operation (where the Customer is using Operators to<br />

complement or to work with the Contractors <strong>Service</strong>.


5.16.9 The Contractor will create a bespoke <strong>Service</strong> level Agreement and agreed measurement<br />

criteria for the measurement of the Operator <strong>Service</strong> to meet the specific Customer<br />

requirements and this will be specified in Appendix 4, the Call-Off Form.<br />

5.17 Call Logging<br />

5.17.1 The Contractor provides access to the following set of reports, via its Customer portal. The<br />

Contractor shall provide access to three months sorted data. For Data in excess of 3 Months<br />

and up to 12 months the data will be retrieved by the Contractor and made available for the<br />

Customer upon request. Data that is over 12 months and up to five years will be made<br />

available at additional charges and the reports will comprise of;<br />

985<br />

· Summary and cost by most used extension;<br />

· Calls listed as recorded;<br />

· Calls listed by extension;<br />

· Summary by time and operator;<br />

· Summary by extension and response;<br />

· Extensions cost and calls reports;<br />

· Summary by extension and rate;<br />

· Summary by time and line;<br />

· Mobility transactions;<br />

· Mobility per site per extension;<br />

· Summary by department and area.<br />

5.17.2 The Customer can request additional reports from the Contractor, which will attract<br />

additional charges identified by the Contractor at the time of request.<br />

5.18 Directory<br />

5.18.1 The Contractor shall provide a Directory <strong>Service</strong>.<br />

5.18.2 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraph 9.<br />

5.18.2.1 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements<br />

as specified in Appendix 4, the Call-Off Form.<br />

5.18.3 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

5.18.4 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

5.18.5 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> in<br />

accordance with paragraph 8.


5.18.6 The Contractor shall ensure that high availability of the <strong>Service</strong> shall be provided through<br />

server and application level resilience within each component located within Contractors<br />

Datacenters.<br />

5.18.7 The core component of the Directory Solution shall be the DirX Directory V8.1 high-end<br />

directory server. This directory shall provide the following features:<br />

986<br />

· Standards-compliant, high-performance, highly available directory server with full<br />

LDAP v3 and X.500 functionality and compliance;<br />

· uses a specialised database kernel, designed and optimised for directory modelling<br />

and directory access and is scalable up to many millions of entries;<br />

· support of multi-tenancy. The details for each Customer shall be stored in separate<br />

partitions within the directory, with separate administrators and secured using<br />

access control lists; and<br />

· a DirX Directory can optionally be deployed on a windows based server platform<br />

or can also be virtualised using VMWare ESX/ESXi 4.<br />

5.18.8 The Contractor shall create a white pages Directory <strong>Service</strong> per Customer shall include the<br />

creation, publishing and maintenance of the contact details of the End-Users. The Directory<br />

<strong>Service</strong>’s standard attributes shall be:<br />

· name information;<br />

· primary and secondary contact numbers / addresses;<br />

· role information;<br />

· contact email details;<br />

· office address;<br />

· department / organisational information;<br />

· links to web pages;<br />

· graphics including photographs;<br />

· notes/ text section.<br />

5.19 Identity and Access Management <strong>Service</strong> (IDAMs)<br />

5.19.1 The Contractor shall provide both Security Consultants and Technical Security Design<br />

and Implementation specialists to deliver tScheme or equivalent accredited operational<br />

Public Key Infrastructure (PKI) components, including Certificate Authorities and associated<br />

CP and CPS documentation, to achieve the required level of assurance for delivery of <strong>PSN</strong><br />

<strong><strong>Service</strong>s</strong>.<br />

5.19.2 Siemens has submitted two Codes of Practice (CoP) applications to the <strong>PSN</strong> Authority<br />

(<strong>PSN</strong>A) to become a supplier of <strong>PSN</strong> services as an accredited <strong>PSN</strong> <strong>Service</strong> Provider<br />

(<strong>PSN</strong>SP). Our proposal is for a managed service via our resilient Siemens Secure Accredited<br />

Managed Network (SSAMN), and for IP Telephony (IPT) solutions via our resilient accredited<br />

IPT platforms. <strong>PSN</strong> services will include traditional voice, next generation voice, Unified


987<br />

Communications, voicemail, and conferencing, amongst others. All services will be available<br />

at Business Impact Levels 2 and 3.<br />

Siemens has already created a tScheme-approved national PKI environment, and<br />

associated business processes, as part of the NPIA Identity and Access Management Central<br />

<strong><strong>Service</strong>s</strong> solution, which currently delivers PKI services to secure national police applications<br />

at IL4. This solution includes:<br />

· A sub-ordinate certificate authority for issuing high assurance Authentication,<br />

Confidentiality and Device certificates;<br />

· A subordinate certificate authority for issuing high assurance Digital signature<br />

certificates (for the purposes of non-repudiation);<br />

· A low assurance CA for device authentication certificates including VPN<br />

certificates;<br />

· A Registration Authority (RA) for the purposes of Certificate Management;<br />

· A Validation Authority (VA) to pre-compute appropriate certificate status<br />

information; and<br />

· A Key Generation facility to generate key pairs in appropriate Hardware Security<br />

Modules (HSM).<br />

In addition the solution contains a promulgation facility for all certificates and Certificate<br />

Revocation Lists (CRLs) stored in the CA environment, as well as an Online Certificate Status<br />

Protocol (OCSP) Responder able to provide certificate status information to agreed relying<br />

parties.<br />

6. Data <strong><strong>Service</strong>s</strong><br />

6.1 The Contractor shall provide Project Management for the deployment of <strong><strong>Service</strong>s</strong> detailed<br />

in this paragraph 6 in accordance with paragraph 7.2.<br />

6.2 The Contractor shall provide the following additional Data <strong><strong>Service</strong>s</strong>, Managed Firewall<br />

Network access control devices (NAC) Anti-virus and spyware detection Anti-spam Intrusion<br />

detection and prevention Email scanning and filtering Internet <strong><strong>Service</strong>s</strong> Managed internet<br />

access Co-location and hosting Online storage E-mail and website <strong><strong>Service</strong>s</strong>.<br />

6.2.1 The Contractor shall meet the <strong>Service</strong> levels detailed in paragraph 9.<br />

6.2.1.1 Bespoke <strong>Service</strong> Levels may be amended to meet specific Customer requirements<br />

as specified in Appendix 4, the Call-Off Form.<br />

6.2.2 The Contractor shall provide an ITIL based <strong>Service</strong> desk and <strong>Service</strong> request management in<br />

accordance with paragraph 8.<br />

6.2.3 The Contractor shall appoint a <strong>Service</strong> Delivery Manager (SDM) to oversee the performance<br />

of the <strong>Service</strong> and to provide an escalation point for the Customer in accordance with<br />

paragraph 8.<br />

6.2.4 The Contactor shall produce regular performance reports on all aspects of the <strong>Service</strong> in<br />

accordance with paragraph 8.


6.3 The Contractor shall provide the following Data <strong><strong>Service</strong>s</strong><br />

6.3.1 The Contractors Managed Firewall <strong>Service</strong> shall provide secure perimeter protection at a<br />

network boundary and enable the stateful inspection of traffic at the boundary. This <strong>Service</strong><br />

shall be available as a Site Based <strong>Service</strong> supported as a fully managed or maintenance<br />

<strong>Service</strong> options. Additional <strong>Service</strong> options shall include:<br />

988<br />

· Security event monitoring;<br />

· Network health monitoring;<br />

· Security policy consultancy and backup;<br />

· Security incident evaluation and response;<br />

· Software and patch upgrades;<br />

· Hardware maintenance on Equipment deployed;<br />

· Change management;<br />

· Network access control (NAC);<br />

· A network access control (NAC) <strong>Service</strong> with the function to control access to the<br />

internal systems and network;<br />

Security functions carried out on the network perimeter, available options include;<br />

· Authentication, authorisation, and accounting;<br />

· Support both wired and wireless access;<br />

· Posture assessment. Endpoints shall be assessed and compared against predefined<br />

policies before network access is permitted;<br />

· Remediation. Non compliant endpoints shall have network access restricted to a<br />

quarantine area with a server that provides up to date software for installation;<br />

· Anti-virus and spyware detection.<br />

6.3.2 The Contractor shall provide an anti-virus <strong>Service</strong> which offers a policy-based management<br />

of inbound and outbound traffic at a nominated network boundary. The <strong>Service</strong> shall be<br />

provided as a Hosted Solution or as a Customer premise solution for protection against<br />

known;<br />

· Viruses;<br />

· Worms;<br />

· Malicious backdoors;<br />

· Diallers;<br />

· Keyboard loggers;<br />

· Password stealers;<br />

· Trojans;<br />

· Malicious code;


989<br />

· Spyware;<br />

· Adware;<br />

· Malware.<br />

6.3.3 The Contractors anti-virus <strong>Service</strong> is configured to regularly poll the Contractors centralised<br />

management system and check for signature updates. New updates shall be automatically<br />

downloaded and installed to ensure that <strong>Service</strong> provides up to date anti-virus detection.<br />

6.3.4 The Contractor shall provide an Anti-spam <strong>Service</strong> shall provide a gateway based anti-spam<br />

filter that can flag or drop unwanted, malicious email. The anti-spam engine shall filter<br />

incoming email for known spam and phishing attacks to act as a first line of defence at the<br />

Customers network boundary.<br />

6.3.4.1 The Contractors anti-spam <strong>Service</strong> is configured to regularly poll a centralised<br />

management system and check for signature updates. New updates shall be<br />

automatically downloaded and installed to ensure that <strong>Service</strong> provides up to<br />

date anti-spam detection.<br />

6.3.5 The Contractor shall provide Intrusion detection and prevention.<br />

6.3.5.1 Network-based intrusion detection systems (NIDS) - NIDS shall monitor packets<br />

on a network for attempts to break into a system. NIDS shall passively monitor<br />

critical segments within a network, such as server VLANs and internet<br />

connections, analysing all traffic at these points against a database of known<br />

attack signatures.<br />

6.3.5.2 Host-based intrusion prevention systems (HIPS) – HIPS agent software shall be<br />

installed directly onto critical servers or hosts to identify and shall prevent<br />

malicious behaviour before it can occur by analysing the host for any abnormal<br />

activity. HIPS shall provide various protection features including;<br />

· Malicious mobile code protection;<br />

· Operating system integrity assurance;<br />

· Audit log consolidation within a single agent;<br />

· Email scanning and filtering.<br />

In addition to the anti-virus and anti-spam <strong><strong>Service</strong>s</strong> described above we shall provide an<br />

email scanning and filtering <strong><strong>Service</strong>s</strong> that shall provide the following capabilities;<br />

· Origin based reputation filters;<br />

· Content filters;<br />

· Virus outbreak filter;<br />

· The scanning and filtering <strong>Service</strong> shall include configurable quarantine capabilities<br />

of filtered email.<br />

6.3.6 The Contractor shall provide Managed Internet Access as either a fully managed or a<br />

partially managed <strong>Service</strong> at bandwidths from 2Mbps through to 10Gbps and shall provide<br />

users with controlled connectivity to the Internet. The Customer shall have configurable<br />

control over the authenticated end users that can access the Internet from within their


990<br />

business domain with fine grained control over filtering options, down to the end user level,<br />

at the Customers option. The <strong>Service</strong> shall include measures to protect the Customers<br />

against Denial of <strong>Service</strong> and Distributed Denial of <strong>Service</strong> attacks and shall be implemented<br />

in accordance with industry best practice and the CESG Good Practice Guides and<br />

Architectural Patterns.<br />

6.3.7 The Contractor shall provide Co-location and hosting that shall include;<br />

· Co-location hosting;<br />

· Dedicated infrastructure hosting;<br />

· Virtual Private Data Centre (VPDC) hosting.<br />

Managed co-location hosting <strong>Service</strong> includes the following <strong>Service</strong> options;<br />

· Cooling and power management;<br />

· Cable management;<br />

· Data centre LAN switching;<br />

· Remote hands and administration;<br />

· Backup tape rotation.<br />

6.3.8 The Contractor shall provide dedicated infrastructure to support the following <strong><strong>Service</strong>s</strong><br />

· A commoditised shared virtualised infrastructure;<br />

· Microsoft Windows and Redhat Linux platforms;<br />

· Includes all OS licensing and management;<br />

· Manageable through a web-portal for the purposes of reporting, billing and<br />

orchestration;<br />

· Hourly billing rates are available;<br />

· Based upon and industry best-of-breed virtualisation platform;<br />

· On-line storage;<br />

The Contractor shall provide a range of storage and backup <strong><strong>Service</strong>s</strong>, including;<br />

· Cloud based solutions on a shared infrastructure, accessible over internet or<br />

Customer network;<br />

· Dedicated, hosted, and fully managed solutions held within a managed data centre<br />

environment, accessible over internet or Customer network;<br />

· Managed backup rotations on agreed schedules with on-site tape handling and<br />

control.<br />

6.3.9 Customer protection from Denial of <strong>Service</strong> and Distributed Denial of <strong>Service</strong> attacks from<br />

the Internet shall be facilitated by the anti-DOS and anti-DDOS technologies. Additional<br />

measures shall be utilised by the response teams in our Network Operations Centres which<br />

shall mitigate the effects of an attack by reconfiguring the Internet routers and firewalls to<br />

ensure that any potential Customer impact is kept to an absolute minimum.


7. Professional <strong><strong>Service</strong>s</strong><br />

7.1 The Contractor shall provide the following professional for all <strong><strong>Service</strong>s</strong> defined within the<br />

Framework contract. Professional <strong><strong>Service</strong>s</strong> will also be provided for all bespoke offerings to<br />

end customers. All Professional <strong><strong>Service</strong>s</strong> personnel will have the appropriate Security<br />

Clearances.<br />

7.1.1 The Contractor will provide skilled and experienced personnel to undertake Professional<br />

<strong><strong>Service</strong>s</strong> assignments from either <strong><strong>Service</strong>s</strong> and solutions teams or sector oriented<br />

teams. The Contractors Professional <strong><strong>Service</strong>s</strong> include but are not limited to; technical<br />

consultancy, security consultancy, programme and project management and on-site <strong>Service</strong><br />

management. Professional <strong><strong>Service</strong>s</strong> work packages would be agreed with the end customer<br />

at the outset of each Professional <strong><strong>Service</strong>s</strong> assignment so that there is clarity on objectives,<br />

deliverables, activities, timescales and respective responsibilities. Examples of <strong><strong>Service</strong>s</strong><br />

include; Business Consultancy, Risk Assessment Due Diligence <strong><strong>Service</strong>s</strong>,, Requirements<br />

Capture, Scope of Work Definition, Project Definition Workshop, Network Readiness<br />

Assessment, Technical Design Specification; End Contact Center design and management;<br />

Customer Training and <strong>Service</strong> Take on Training.<br />

7.1.2 The Contractor will also offer a range of Quick Start Professional <strong><strong>Service</strong>s</strong> Suite consultancy<br />

packages. A Quick Start will assess, test, plan and establish the validity of a <strong>Service</strong> or<br />

technology in manageable parts, giving the Customer a clear view of the benefits and<br />

implications and providing a clear roadmap for development;<br />

991<br />

· PS Suite for IP Communications Infrastructure;<br />

· PS Suite for Video;<br />

· PS Suite for Contact Centers;<br />

· PS Suite for Unified Communications;<br />

· PS Suite for Threat Mitigation & Data Security;<br />

· PS Suite for Identity & Access;<br />

· PS Suite for Partner Enabling;<br />

· PS Suite for IT <strong>Service</strong> Management;<br />

· PS Suite for Hosted Data <strong><strong>Service</strong>s</strong>;<br />

· PS Suite for Unified Communication Applications;<br />

· PS Suite for PBX or IP Telephony deployment;<br />

· PS Suite for Collaborative Working Applications;<br />

· PS Suite for Hosted Exchange delivery and Integration;<br />

· PS Suite for Delivery of DNSP or PSTN <strong><strong>Service</strong>s</strong>.<br />

7.1.3 The Contractor shall provide Professional <strong><strong>Service</strong>s</strong> and Solutions cover the following areas,<br />

prior to deployment in a Customer environment


992<br />

· Unified Voice Over IP (VOIP) Communication systems;<br />

· Wireless LAN, Data and Voice solutions;<br />

· Unified Communications, Collaboration and Presence management;<br />

· Mobility and Video Conferencing;<br />

· Managed and Hosted <strong><strong>Service</strong>s</strong>.<br />

7.1.4 The Contractor shall provide bespoke application and integration design and development<br />

and the on-going maintenance and support of applications during their life cycles. This may<br />

include prototyping, the tailoring of existing products, data migration and user training.<br />

7.1.5 The Contractor shall provide consultancy on all areas identified on a vendor neutral basis,<br />

without alignment to any specific ICT platform or application.<br />

The Contractor Professional <strong><strong>Service</strong>s</strong> provide consultancy and bespoke solutions in the<br />

following areas;<br />

· Identity and Access Management Solutions;<br />

· Public Key Infrastructure (PKI);<br />

· Identity Management and Provisioning;<br />

· Role Based Access Control;<br />

· Single Sign-On (inc. Enterprise);<br />

· Web Single Sign-on and Federation Solution;<br />

· Privilege Management for Business Applications;<br />

· SmartCard Management Systems;<br />

· Remote, Physical and Mobile Access;<br />

· LDAP/DAP Directories solutions;<br />

· Security and Technical Assurance Solutions and <strong><strong>Service</strong>s</strong>;<br />

· CLAS (CESG Listed Advisor Scheme) Security consultancy for Public Sector<br />

Accreditation <strong><strong>Service</strong>s</strong>;<br />

· Information Security Management (including ISO27001 consulting and<br />

certification);<br />

· <strong>Service</strong> Management (including ISO20000/ITIL);<br />

· Business Continuity Management (Including Crisis Management, BS25999<br />

compliance and Disaster Recovery);<br />

· Data Handling/Data Protection/PCI;<br />

· CRAMM Methodology Risk Assessments;<br />

· Penetration testing <strong><strong>Service</strong>s</strong>;<br />

· Secure Network Design;<br />

· Unified Communication Telephony Solutions;


993<br />

· Contact Centre Solution Customisation;<br />

· UCC and CEBPA (Communication Enabled Business Processes Automation)<br />

Solution Customisation;<br />

· Vertical Sector Solutions Integration;<br />

· Mobile Data Applications;<br />

· OpenStage XML Applications;<br />

· Genesys Voice Portal Applications solutions;<br />

· OpenScape Video Solutions.<br />

7.2 Project Management<br />

7.2.1 The Contractor shall appoint a project manager or programme coordinator to oversee all<br />

aspects of the delivery of <strong><strong>Service</strong>s</strong> to the Customer.<br />

7.2.2 The Contractor shall employ a Prince II methodology that imposes strong disciplines on the<br />

delivery, commercial and support teams for all Contractor vendors involved in the<br />

deployment of a solution, to ensure that the customer requirement is captured, the solution<br />

is fully defined and understood, the delivery is fully planned and executed and all changes<br />

are properly managed.<br />

7.2.3 For identified critical infrastructure deployments a business continuity plan will be<br />

developed with the Customer to agree key milestone dates that in the event of slippage<br />

allow for the Contractor to invoke alternative <strong>Service</strong> arrangements with the agreement of<br />

the Customer.<br />

7.2.4 For each project identified as requiring Project Management the Customer and the<br />

Contractor shall develop a project plan and allocate the required resources as detailed.<br />

8. <strong><strong>Service</strong>s</strong> Summary<br />

8.1 The Contractor shall provide a range of ITIL based <strong>Service</strong> elements that shall be<br />

documented within the <strong>Service</strong> Catalogue, as described in this paragraph 8.<br />

8.1.1 The Contractor <strong>Service</strong> catalogue shall document operational <strong>Service</strong> elements which shall<br />

be capable of delivering <strong><strong>Service</strong>s</strong> for proactively marked information up to Impact Level 2<br />

(IL2) and Impact Level 3 (IL3).<br />

8.1.2 The Contractor shall provide a range of service levels which are described in paragraph 9<br />

for the specified service types as outlined in paragraph 3, these are summarised below:<br />

· On-Site Equipment;<br />

· Hosted Telephony <strong>Service</strong> - Managed <strong>Service</strong>;<br />

· On-Site Managed Equipment <strong>Service</strong> – Managed <strong>Service</strong>;<br />

· Third Party Vendor Equipment.


8.1.3 Where the Contractor optional services as described in paragraph 4 refers to paragraph 8<br />

and where no service levels are provided, the Contractor shall agree relevant service levels<br />

in conjunction with the Customer for performance monitoring methodology in accordance<br />

with Appendix 4, the Call Off Form.<br />

8.2 <strong>Service</strong> Transition<br />

8.2.1 The Contractor shall work with the Customer to determine the key <strong>Service</strong> deliverables<br />

associated with <strong>Service</strong> transition, take on and implementation, the key <strong>Service</strong> deliverables<br />

are listed below;<br />

994<br />

8.2.1.1 Operational Due Diligence shall include the data discovery and capture for<br />

operational information including supplier information, site and network details<br />

and user information;<br />

8.2.1.2 Operational Process Definition and Documentation shall include:<br />

· The provision of <strong>Service</strong> Relationship Specialists to work with <strong>PSN</strong> customers to<br />

establish effective working relationship;<br />

· To specify <strong>Service</strong> contact and escalation information;<br />

· The definition, production and joint approval of the Operational Process<br />

Document (OPD) which shall document the end to end <strong>Service</strong> procedure and<br />

processes.<br />

8.3 <strong>Service</strong> Catalogue<br />

8.3.1 <strong>Service</strong> Desk<br />

8.3.1.1 The Contractor <strong>Service</strong> Desk shall operate 24 Hours, 365 Days including Bank<br />

Holidays.<br />

8.3.1.2 The Contractor shall provide a Single Point of Contact (SPOC) for the progression<br />

of all reported <strong>Service</strong> events including incidents and <strong>Service</strong> requests. The SPOC<br />

shall be a multi channelled (voice, mail, portal) <strong>Service</strong> operation capable of<br />

dealing with a range of <strong>Service</strong> events ranging from simple user assist, the<br />

effective triage of incidents through to complex technical diagnosis and<br />

resolution.<br />

8.3.1.3 The Contractor shall ensure that all <strong>Service</strong> Events presented to the Contractors<br />

<strong>Service</strong> Desk will be recorded within the Contractors ‘<strong>Service</strong> event management<br />

system’. This shall ensure that all reported <strong>Service</strong> events are accurately<br />

recorded with both a date and time stamp. Thereafter all <strong>Service</strong> events shall be<br />

monitored and reported against the <strong>Service</strong> agreed levels for the selected <strong>Service</strong><br />

package, as described in section 9.<br />

8.4 Incident Management


8.4.1 The Contractors Incident Management <strong>Service</strong> shall include the key <strong>Service</strong> deliverables<br />

which are outlined below;<br />

995<br />

· Notification: incidents will be reported by <strong>PSN</strong> customers calling to the <strong>PSN</strong><br />

<strong>Service</strong> Desk or where <strong>PSN</strong> customers create an incident record through the<br />

Contractors customer portal. Incidents shall also be detected proactively via the<br />

Contractors Secure Network Operations Centre (SNOC) and an incident record will<br />

be created;<br />

· Logging: all incidents that are reported by <strong>PSN</strong> customers shall be logged and time<br />

stamped within the Contractors <strong>Service</strong> event management system;<br />

· Prioritisation: incidents shall be prioritised against the priority definition as<br />

outlined in section 9;<br />

· Investigation and Diagnosis: all actions taken by resolver groups shall be recorded<br />

within the incident record;<br />

· Restoration and Recovery: incident restoration shall be fully tested and<br />

documented within the incident record, before the incident is passed back to <strong>PSN</strong><br />

<strong>Service</strong> Desk for closure;<br />

· Closure: closure of an incident shall be confirmed with the <strong>PSN</strong> customer who<br />

reported the incidents, the <strong>PSN</strong> <strong>Service</strong> desk will carry out a user satisfaction survey<br />

for an agreed sample of incident raised, the <strong>Service</strong> desk will validate whether a<br />

problem record should be recorded and then will close the incident record.<br />

8.4.2 Remote Maintenance<br />

The Contractor shall remotely diagnose the probable cause of Incidents that have been<br />

raised through the <strong>Service</strong> Desk or via proactive monitoring of the <strong><strong>Service</strong>s</strong> provided, and<br />

where reasonable practical the Contractor will manage the remote resolution of Incidents<br />

through the Secure Network Operations Centre (SNOC) to achieve a remote resolution, as<br />

per the agreed <strong>Service</strong> levels in paragraph 9.<br />

8.4.3 On-Site Maintenance<br />

The Contractor shall provide on-site diagnosis and resolution of Incidents that have<br />

been raised through the <strong>Service</strong> Desk or via proactive monitoring of the <strong><strong>Service</strong>s</strong> provided,<br />

where it has not been reasonable practical to diagnose or resolve the Incident remotely<br />

through the Secure Network Operations Centre then the Contractor will assign resources to<br />

attend site and deliver on-site <strong>Service</strong> restoration, as per the <strong>Service</strong> levels per package as<br />

outlined in paragraph 9.<br />

8.4.4 Proactive Monitoring<br />

The Contractor shall implement Network, Application and Server Monitoring which will<br />

include polling of Equipment.<br />

The Contractor shall collect alarms and traps and depending on the nature of the<br />

alarm/trap and the actual impact on <strong>Service</strong> operation. The Contractors Operational<br />

Support Systems will initiate and create an incident record.


8.5 Change, Release and Deployment Management<br />

996<br />

The Contractors Change, Release and Deployment <strong>Service</strong> shall include the key <strong>Service</strong><br />

deliverables, as outlined below;<br />

· All requests for change shall be recorded with a change record / request for<br />

change (RFC);<br />

· All RFC shall be reviewed and approved via the Change Advisory Board (CAB);<br />

· Emergency Change requests shall be reviewed and approved via the Emergency<br />

Change Advisory Board (ECAB);<br />

· All approved changes shall be communicated with both <strong>PSN</strong> customers and agreed<br />

with defined operational contacts as agreed in the Operational Process Document<br />

(OPD);<br />

· All releases shall be uniquely identified.<br />

8.6 Problem Management<br />

The release of <strong>Service</strong> components shall be managed through a structured process;<br />

o Planning – production of the release and deployment plan which shall be agreed<br />

with both <strong>PSN</strong> customers and key stakeholders;<br />

o Build & Test – assemble and test <strong>Service</strong> components prior to deployment;<br />

o Deploy – update <strong>Service</strong> processes and where relevant train end users and<br />

operational support staff;<br />

o Decommission – unused <strong>Service</strong> components will removed and secure disposal<br />

will be completed;<br />

o Verification and Closure - confirmation through <strong>PSN</strong> customer engagement that<br />

<strong><strong>Service</strong>s</strong> are not affected, verification that <strong>Service</strong> Operations can manage the<br />

<strong>Service</strong>, where appropriate identify issues and take corrective actions, close<br />

release request.<br />

The Contractors Problem Management <strong>Service</strong> shall include the key <strong>Service</strong> deliverables<br />

which are outlined below;<br />

· Notification and Detection: Problems will notified and raised by the <strong>Service</strong> Desk,<br />

Network Operation Centre and from Trend Analysis completed by the Capacity<br />

Manager and/or <strong>Service</strong> Level Management;<br />

· Logging and Recording: Where a problem has been identified then the Contractor<br />

shall create a Problem Record (PR) which will allow the tracking and reporting of all<br />

problems, this will allow the Contractor to link reported problems to related<br />

incidents;


997<br />

· Investigation and Diagnosis: As part of the ongoing investigation and diagnosis<br />

the Contractor uses a range of techniques including Kepnor Tregoe, Brainstorming<br />

and Pareto analysis to establish root cause to support problem resolution;<br />

· Resolution: Where root cause of the problem has been identified, a resolution<br />

plan will be documented in the Problem Record, this may result in Change<br />

Request. The Problem may be left open and agreed workarounds will continue to<br />

be used;<br />

· Closure: As part of the closure process the Problem Record will be updated with<br />

full details, where appropriate updates to Known Error Records will be completed<br />

and thereafter formal closure.<br />

8.6.1 The Contractor shall create a Problem Records (PR) for all P1 incidents that have been<br />

raised through the Contractors <strong>Service</strong> Desk; thereafter the Contractor will undergo a full<br />

Root Cause Analysis (RCA) for all P1 incidents.<br />

The Contractor shall ensure that all corrective improvements will be recorded and<br />

tracked through Contractors <strong>Service</strong> Level Management processes and procedures.<br />

8.7 Capacity Management<br />

The Contractor shall provide capacity management that shall provide guidance &<br />

support to <strong>PSN</strong> customers, approved 3rd parties and operational resolver groups that are<br />

managed by the Contractor.<br />

The Contractors Capacity Management shall include the following <strong>Service</strong> deliverables;<br />

· The Contractors Capacity Management shall carry out regular capacity and<br />

performance monitoring, agreed thresholds will be determined by the Contractors<br />

Technical Design Authority which will be agreed with key stakeholders and <strong>PSN</strong><br />

customers;<br />

· Capacity breaches will be triggered and notifications will be allocated to the<br />

Contractors Capacity Management for appropriate action;<br />

· The Contractors Capacity Management will identify capacity and performance<br />

trends to <strong>Service</strong> Level Manager which will form part of the <strong>Service</strong> Improvement<br />

Plan;<br />

· The Contractors Capacity Management will take ownership for all capacity related<br />

incidents that will have been allocated via the <strong>Service</strong> Desk.<br />

8.8 Availability Management<br />

Availability shall be measured by the Contractor as a percentage of the total time in a<br />

<strong>Service</strong> Period, in accordance with the following formula:<br />

<strong>Service</strong> Availability % = (MP – SD) x 100<br />

MP<br />

MP = Total Number of minutes, excluding Permitted Maintenance, within the relevant<br />

<strong>Service</strong> Period.


998<br />

SD = Total Number of minutes of <strong>Service</strong> Downtime, excluding Permitted Maintenance,<br />

in the <strong>Service</strong> Period.<br />

The Contractor shall collect performance statistics from the Equipment via SNMP polling<br />

of Host Resources MIB parameters up to the agreed volumes defined in the Operational<br />

Process Document.<br />

The Contractor shall provide availability <strong>Service</strong> reports which shall be presented to the<br />

Customer as part of the <strong>Service</strong> Management Report.<br />

8.9 <strong>Service</strong> Level Management<br />

8.9.1 <strong>Service</strong> Reporting<br />

The Contractor shall implement the reporting requirements to successfully measure<br />

<strong>Service</strong> delivery performance against defined <strong>Service</strong> level targets as described in paragraph<br />

9.<br />

The Contractor shall implement a reporting methodology that will include analysis of<br />

daily, weekly, monthly trends for contracted <strong>Service</strong> elements. This analysis shall be used<br />

to generate <strong>Service</strong> improvement initiatives that will be documented and recorded within<br />

the <strong>Service</strong> Improvement Plan.<br />

The Contractor shall provide the <strong>Service</strong> management report that will address specific<br />

<strong>Service</strong> management and delivery issues such as <strong>Service</strong> desk, incident, problem, change,<br />

capacity, <strong>Service</strong> level compliance and performance against <strong>Service</strong> Level Targets and<br />

Agreements.<br />

8.9.2 <strong>Service</strong> Review<br />

The Contractor shall implement <strong>Service</strong> reviews which will be the primary forum for<br />

reviewing the Contractors <strong>Service</strong> performance which will include analysis of the <strong>Service</strong><br />

management report and agreeing <strong>Service</strong> improvement initiatives for inclusion within the<br />

<strong>Service</strong> Improvement Plan (SIP).<br />

The Contractor <strong>Service</strong> Level Manager (SLM) shall be the primary representative at the<br />

<strong>Service</strong> review.<br />

8.9.3 Continuous <strong>Service</strong> Improvement<br />

The Contractor shall be responsible for the <strong>Service</strong> improvement plan (SIP) associated<br />

with the <strong>Service</strong> elements that are delivered by the Contractor. The SIP shall be based on<br />

the output from the <strong>Service</strong> management report and other continuous <strong>Service</strong> improvement<br />

initiatives, the SLM shall identify areas for improvement, review with the customer,<br />

generate action plans, monitor and communicate progress.<br />

9. <strong>Service</strong> Levels – Templates and Matrix


999<br />

The Contractor shall operate service levels across three defined packages which are<br />

described in paragraph 9. The Contractor shall operate a matrix of service levels associated<br />

with specific service types which is outlined in paragraph 9.1.1.<br />

9.1 <strong>Service</strong> Type and associated <strong>Service</strong> Level Package<br />

<strong>Service</strong> Type <strong>Service</strong> Level Package<br />

On-Site Equipment (Paragraph 3.2) <strong>PSN</strong> Maintenance <strong>Service</strong> Level Package<br />

Hosted Telephony <strong>Service</strong> Managed<br />

(Paragraph 3.3)<br />

<strong>PSN</strong> Managed <strong>Service</strong> Level Package<br />

On-Site Managed Equipment <strong>Service</strong> <strong>PSN</strong> Managed <strong>Service</strong> Level Package<br />

Third Party Vendor Equipment <strong>PSN</strong> Proactive <strong>Service</strong> Level Package<br />

9.2 The Contractor shall provide a range of 3 <strong>Service</strong> Packages in support of <strong>PSN</strong> customers,<br />

as set out below;<br />

9.2.1 <strong>PSN</strong> Maintenance<br />

9.2.2 <strong>PSN</strong> Proactive<br />

9.2.3 <strong>PSN</strong> Managed <strong>Service</strong><br />

<strong>PSN</strong> Maintenance <strong>Service</strong><br />

Package<br />

Name<br />

<strong>Service</strong><br />

Definition<br />

<strong>Service</strong><br />

Catalogue<br />

Element<br />

<strong>Service</strong><br />

Cover Period<br />

<strong>PSN</strong> MAINTENANCE - Package<br />

Lot 1<br />

<strong>PSN</strong> Maintenance shall provide a <strong>Service</strong> Desk and a Single Point of Contact<br />

(SPOC) which is available 24 x 7 x 365. <strong>PSN</strong> Maintenance will allow Customer to<br />

leverage both Remote and On-Site Maintenance with defined Incident Priorities<br />

and <strong>Service</strong> Restoration based SLA.<br />

<strong>Service</strong> Cover<br />

Period<br />

<strong>Service</strong> Desk, Section (as per lot number)<br />

Incident Management, Section (as per lot number)<br />

Remote Maintenance, Section (as per lot number)<br />

On- Site Maintenance, Section (as per lot number)<br />

<strong>Service</strong><br />

Element<br />

Description Selectable<br />

Options


Default in<br />

Bold*<br />

Selectable<br />

by Site<br />

1000<br />

<strong>Service</strong> Cover<br />

Period<br />

<strong>Service</strong> Desk<br />

Remote <strong>Service</strong><br />

Restoration<br />

On-Site<br />

Restoration<br />

<strong>PSN</strong> <strong>Service</strong><br />

Desk<br />

Incident<br />

Management<br />

Grade of<br />

<strong>Service</strong><br />

Priority 1<br />

Critical<br />

Priority 2<br />

Major<br />

Priority 3<br />

Minor<br />

<strong>Service</strong> Cover<br />

Period where a <strong>PSN</strong><br />

customers can<br />

report service<br />

events through to a<br />

single point of<br />

contact<br />

<strong>Service</strong> Cover<br />

period where the<br />

contractor will<br />

commence<br />

diagnosis and<br />

service restoration<br />

for reported<br />

incidents<br />

The % of calls<br />

presented to the<br />

Contractors <strong>Service</strong><br />

Desk that are<br />

answered in less<br />

than 15 seconds<br />

Total Loss of<br />

<strong>Service</strong><br />

Loss of <strong>Service</strong><br />

affects multiple<br />

users<br />

Loss of service<br />

to a single user<br />

Priority 4 Non <strong>Service</strong><br />

affecting<br />

Priority 1<br />

Critical<br />

Priority 2<br />

Major<br />

Priority 3<br />

Minor<br />

Total Loss of<br />

<strong>Service</strong><br />

Loss of <strong>Service</strong><br />

affects multiple<br />

users<br />

Loss of service<br />

to a single user<br />

24 x 7<br />

8 x 5 *<br />

12 x 6<br />

24 x 7<br />

<strong>Service</strong><br />

Level Target -<br />

90% of Calls<br />

answered<br />

within 15<br />

seconds<br />

4 Hours<br />

6 Hours<br />

12 Hours<br />

Next<br />

Business Day<br />

5 Hours<br />

6 Hours<br />

Next<br />

Business Day


<strong>PSN</strong> Proactive <strong>Service</strong><br />

1001<br />

PACKAGE<br />

NAME<br />

SERVICE<br />

DEFINITION<br />

SERVICE<br />

CATALOGUE<br />

ELEMENTS<br />

SERVICE<br />

COVER PERIOD<br />

Priority 4 Non <strong>Service</strong><br />

affecting<br />

<strong>PSN</strong> PROACTIVE SERVICE PACKAGE<br />

Lot 1<br />

48<br />

Working<br />

Hours<br />

<strong>PSN</strong> Proactive <strong><strong>Service</strong>s</strong> builds upon and enhances the services which are<br />

defined in <strong>PSN</strong> Maintenance service package. <strong>PSN</strong> proactive service includes the<br />

provision of proactive monitoring services and ITIL based service level<br />

management.<br />

<strong>Service</strong> Desk, Outlined Section (number per lot)<br />

Incident Management, Section (number per lot)<br />

Remote Maintenance, Section (number per lot)<br />

Onsite Maintenance, Section (number per lot)<br />

Proactive <strong><strong>Service</strong>s</strong>, Section (number per lot)<br />

<strong>Service</strong> Level Management, Section (number per lot)<br />

SERVICE ELEMENT DESCRIPTION SELECTAB<br />

LE OPTIONS<br />

<strong>Service</strong> Desk <strong>Service</strong> cover<br />

period where a<br />

<strong>PSN</strong> customer can<br />

report a service<br />

event to the single<br />

point of contact<br />

Incident<br />

Management,<br />

Remote<br />

Maintenance<br />

<strong>Service</strong> cover<br />

period indicates<br />

when the<br />

Contractor will<br />

commence<br />

remote diagnosis<br />

and service<br />

restoration for<br />

24x7<br />

24x7


SERVICE<br />

ELEMENT<br />

<strong>Service</strong> Desk<br />

Incident<br />

Management<br />

1002<br />

Default in<br />

BOLD *<br />

* DEFAULT in<br />

BOLD, Escalation<br />

available 24 x 7<br />

SERVICE<br />

MEASURE<br />

Grade of<br />

<strong>Service</strong><br />

Remote<br />

<strong>Service</strong><br />

Restoration<br />

Incident<br />

Management,<br />

On-site<br />

maintenance<br />

both reactive and<br />

proactive<br />

incidents<br />

<strong>Service</strong><br />

cover period<br />

where the<br />

contractor will<br />

commence on site<br />

diagnosis and<br />

service restoration<br />

Proactive <strong><strong>Service</strong>s</strong> <strong>Service</strong> cover<br />

period indicates<br />

the hours of<br />

operation where<br />

the Contractor will<br />

provide proactive<br />

monitoring<br />

<strong>Service</strong> Level<br />

Management<br />

% of calls forwarded to<br />

<strong>Service</strong> Desk that are answered<br />

with


Incident<br />

Management<br />

Proactive<br />

1003<br />

On-site<br />

service<br />

restoration<br />

Initiate &<br />

classification of<br />

service event<br />

through proactive<br />

detection via<br />

proactive<br />

monitoring<br />

Major Users<br />

3<br />

Minor<br />

4<br />

PRIORIT<br />

Y<br />

1<br />

Critical<br />

2<br />

Major<br />

3<br />

Minor<br />

Loss of<br />

<strong>Service</strong> to a single<br />

user<br />

Non <strong>Service</strong><br />

affecting<br />

6HR 97%<br />

Next<br />

Business<br />

Day<br />

97%<br />

DEFINITION SLA SLT<br />

Total loss of<br />

service<br />

Loss of<br />

<strong>Service</strong> Multiple<br />

Users<br />

Loss of<br />

<strong>Service</strong> to a single<br />

user<br />

4 Non <strong>Service</strong><br />

affecting<br />

1<br />

Critical<br />

2<br />

Major<br />

3<br />

Minor<br />

Software<br />

MACPerform<br />

Urgent<br />

Remote<br />

Total loss of<br />

service<br />

Loss of<br />

<strong>Service</strong> to<br />

Multiple Users<br />

Loss of<br />

<strong>Service</strong> to a single<br />

user<br />

4HR 97%<br />

5HR 97%<br />

Next<br />

Business<br />

Day<br />

48<br />

working<br />

hours<br />

15<br />

minutes<br />

15<br />

minutes<br />

30<br />

minutes<br />

97%<br />

97%<br />

100%<br />

100%<br />

100%<br />

4 Non <strong>Service</strong> N/A N/A<br />

2HR 95%


Software<br />

MAC<br />

1004<br />

Perform<br />

Urgent Remote<br />

Software MAC<br />

Perform<br />

Standard and<br />

Priority Software<br />

MAC<br />

Software<br />

MAC<br />

Perform<br />

Standard<br />

and Priority<br />

Software<br />

MAC<br />

Provision of <strong>Service</strong> Management Reports Monthly<br />

<strong>PSN</strong> Managed <strong>Service</strong><br />

PACKAGE<br />

NAME<br />

SERVICE<br />

DEFINITION<br />

SERVICE<br />

CATALOGUE<br />

ELEMENTS<br />

<strong>Service</strong> Review Frequency Monthly<br />

<strong>PSN</strong> MANAGED SERVICE PACKAGE<br />

Lot 1<br />

12HR 95%<br />

2HR 95%<br />

12HR 95%<br />

<strong>PSN</strong> Managed will allow Customer to procure ITIL based services which will<br />

encompass the service elements outlined below. <strong>PSN</strong> Managed builds upon a<br />

service restoration, proactive services and will allows customer to procure services<br />

with defined service availability targets based around hosted services.<br />

<strong>Service</strong> Desk, Outlined Section (number per lot)<br />

Incident Management, Section (number per lot)<br />

Remote Maintenance, Section (number per lot)


SERVICE<br />

COVER PERIOD<br />

1005<br />

Onsite Maintenance, Section (number per lot)<br />

Proactive <strong><strong>Service</strong>s</strong>, Section (number per lot)<br />

<strong>Service</strong> Level Management, Section (number per lot)<br />

Change, Release and Deployment Management Section (number per lot)<br />

Problem Management Section (number per lot)<br />

Deployment Management Section (number per lot)<br />

Availability Management Section (number per lot)<br />

Default in<br />

BOLD *<br />

SERVICE ELEMENT DESCRIPTION SELECTABL<br />

E OPTIONS<br />

<strong>Service</strong> Desk <strong>Service</strong> cover<br />

period where a<br />

<strong>PSN</strong> customer can<br />

report a service<br />

event to the single<br />

point of contact<br />

Incident<br />

Management,<br />

Remote<br />

Maintenance<br />

Incident<br />

Management,<br />

On-site<br />

maintenance<br />

<strong>Service</strong> cover<br />

period indicates<br />

when the<br />

Contractor will<br />

commence remote<br />

diagnosis and<br />

service restoration<br />

for both reactive<br />

and proactive<br />

incidents<br />

<strong>Service</strong><br />

cover period<br />

where the<br />

contractor will<br />

commence on site<br />

diagnosis and<br />

service restoration<br />

Proactive <strong><strong>Service</strong>s</strong> <strong>Service</strong> cover<br />

period indicates<br />

24x7<br />

24x7<br />

8x5*<br />

12x6<br />

24x7<br />

24x7


SERVICE<br />

ELEMENT<br />

<strong>Service</strong> Desk<br />

Incident<br />

Management<br />

Incident<br />

Management<br />

1006<br />

* DEFAULT in<br />

BOLD, Escalation<br />

available 24 x 7<br />

SERVICE<br />

MEASURE<br />

Grade of<br />

<strong>Service</strong><br />

Remote<br />

<strong>Service</strong><br />

Restoration<br />

On-site<br />

service<br />

restoration<br />

<strong>Service</strong> Level<br />

Management<br />

% of calls forwarded to<br />

<strong>Service</strong> Desk that are answered<br />

with


Availability<br />

Management<br />

Proactive<br />

Software<br />

MAC<br />

1007<br />

Availability<br />

Management<br />

Initiate &<br />

classification of<br />

service event<br />

through proactive<br />

detection via<br />

proactive<br />

monitoring<br />

Perform<br />

Urgent Remote<br />

Software MAC<br />

Perform<br />

Standard and<br />

Priority Software<br />

MAC<br />

Major Users<br />

3<br />

Minor<br />

Hosted<br />

Managed<br />

Telephony<br />

<strong>Service</strong><br />

On-<br />

Site<br />

Managed<br />

Equipment<br />

Loss of<br />

<strong>Service</strong> to a single<br />

user<br />

4 Non <strong>Service</strong><br />

affecting<br />

1<br />

Critical<br />

2<br />

Major<br />

3<br />

Minor<br />

Availability is<br />

defined in section<br />

8.8<br />

Availability is<br />

defined in section<br />

8.8<br />

Total loss of<br />

service<br />

Loss of<br />

<strong>Service</strong> to<br />

Multiple Users<br />

Loss of<br />

<strong>Service</strong> to a single<br />

user<br />

Next<br />

Business<br />

Day<br />

48<br />

working<br />

hours<br />

99.999<br />

%<br />

97%<br />

97%<br />

99.999%<br />

99.95% 99.95%<br />

15<br />

minutes<br />

15<br />

minutes<br />

30<br />

minutes<br />

100%<br />

100%<br />

100%<br />

4 Non <strong>Service</strong> N/A N/A<br />

Provision of <strong>Service</strong> Management Reports Monthly<br />

<strong>Service</strong> Review Frequency Monthly<br />

2HR 95%<br />

12HR 95%


1008


Thales UK Ltd<br />

<strong>Service</strong><br />

Name<br />

<strong>Service</strong><br />

Description<br />

1009<br />

Managed Communications Solutions<br />

This comprehensive <strong>Service</strong> covers the Supply, Project Management, Installation,<br />

Maintenance, Support and Managed Operation of all elements of a complete Unified<br />

Communications <strong><strong>Service</strong>s</strong> Solution. The <strong>Service</strong> typically includes the following key<br />

activities (that can be provided as separate stand-alone or bundled services if required):<br />

· Communications Solutions Requirements and Programme Management<br />

· Design and specification of Communications Solutions and System Architecture<br />

· Design and specification of ITIL-based <strong>Service</strong> Solutions<br />

· Business Transition Communications Planning & Management - e.g. for Site Moves<br />

· Technical Support to transition<br />

· Business Support to transition<br />

· Expert Telecommunications Market & Technical Awareness and Advice<br />

· <strong>Procurement</strong>, Installation and Commissioning of equipments<br />

· Communications Programme and Project Management (e.g. using PRINCE)<br />

· Training<br />

· User and Technical Documentation<br />

· Safety Case Provision and Management<br />

· Configuration and Asset Management<br />

· Legacy System Management, Support & Transition


Manage<br />

ment<br />

Approach<br />

Impact<br />

Levels<br />

Target<br />

service<br />

availability<br />

1010<br />

· End User Telephone/Communications Equipment<br />

· Managed Technical Support to sites (e.g. configuration, repairs and spares).<br />

· Disaster Recovery and Business Continuity Solutions<br />

· Provision of a configurable range of User <strong><strong>Service</strong>s</strong>, including:<br />

· Managed Voice Communications<br />

· Conferencing & Distributed Working <strong><strong>Service</strong>s</strong><br />

· Internet & Intranet <strong><strong>Service</strong>s</strong><br />

· Security <strong><strong>Service</strong>s</strong><br />

· Authentication & Access Management<br />

· Managed Messaging <strong><strong>Service</strong>s</strong><br />

Thales will provide a fully managed service adhering to ITIL v3 processes, utilising<br />

ITIL Practitioners and ITIL Foundation qualified personnel. Access will be provided to<br />

user support and service/change ordering through the Thales <strong>Service</strong> Desk and <strong>Service</strong><br />

Portal (as appropriate). A nominated Thales <strong>Service</strong> Manager will provide the primary<br />

business point of contact between Thales and the Customer for <strong>Service</strong> Level<br />

Agreements, Performance Reporting and Problem Management, as well as providing<br />

support and assistance as required to order new services or initiate significant service<br />

changes. Where elements of this service are provided by 3rd party providers (e.g.<br />

Mobile and Fixed PSTN Operators), Thales will manage all aspects of the relationship<br />

with these providers.<br />

IL2-2-x, IL3-3-x, IL4-4-x,<br />

<strong>Service</strong> Availability of up to 99.999% could be offered subject to the design of the<br />

solution. High Availability, dual resilient designs would enable ’99.999<br />

availability. However, dependant on customer requirements a range of different<br />

<strong>Service</strong> Availability Levels and Support options can be provided, allowing the System<br />

Architecture and Support to be matched to Customer specific needs at optimised cost.<br />

<strong>Service</strong> The <strong>Service</strong> offered will be 24x7x365


hours<br />

<strong>Service</strong><br />

desk<br />

availability<br />

1011<br />

<strong>Service</strong> Desk availability will be 99.999% up time measured on an annual basis.<br />

<strong>Service</strong> coverage will be 24/7/365.<br />

Fix times Dependant on the service taken and on which component within the solution has<br />

failed will determine the fix time applied. Thales will work with the customer to<br />

understand the customer business requirements and devise a ‘fix time’ model which<br />

suits the customer’s business requirement. Suitable <strong>Service</strong> levels will be determined<br />

and agreed as part of the System & Architecture Design, but may include a graded<br />

service; typically; Gold - 4hours fix, Silver - 12 hours, Bronze - 24hours), offering varied<br />

levels of response to different sites to meet individual business needs.<br />

<strong>Service</strong><br />

Entity<br />

<strong>Service</strong><br />

Name<br />

<strong>Service</strong><br />

Description<br />

Description<br />

Managed Voice Communications<br />

This <strong>Service</strong> offers the comprehensive Supply, Project Management, Installation,<br />

Maintenance, Support and 7x24 Managed Operation of Voice Communications<br />

<strong><strong>Service</strong>s</strong>. The <strong>Service</strong> includes the following activities:<br />

· Design and specification of the Voice System Architecture and <strong>Service</strong> Provision to<br />

meet Customer business and site needs<br />

· <strong>Procurement</strong>, Installation and Commissioning of site-based equipments<br />

· Provision of a configurable range of User <strong><strong>Service</strong>s</strong>, including:<br />

· Traditional & IP Based Voice <strong><strong>Service</strong>s</strong><br />

· External (PSTN) Voice Call Packages (e.g. inclusive or minutes-based)<br />

· External DDI <strong><strong>Service</strong>s</strong>, PSTN Numbers and legacy Porting as required<br />

· Premium Rate and Non-Geographic PSTN Numbers


Manage<br />

ment<br />

Approach<br />

Impact<br />

Levels<br />

Target<br />

service<br />

availability<br />

<strong>Service</strong><br />

hours<br />

<strong>Service</strong><br />

desk<br />

1012<br />

· Personal Mobility Solutions (e.g. Follow me/call forward PSTN Numbers)<br />

· Internal Directory Enquiries <strong><strong>Service</strong>s</strong> and Systems<br />

· Call Preference <strong><strong>Service</strong>s</strong> (including contingency/event support)<br />

· Disaster Recovery and Business Continuity Solutions<br />

· Preparation and delivery of End-User training packages<br />

· Audio Conference Call facilities, with internal or 0800 (toll-free) PSTN<br />

numbers<br />

· Managed Technical Support to sites (e.g. configuration, repairs and spares).<br />

· On-site Maintenance and Field <strong>Service</strong> Technical Support activity will be provided<br />

as determined by site and <strong>Service</strong> Level needs<br />

Thales will provide a fully managed Voice Communications service based on ITIL v3<br />

service processes, with access to user support and service/change ordering through the<br />

Thales <strong>Service</strong> Desk and <strong>Service</strong> Portal (as appropriate). A nominated Thales <strong>Service</strong><br />

Manager will provide the primary business point of contact between Thales and the<br />

Customer for <strong>Service</strong> Level Agreements, Performance Reporting and Problem<br />

Management, as well as providing support and assistance as required to order new<br />

services or initiate significant service changes. Where elements of this service are<br />

provided by 3rd party providers (e.g. Mobile and Fixed PSTN Operators), Thales will<br />

manage all aspects of the relationship with these providers.<br />

IL2-2-x, IL3-3-x, IL4-4-x,<br />

<strong>Service</strong> Availability of up to 99.999% will be offered subject to the design of the<br />

solution. High Availability, dual resilient designs would enable ’99.999<br />

availability. However, dependant on customer requirements a range of different<br />

<strong>Service</strong> Availability Levels and Support options can be provided allowing the System<br />

Architecture and Support to be matched to Customer specific needs at optimised cost.<br />

The <strong>Service</strong> offered will be 24x7x365<br />

<strong>Service</strong> Desk availability will be 99.999% up time measured on an annual basis.


availability <strong>Service</strong> coverage will be 24/7/365.<br />

1013<br />

Fix times Dependant on the service taken and on which component within the solution has<br />

failed will determine the fix time applied. Thales will work with the customer to<br />

understand the customer business requirements and devise a ‘fix time’ model which<br />

suits the business. This will be determined and agreed as part of the System &<br />

Architecture Design, but may include a graded service; typically; Gold – 4 hours fix,<br />

Silver - 12 hours, Bronze – 24 hours), offering varied levels of response to different sites<br />

to meet individual business needs.<br />

<strong>Service</strong><br />

Name<br />

<strong>Service</strong><br />

Description<br />

Conferencing & Distributed Working <strong><strong>Service</strong>s</strong><br />

This <strong>Service</strong> provides a range of managed Conferencing and Distributed Working<br />

<strong><strong>Service</strong>s</strong>, allowing organisations to capitalise on their organisational resources through<br />

flexible and effective distributed working practices, enabled by industry standard tools,<br />

including:<br />

· Audio Conference Call facilities, with internal or 0800 (toll-free) PSTN numbers<br />

· Desktop Video Conferencing, allowing rapid Peer to Peer or Group conferencing.<br />

Options are available to provide secure Video Conferencing where confidentiality is a<br />

requirement.<br />

· Collaboration Tools to allow distributed working on shared documents and files,<br />

including instant messaging, chat, bulletin boards & shared presentations<br />

· Web Conferencing, allowing collaborative and shared working across larger<br />

distributed user groups<br />

· preparation and delivery of End-User training packages<br />

· Maintenance and Technical Support activity will be provided as determined by<br />

<strong>Service</strong> Level needs


Manage<br />

ment<br />

Approach<br />

Impact<br />

Levels<br />

Target<br />

service<br />

availability<br />

<strong>Service</strong><br />

hours<br />

<strong>Service</strong><br />

desk<br />

availability<br />

1014<br />

These <strong><strong>Service</strong>s</strong> are fully managed and can either be called off on a "per use" basis,<br />

or as part of longer term bundled usage packages, e.g. "per seat". Thales will operate<br />

the managed service using ITIL v3 processes, and will provide access to user support<br />

and service/change ordering through the Thales <strong>Service</strong> Desk and <strong>Service</strong> Portal (as<br />

appropriate). A nominated Thales <strong>Service</strong> Manager will provide the primary business<br />

point of contact between Thales and the Customer for <strong>Service</strong> Level Agreements,<br />

Performance Reporting and Problem Management, as well as providing support and<br />

assistance as required to order new services or initiate service changes.<br />

IL2-2-x, IL3-3-x, IL4-4-x,<br />

<strong>Service</strong> Availability of up to 99.999% will be offered subject to the design of the<br />

solution. High Availability, dual resilient designs would enable 99.999%<br />

availability. However, dependant on customer requirements a range of different<br />

<strong>Service</strong> Availability Levels and Support options can be provided allowing the System<br />

Architecture and Support to be matched to Customer specific needs at optimised cost.<br />

The <strong>Service</strong> will be 24x7x365<br />

<strong>Service</strong> Desk availability will be 99.999% up time, measured on an annual basis.<br />

<strong>Service</strong> coverage will be 24/7/365.<br />

Fix times Dependant on the service taken and which component within the solution has<br />

failed will determine the fix time applied. Thales will work with the customer to<br />

understand the customer business requirements and devise a ‘fix time’ model which<br />

suits the business. Suitable <strong>Service</strong> levels will be determined and agreed as part of the<br />

System and Architecture Design, but may include a graded service; typically; Gold – 4<br />

hours fix, Silver - 12 hours, Bronze – 24 hours), offering varied levels of response to<br />

different sites to meet individual business needs.<br />

<strong>Service</strong><br />

Name<br />

<strong>Service</strong><br />

Description<br />

Internet & Intranet <strong><strong>Service</strong>s</strong><br />

This <strong>Service</strong> provides a range of Internet and Intranet-based Information <strong><strong>Service</strong>s</strong>,<br />

using Thales experience as an Internet <strong>Service</strong> Provider and our digital infrastructure to<br />

assure effective, reliable and secure Internet and Intranet services to Public <strong>Service</strong><br />

organisations, including the following key services:


Manage<br />

ment<br />

Approach<br />

1015<br />

· Internet <strong>Service</strong> Provision (<strong>PSN</strong> Qualified Provider)<br />

· Managed Intranet <strong><strong>Service</strong>s</strong><br />

· e-Mail <strong><strong>Service</strong>s</strong> - internal and external (Internet)<br />

· Hosted web filtering service<br />

· Secure, Monitored Website Hosting <strong><strong>Service</strong>s</strong><br />

· Co Location of Customer equipment in Thales Secure Datacentres<br />

· On-Line storage and backup facilities using the Thales Secure Data Centre.<br />

Technologies to ensure the integrity and confidentiality of data in the on line<br />

storage facility and the management of the underlying cryptography can be included in<br />

this service<br />

· Internet and Intranet Security <strong><strong>Service</strong>s</strong> and Support based on our extensive Cyber<br />

Security experience<br />

· Anti Virus / Spyware Protection, Support and Management<br />

· Firewalls and Secure Gateways between Systems (including at different ILs)<br />

· On-site Maintenance and Field <strong>Service</strong> Technical Support activity will be provided<br />

as determined by site and <strong>Service</strong> Level needs<br />

Security is paramount in this section of the Communications <strong><strong>Service</strong>s</strong> Lot and the<br />

Confidentiality, Integrity and Availability (CIA) of data, carried at differing IA levels must<br />

be adhered to and acknowledged. Thales is expert in the area of data segregation and<br />

data integrity. Leveraging on Thales expertise in not only the defence Industry but also<br />

in the commercial sector Thales will ensure the design is fit for purpose as specified in<br />

the call-off contract with the customer and offers value for money to the<br />

customer Thales runs multiple customers over its Internet services segregating<br />

customer data by utilising vendor agnostic appliances.<br />

These <strong><strong>Service</strong>s</strong> can be fully managed or unmanaged and can either be called off on<br />

a "per use" basis, or as part of longer term bundled usage packages, e.g. "per<br />

seat". Thales will operate the managed service using ITIL v3 processes, and will provide<br />

access to user support and service/change ordering through the Thales <strong>Service</strong> Desk<br />

and <strong>Service</strong> Portal (as appropriate). A nominated Thales <strong>Service</strong> Manager will provide<br />

the primary business point of contact between Thales and the Customer for <strong>Service</strong>


Impact<br />

Levels<br />

Target<br />

service<br />

availability<br />

<strong>Service</strong><br />

hours<br />

<strong>Service</strong><br />

desk<br />

availability<br />

1016<br />

Level Agreements, Performance Reporting and Problem Management, as well as<br />

providing support and assistance as required to order new services or initiate service<br />

changes.<br />

IL0 - IL6 – confirm, and subject to <strong>PSN</strong> accreditation.<br />

<strong>Service</strong> Availability of up to 99.999% will be offered subject to the design of the<br />

solution. High Availability, dual resilient designs would enable ’99.999<br />

availability. However, dependant on customer requirements a range of different<br />

<strong>Service</strong> Availability Levels and Support options can be provided allowing the System<br />

Architecture and Support to be matched to Customer specific needs at optimised cost.<br />

The <strong>Service</strong> offered will be 24x7x365.<br />

<strong>Service</strong> Desk availability will be 99.999% up time measured on an annual basis.<br />

<strong>Service</strong> coverage will be 24/7/365.<br />

Fix times Suitable <strong>Service</strong> levels will be determined and agreed as part of the System &<br />

Architecture Design, but may include a graded service; typically; Gold – 4 hours fix,<br />

Silver - 12 hours, Bronze – 24 hours), offering varied levels of response to different sites<br />

to meet individual business needs.<br />

<strong>Service</strong><br />

Name<br />

Authentication & Access Management


<strong>Service</strong><br />

Description<br />

Manage<br />

ment<br />

Approach<br />

Impact<br />

Levels<br />

Target<br />

service<br />

availability<br />

<strong>Service</strong><br />

hours<br />

<strong>Service</strong><br />

desk<br />

availability<br />

1017<br />

This <strong>Service</strong> provides Project Management, Secure Authentication and Access<br />

Management <strong><strong>Service</strong>s</strong> and Applications. The service can be delivered as a managed<br />

solution (which may be part of, or integrated with, an overall Thales Communications<br />

<strong><strong>Service</strong>s</strong> Package) or as a stand alone service. Available services include Identity and<br />

Credential provisioning and management, including biometric, integration of logical and<br />

physical access control, strong authentication of both users and transactions, secure<br />

assured and auditable Web and Application Sign-on using open Federation standards<br />

(SAML). Our specialist component e-security products (hardware and software) and<br />

consultancy services can also be provided separately for use in a customer specified<br />

system and include SafeSign Authentication products and nShield Hardware Security<br />

Modules. These specialist products have been fully integrated with leading ID and<br />

Access Management (IDAM) products from leading companies like IBM and Oracle<br />

Maintenance and Technical Support activity will be provided as determined by site<br />

and <strong>Service</strong> Level needs<br />

These <strong><strong>Service</strong>s</strong> range from unmanaged to fully managed and can either be called off<br />

on a "per use" basis, or as part of longer term bundled service packages. Thales will<br />

operate the managed service using ITIL v3 processes, and will provide access to user<br />

support and service/change ordering through the Thales <strong>Service</strong> Desk and <strong>Service</strong><br />

Portal (as appropriate). A nominated Thales <strong>Service</strong> Manager will provide the primary<br />

business point of contact between Thales and the Customer for <strong>Service</strong> Level<br />

Agreements, Performance Reporting and Problem Management, as well as providing<br />

support and assistance as required to order new services or initiate service changes.<br />

Thales is able to provide these services across a wide range of Impact Levels, in<br />

accordance with CESG requirements and <strong>PSN</strong> policy, and subject to <strong>PSN</strong> accreditation.<br />

<strong>Service</strong> Availability of up to 99.999% will be offered subject to the design of the<br />

solution. High Availability, dual resilient designs would enable 99.999%<br />

availability. However, dependant on customer requirements a range of different<br />

<strong>Service</strong> Availability Levels and Support options can be provided allowing the System<br />

Architecture and Support to be matched to Customer specific needs at optimised cost.<br />

The <strong>Service</strong> will be 24x7x365<br />

<strong>Service</strong> Desk availability will be 99.999% up time, measured on an annual basis.<br />

<strong>Service</strong> coverage will be 24/7/365.


1018<br />

Fix times Suitable <strong>Service</strong> levels will be determined and agreed as part of the System &<br />

Architecture Design, but may include a graded service (typically Gold – 4 hours fix,<br />

Silver - 12 hours, Bronze – 24 hours), offering varied levels of response to different sites<br />

to meet individual business needs.<br />

<strong>Service</strong><br />

Name<br />

<strong>Service</strong><br />

Description<br />

Manage<br />

ment<br />

Approach<br />

Managed Messaging <strong><strong>Service</strong>s</strong><br />

This <strong>Service</strong> provides a range of managed messaging and information services,<br />

including instant and near real-time information services to internal and external (e.g.<br />

Internet) users. The <strong>Service</strong> includes the following activities:<br />

· Supply and configuration of Desktop Messaging Applications and <strong><strong>Service</strong>s</strong><br />

· Provision of Messaging services via e-mail, including:<br />

· Bulk Messaging Solutions (internal & External)<br />

· Auditable (e.g. logged/non-repudiation) Messaging Solutions<br />

· SMS Messaging Packages & <strong><strong>Service</strong>s</strong> (e.g. Broadcast SMS)<br />

· SMS Paging <strong><strong>Service</strong>s</strong><br />

· Bulk SMS Messaging Solutions.<br />

· SMS Cell/Geographic Broadcast Solutions.<br />

· preparation and delivery of User training packages<br />

These <strong><strong>Service</strong>s</strong> are fully managed and can either be called off on a "per use" basis,<br />

or as part of longer term bundled usage packages. Thales will provide the managed<br />

service based on ITIL v3 processes, with access to user support and service/change<br />

ordering through the Thales <strong>Service</strong> Desk and <strong>Service</strong> Portal (as appropriate). A<br />

nominated Thales <strong>Service</strong> Manager will provide the primary business point of contact<br />

between Thales and the Customer for <strong>Service</strong> Level Agreements, Performance<br />

Reporting and Problem Management, as well as providing support and assistance as<br />

required to order new services or initiate significant service changes. Where elements<br />

of this service are provided by 3rd party providers (e.g. Mobile Operators), Thales will


Impact<br />

Levels<br />

Target<br />

service<br />

availability<br />

<strong>Service</strong><br />

hours<br />

<strong>Service</strong><br />

desk<br />

availability<br />

1019<br />

manage all aspects of the relationship with these providers.<br />

Thales is able to provide these services across a wide range of Impact Levels up to<br />

and including IL3, in accordance with CESG guidelines and <strong>PSN</strong> policy and subject to <strong>PSN</strong><br />

accreditation.<br />

<strong>Service</strong> Availability of up to 99.999% will be offered subject to the design of the<br />

solution. High Availability, dual resilient designs would enable 99.999%<br />

availability. However, dependant on customer requirements a range of different<br />

<strong>Service</strong> Availability Levels and Support options can be provided allowing the System<br />

Architecture and Support to be matched to Customer specific needs at optimised cost.<br />

The <strong>Service</strong> offered will be 24x7x365<br />

<strong>Service</strong> Desk availability will be 99.999% up time, measured on an annual basis.<br />

<strong>Service</strong> coverage will be 24/7/365.<br />

Fix times Suitable <strong>Service</strong> levels will be determined and agreed as part of the System &<br />

Architecture Design, but may include a graded service; typically; Gold – 4 hours fix,<br />

Silver - 12 hours, Bronze – 24 hours), offering varied levels of response to different sites<br />

to meet individual business needs..<br />

<strong>Service</strong><br />

Name<br />

Security <strong><strong>Service</strong>s</strong>


<strong>Service</strong><br />

Description<br />

Manage<br />

ment<br />

Approach<br />

Impact<br />

Levels<br />

Target<br />

service<br />

availability<br />

<strong>Service</strong><br />

hours<br />

<strong>Service</strong><br />

desk<br />

availability<br />

1020<br />

Thales offers a range of Security <strong><strong>Service</strong>s</strong> to support the provision of secure<br />

Communications <strong><strong>Service</strong>s</strong>. These include: the provision of Public Key Infrastructure and<br />

Digital Certificate <strong><strong>Service</strong>s</strong> for both devices and users, PKI Bridge and federation<br />

<strong><strong>Service</strong>s</strong>, Secure and non repudiable. Audit and Accountability services, Secure Time<br />

Stamp services, High Assurance Cryptographic Key Management services and High<br />

Assurance DNSSEC services.<br />

These <strong><strong>Service</strong>s</strong> range from unmanaged to fully managed and can either be called off<br />

on a "per use" basis, or as part of longer term bundled service packages. Thales will<br />

operate the managed service using ITIL v3 processes, and will provide access to user<br />

support and service/change ordering through the Thales <strong>Service</strong> Desk and <strong>Service</strong><br />

Portal (as appropriate). A nominated Thales <strong>Service</strong> Manager will provide the primary<br />

business point of contact between Thales and the Customer for <strong>Service</strong> Level<br />

Agreements, Performance Reporting and Problem Management, as well as providing<br />

support and assistance as required to order new services or initiate service changes.<br />

Thales is able to provide these services across a wide range of Impact Levels, in<br />

accordance with CESG requirements and <strong>PSN</strong> policy and subject to <strong>PSN</strong> accreditation.<br />

<strong>Service</strong> Availability of up to 99.999% could be offered subject to the design of the<br />

solution. High Availability, dual resilient designs would enable 99.999%<br />

availability. However, dependant on customer requirements a range of different<br />

<strong>Service</strong> Availability Levels and Support options can be provided allowing the System<br />

Architecture and Support to be matched to Customer specific needs at optimised cost.<br />

The <strong>Service</strong> offered will be 24x7x365<br />

Typically Monday to Friday 8am to 6pm, excluding English public<br />

holidays. Additional Support can be provided as required at additional cost on a<br />

permanent or ad-hoc basis.<br />

Fix times A three tier support structure of Gold, Silver or Bronze <strong>Service</strong> is offered, providing<br />

varied support response times as appropriate, allowing service costs to be optimised in<br />

line with business needs


Vodafone Limited<br />

Vodafone will provide the following Communications <strong><strong>Service</strong>s</strong> and Capability <strong><strong>Service</strong>s</strong><br />

requested in the Lot 1 ITT.<br />

Lot 1.1 <strong>Service</strong> Description – Unified Communications <strong><strong>Service</strong>s</strong> (Avaya, Cisco, Microsoft<br />

and Shoretel Premise based IP PBX)<br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> - All<br />

traditional and IP based voice<br />

services<br />

Deliverables of the <strong>Service</strong><br />

<strong>PSN</strong>/GPS Capability <strong>Service</strong><br />

requirements:<br />

1021<br />

Vodafone will provide supply, design, deliver and managed<br />

services for Avaya, Cisco, Microsoft and Shoretel onpremise<br />

IP-PBX infrastructure.<br />

Flexible Call Functionality<br />

Easy Extension Moves<br />

PC or Desk Phone Interfaces<br />

Support for Multi-Site or Multi-System estates<br />

Supply – Yes<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes<br />

System design - Yes<br />

<strong>Service</strong> Levels Available: Foundation<br />

Project management - Yes<br />

Support for equipment - Yes<br />

Commodity and managed service – Yes<br />

Enhanced<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total Communications Delivery<br />

Methodology (“TCDM”) to provide the required <strong>PSN</strong><br />

capability services:<br />

Further Details<br />

Unified Communication <strong><strong>Service</strong>s</strong>


Vodafone’s professional services deliver IP Telephony solutions based on Avaya, Cisco,<br />

Microsoft and Shoretel IP Telephony equipment. Vodafone’s capability in Avaya is accredited to<br />

deliver both Avaya Communications Manager and legacy Nortel PBX systems which will allow<br />

clients to have a single point of services for any multi-platform upgrade requirements.<br />

Vodafone’s Avaya, Cisco and Microsoft capabilities allow clients to transition away from many<br />

disparate existing elements of their communications infrastructure to a single integrated<br />

solution. Vodafone’s Shoretel and Avaya IP-Office solutions provide 50-100 seat remote site<br />

solutions for smaller departments.<br />

Vodafone provide the solution design, deployment and transition of IP Communications projects<br />

and their transition into Vodafone’s assure managed service.<br />

Users have a choice of interfaces – from traditional desk phones, to ‘soft phone’ clients on<br />

PCs.<br />

Users can mix voice calls with Instant Messaging (IM), presence and other UC applications<br />

on their PC screens – enabling them to improve collaboration and boost productivity.<br />

We provide extension numbers, hunt groups and a comprehensive range of call handing<br />

functions – so it’s easier to connect incoming calls to the right destination first time. We<br />

configure your IP systems to meet your exact needs – and include all the call forwarding,<br />

voicemail.<br />

IP or hybrid solutions that ensure any existing non-IP systems can still be reused and integrated<br />

into a new company-wide deployment. Systems can use IP via Session Internet Protocol (“SIP”)<br />

connections, or traditional ISDN and analogue lines.<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk<br />

Support Hours<br />

Foundation 08:00 – 18:00hrs<br />

Monday – Friday<br />

Enhanced 08:00 – 18:00hrs<br />

Every Day<br />

Comprehen<br />

sive<br />

1022<br />

Tier 1 remote<br />

support desk<br />

24Hrs Support<br />

Weekdays<br />

Help desk to help<br />

desk model<br />

Total 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

On Site Level 1<br />

<strong>Service</strong> Performance &<br />

Reporting<br />

Web based user driven<br />

service reporting<br />

Monthly <strong>Service</strong> Review<br />

meetings<br />

Monthly <strong>Service</strong> Reports &<br />

Performance improvement<br />

plan<br />

Monthly <strong>Service</strong> Review<br />

meetings<br />

Monthly <strong>Service</strong> Reports &<br />

Performance improvement<br />

plan<br />

Monthly <strong>Service</strong> Review<br />

meetings<br />

Monthly <strong>Service</strong> Reports &<br />

Performance improvement<br />

<strong>Service</strong> Model<br />

Help desk to help desk<br />

Help desk to help desk<br />

Help desk to help desk<br />

Help desk to help desk<br />

Optional end user<br />

service desk or on-site<br />

support models


1023<br />

Support Team plan<br />

<strong>Service</strong> Governance<br />

Lot 1.2 <strong>Service</strong> Description – Vodafone OneNet <strong>PSN</strong> (Hosted IP PBX)<br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> - All traditional<br />

and IP based voice services<br />

available<br />

A Vodafone hosted IP-PBX platform providing<br />

centralised control over enterprise voice which<br />

can be integrated into the customer’s WAN and<br />

existing on-premise PBX infrastructure.<br />

Deliverables of the <strong>Service</strong> Fixed and Mobile convergence<br />

<strong>PSN</strong>/GPS Capability <strong>Service</strong><br />

requirements:<br />

Single number reach<br />

Single voicemail<br />

Single corporate directory<br />

Full OPEX-based managed service<br />

Supply – Yes<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes<br />

System design - Yes<br />

<strong>Service</strong> Levels Available: Foundation<br />

Project management - Yes<br />

Support for equipment - Yes<br />

Commodity and managed service – No.<br />

Managed Only<br />

Enhanced<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total Communications<br />

Delivery Methodologyto provide the required<br />

<strong>PSN</strong> capability services.<br />

Further Details<br />

Vodafone OneNet Business provides options for Single number reach – each user can use<br />

their existing fixed geographic or mobile number as their single number. We provide a Single


voicemail – rather than having to manage separate fixed and mobile voicemail systems, users<br />

will have just one single consolidated voicemail box for all calls. This can integrate into a Single<br />

directory. The service also avoids the need for smartphone handsets as the integration is<br />

performed in the network. There is no need for users to use specific brands or types of mobile<br />

handsets. Employees with the most basic mobile handset can take part in the service.<br />

Full OPEX-based managed service covering design, deployment, management, support and<br />

reporting. Vodafone OneNet <strong>PSN</strong> is a managed service where Vodafone provides a complete<br />

solution from design through to support.<br />

Integration with Unified Communications. Vodafone OneNet <strong>PSN</strong> can also be integrated<br />

with presence-based messaging, conferencing applications and collaborative tools to provide a<br />

unified communications experience with mobility at the core. Vodafone OneNet <strong>PSN</strong> will support<br />

desktop integration with Microsoft and Lotus Unified Communications environments, providing<br />

click to call and mobile presence integration. Presence – Vodafone OneNet <strong>PSN</strong> allows users<br />

to see the status of other users, allowing them to choose the most appropriate way to<br />

communicate. Presence information is extended out to smart mobile devices, extending<br />

collaboration to wherever you are. Integrated voicemail – to further unify messaging, the user’s<br />

voicemail box can be integrated with the enterprise email system to create a single integrated<br />

inbox for email and voicemail messages. This enables the user to listen, forward and manage<br />

voicemail messages as they would email – termed as the ‘voicemail to mail’ function.<br />

The Vodafone unified communication services are securely hosted in Vodafone network centres.<br />

This provides a solution to support our customers’ UC requirements in a secure, cost-effective way,<br />

giving maximum flexibility to each customer for provision of their own UC features. The key benefit<br />

derived from this way of deploying UC applications is that each enterprise’s suite of hosted services can<br />

be rapidly deployed and flexibly expanded.<br />

1024<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk<br />

Support Hours<br />

Foundation 08:00 – 18:00hrs<br />

Monday – Friday<br />

Enhanced 08:00 – 18:00hrs Every<br />

Day<br />

Tier 1 remote support<br />

desk<br />

<strong>Service</strong><br />

Performance &<br />

Reporting<br />

Web based user<br />

driven service<br />

reporting<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong> Model<br />

Help desk to help desk<br />

Help desk to help desk<br />

Comprehensive 24Hrs Support Monthly <strong>Service</strong> Help desk to help desk


1025<br />

Weekdays<br />

Help desk to help desk<br />

model<br />

Total 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

On Site Level 1<br />

Support Team<br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong><br />

Governance<br />

Help desk to help desk<br />

Optional end user<br />

service desk or on-site<br />

support models<br />

available<br />

Lot 1.3 <strong>Service</strong> Description – Vodafone OneNet Enterprise (On-premise IP PBX)<br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> - All traditional and IP<br />

based voice services<br />

Vodafone OneNet Enterprise is a<br />

complete fixed and mobile<br />

communications solution that<br />

encompasses your IP-PBX (fixed),<br />

mobile devices, desk phones, soft clients<br />

– as well as a SIP link from your IP-PBX<br />

to our intelligent IP-based mobile<br />

network.<br />

Deliverables of the <strong>Service</strong> Fixed and Mobile convergence<br />

Single number reach<br />

Single voicemail<br />

Single corporate directory<br />

<strong>PSN</strong>/GPS Capability <strong>Service</strong> requirements: Supply – Yes<br />

Full OPEX-based managed service<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes<br />

System design - Yes


<strong>Service</strong> Levels Available: Foundation<br />

1026<br />

Project management - Yes<br />

Support for equipment - Yes<br />

Commodity and managed service – No<br />

Managed Only<br />

Enhanced<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total<br />

Communications Delivery Methodology<br />

to provide the required <strong>PSN</strong> capability<br />

services.<br />

Further Details<br />

The Contracting Authority’s IP-PBX is integrated with the Vodafone network utilising SIP over a<br />

dedicated managed ethernet connection. This SIP trunk carries both outbound traffic from the IP-PBX<br />

and inbound traffic from the Vodafone mobile network. The SIP trunk utilises the Vodafone Intelligent<br />

Network IMS (IP Multimedia Subsystem) (“Vodafone IMS”) platform to route calls and hold a unified dial<br />

plan alongside the IP-PBX. The IMS platform controls all calls that pass through it and routes calls either<br />

to the mobile network, to the customer IP-PBX or to Vodafone’s global telephony interconnects as<br />

required.<br />

The Vodafone IMS is an all-IP platform, so regardless of the origin of the call – fixed, mobile or<br />

extending – Vodafone OneNet Enterprise users benefit from a more stable voice quality, reduced postdial<br />

delay and fewer dropped calls versus traditional IP to TDM conversion products.<br />

The network-based dial plan means that end users can be equipped with cost-effective mobile<br />

devices and still enjoy features like extension mobility and extension dialing without a smartphone<br />

client.<br />

The components of the OneNet Enterprise solution architecture are unified to provide the following<br />

end user and corporate communication features:<br />

• Mobile and Geographic phone number<br />

– Each user will have a single GSM device, an IP desk phone or both. Numbers will be<br />

combined with a single geographic and mobile telephone number, allowing users to<br />

decide which number to publish to customers and advertise, whilst never missing a call.<br />

• Call Forward.


• Caller Line Identity - Users can control whether to display their fixed or mobile number to people<br />

they call, settings can be applied to all calls, or adjusted on a per call basis. By default all users will<br />

display the Mobile CTN as the CLI.<br />

• Company Main Number.<br />

• Auto Attendant<br />

– The Auto Attendant feature provides small businesses with an automated secretary<br />

style of service, where all inbound calls are automatically answered by a pre-recorded<br />

message.<br />

– Call queuing exists only on company level numbers, it allows multiple callers to a hunt<br />

group, to be queued on hold until an operator is available to take their call, rather than<br />

routing straight to voicemail. Up to 20 calls can be held in a queue.<br />

• Data <strong>Service</strong>.<br />

• Microsoft Office Lync<br />

– Instant messaging.<br />

– Collaboration share point services.<br />

• The service can be delivered over multiple site locations.<br />

• IVR solution to manage feature configuration.<br />

• Online solution for managing user and corporate feature management.<br />

• Online solution for self service in life management.<br />

1027<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk<br />

Support Hours<br />

Foundation 08:00 – 18:00hrs<br />

Monday – Friday<br />

Enhanced 08:00 – 18:00hrs<br />

Every Day<br />

Tier 1 remote<br />

support desk<br />

Comprehensive 24Hrs Support<br />

Weekdays<br />

Help desk to help<br />

desk model<br />

<strong>Service</strong><br />

Performance &<br />

Reporting<br />

Web based user<br />

driven service<br />

reporting<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong> Model<br />

Help desk to help desk<br />

Help desk to help desk<br />

Help desk to help desk<br />

Total 24Hrs Support Monthly <strong>Service</strong> Help desk to help desk


1028<br />

7 Days a week<br />

End User Support<br />

On Site Level 1<br />

Support Team<br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong><br />

Governance<br />

Lot 1.4 <strong>Service</strong> Description – Fixed Network <strong><strong>Service</strong>s</strong><br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> - voice call<br />

packages, voice minutes, DDI, premium<br />

rate numbers, non-geographic numbers,<br />

118 enquiries<br />

Deliverables of the <strong>Service</strong> Calls and Lines<br />

<strong>PSN</strong>/GPS Capability <strong>Service</strong><br />

requirements:<br />

Optional end user service<br />

desk or on-site support<br />

models available<br />

Vodafone has two components under Fixed<br />

Network <strong><strong>Service</strong>s</strong>; Fixed Voice and Fixed Data<br />

<strong><strong>Service</strong>s</strong>. The Fixed Voice <strong>Service</strong> will provide fixed<br />

line and mobility solutions incorporating call and line<br />

rental with select services, internet and broadband<br />

connectivity, text centre, carrier pre-select, Nongeographic<br />

numbers and 118 881 offering. The<br />

Fixed Data <strong>Service</strong> will deliver Data Fixed Link and<br />

Business Broadband <strong><strong>Service</strong>s</strong><br />

Non-Geographic Numbers<br />

Voice Link<br />

SIP Connectivity<br />

118881<br />

Data Fixed Link<br />

Business Broadband<br />

Supply – Yes<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes<br />

System design - Yes<br />

Project management - Yes


<strong>Service</strong> Levels Available: Foundation<br />

1029<br />

Support for equipment - Yes<br />

Commodity and managed service – Yes<br />

Enhanced<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total Communications<br />

Delivery Methodology to provide the required<br />

<strong>PSN</strong> capability services:<br />

Further Details<br />

Fixed Voice <strong><strong>Service</strong>s</strong>:<br />

Our calls and lines service consists of two basic parts – the line which allows access to the<br />

network and the calls. Vodafone provide Public Switched Telephone Network (“PSTN”) access<br />

services line rental over standard analogue lines , ISDN2 or ISDN 30 lines– with no minimum<br />

call charge, no set-up charges and per second billing. Vodafone deliver Direct Dial Inbound<br />

(DDI) <strong><strong>Service</strong>s</strong> with advanced features for call routing, geographic numbering and detailed<br />

reporting. Vodafone’s fixed line services provide additional services for resilience and<br />

contingency planning, single service desk, bill consolidation and online bill and standard<br />

reporting.<br />

Vodafone’s Select call features are extra services that can be added to a line to provide a<br />

customer with extra functionality. Standard select services include call diversion, three way<br />

calling, call barring, call minder service, reminder call, ring back, caller display, call waiting,<br />

choose to refuse, anonymous call rejection, 1471 extras, call sign, caller redirect, smart diverts,<br />

selective outgoing call barring and call return. Digital select only services include caller line<br />

identity presentation and restriction, sub – addressing, permanent incoming and outgoing call<br />

barring, client and administrator controlled call forwarding, call deflection/waiting/hold and up to<br />

10 directory numbers to be allocated to one line.<br />

Vodafone provision of Non-Geographic Numbers – Free phone 0800/0808, Local Rate 0845,<br />

Low Rate 0844 and National Rate 0870/0871 numbers with Vodafone’s response services that<br />

allow clients to manage their Non-Geographic Numbers activate intelligent call routing based on<br />

time of day, date or geographical area from which the call originates.<br />

Vodafone’s Directory Assistance number is 118 881 offering UK business and residential fixed<br />

line numbers (a maximum of 2 numbers per call) and a through connect to UK business and<br />

residential fixed line number.<br />

Voice Link – connectivity between site PBX and the Vodafone network for calls to and from mobiles.<br />

Calls are routed via virtual or dedicated fixed links, reducing the cost of call charges to your mobiles.


SIP Connectivity – SIP connectivity between PBX and the PSTN. Enables intelligent traffic<br />

routing, providing greater flexibility and resilience.<br />

Fixed Data <strong><strong>Service</strong>s</strong>:<br />

Data Fixed Link – dedicated and virtual connections directly to the Vodafone network, providing a<br />

highly secure and reliable way of connecting mobile devices to applications hosted in a corporate<br />

network. By using a fixed data link connection to a Private APN (see Remote Access), information from<br />

mobile devices never touches the internet.<br />

Business Broadband –internet connectivity for home workers and small offices. These services are<br />

dedicated to business use, with high levels of security and support. Vodafone offer multiple features<br />

which includes unlimited downloads and “plug and play” routers that enable multiple users through one<br />

connection. Vodafone broadband offering can also supply a static IP address to support running a<br />

website, enabling remote access or running an FTP server.<br />

1030<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk<br />

Support Hours<br />

Foundation 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

Enhanced 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

Comprehensive 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

Total 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

<strong>Service</strong><br />

Performance &<br />

Reporting<br />

Web based user<br />

driven service<br />

reporting<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong><br />

Governance<br />

<strong>Service</strong> Model<br />

Help desk to help desk<br />

Help desk to help desk<br />

Help desk to help desk<br />

Help desk to help desk<br />

Optional end user service<br />

desk or on-site support<br />

models available


Lot 1.5 <strong>Service</strong> Description – Vodafone Collaboration <strong><strong>Service</strong>s</strong><br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> – Audio conferencing,<br />

desktop video conferencing, collaborations tools<br />

and web conferencing.<br />

1031<br />

Vodafone supplies, installs and maintains<br />

Polycom, Avaya and Microsoft desktop<br />

audio and video conferencing equipment<br />

using Vodafone Unified Communications<br />

<strong><strong>Service</strong>s</strong>, implemented using TCDM.<br />

Vodafone provide the following Web<br />

Conferencing <strong><strong>Service</strong>s</strong>; Vodafone Unified<br />

Meeting, Microsoft® Lync Online, Cisco<br />

WebEx Web Conferencing, Cisco WebEx<br />

Meeting Center, Adobe Acrobat Connect<br />

Pro.<br />

Deliverables of the <strong>Service</strong> Vodafone will provide Vodafone<br />

Collaboration <strong><strong>Service</strong>s</strong>– this includes:<br />

<strong>PSN</strong>/GPS Capability <strong>Service</strong> requirements: Supply – Yes<br />

audio conferencing<br />

desktop video conferencing<br />

collaboration tools<br />

web conferencing<br />

integrated to the desktop to allow support of<br />

meeting up to 500 attendees<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes<br />

System design - Yes<br />

<strong>Service</strong> Levels Available: Foundation<br />

Project management - Yes<br />

Support for equipment - Yes<br />

Commodity and managed service – No<br />

Managed Only<br />

Enhanced


1032<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total<br />

Communications Delivery Methodology to<br />

provide the required <strong>PSN</strong> capability<br />

services.<br />

Further Details<br />

Vodafone supplies, installs and maintains Polycom, Avaya, Cisco and Microsoft desktop audio and<br />

video conferencing equipment using Vodafone Unified Communications <strong><strong>Service</strong>s</strong>, implemented using<br />

Total Communications Deployment Methodology. Vodafone provide the following Web Conferencing<br />

<strong><strong>Service</strong>s</strong>; Vodafone Unified Meeting, Microsoft® Lync Online, Cisco WebEx Web Conferencing, Cisco<br />

WebEx Meeting Center, Adobe Acrobat Connect Pro.<br />

Vodafone’s collaboration toolset are designed to support meetings of less than 500 attendees.<br />

All Web conferencing services integrate data, voice and video content within a standard web<br />

browser so you can conduct real-time meetings over the internet. Vodafone’s collaboration<br />

solutions will support Document Sharing, Support for Microsoft® PowerPoint Animation and<br />

Transitions, Multimedia Content Sharing, Application Viewing, Application Sharing and Desktop<br />

Collaboration with Remote Control, QuickStart Screen, File Transfer, Video and Webcam<br />

support, Multipoint Video Integration, Polling, Record, Edit and Play Back Meetings, Schedule<br />

Meeting Wizard , One-Click Meetings , Auto Play Presentations, Note Taking Panel, Meeting<br />

Transcripts, Floating Icon Tray, Microsoft Office and Outlook / Lotus Notes Integration,<br />

Customised audio pop-up within meeting, Mobile Meetings (IOS, Android, Blackberry),<br />

Localised invitations, Additional language support, Global join, Auto detect browser language,<br />

Time zone interface enhancements, on Call Identification in Participant panel, On Call<br />

Identification reconciliation, Toll & Toll-Free, Conference Access Numbers, Participant Callback,<br />

Active Speaker notification.<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk Support<br />

Hours<br />

Foundation 08:00 – 18:00hrs<br />

Monday – Friday<br />

Enhanced 08:00 – 18:00hrs Every<br />

Day<br />

Tier 1 remote support<br />

desk<br />

<strong>Service</strong><br />

Performance &<br />

Reporting<br />

Web based user<br />

driven service<br />

reporting<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

<strong>Service</strong> Model<br />

Help desk to help<br />

desk<br />

Help desk to help desk


Comprehensive 24Hrs Support<br />

Weekdays<br />

1033<br />

Help desk to help desk<br />

model<br />

Total 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

On Site Level 1 Support<br />

Team<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong><br />

Governance<br />

Lot 1.6 <strong>Service</strong> Description – Vodafone Mobile and Data <strong><strong>Service</strong>s</strong><br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> – Internet<br />

<strong><strong>Service</strong>s</strong>, email and website services, colocation<br />

and hosting and on-line storage.<br />

Help desk to help desk<br />

Help desk to help<br />

desk<br />

Optional end user<br />

service desk or on-site<br />

support models<br />

available<br />

Vodafone’s email and website services offer<br />

standard and professional levels for bandwidth<br />

provision, domain name, FTP access, web<br />

space with simple builder tools.<br />

Deliverables of the <strong>Service</strong> Vodafone will provide Vodafone Mobile and<br />

Data <strong><strong>Service</strong>s</strong> – this includes:<br />

Internet services<br />

email and website services<br />

co-location and hosting for Unified<br />

Communications, Email, and Blackberry<br />

on-line storage for Unified<br />

Communications, Email, and Blackberry<br />

Additional <strong><strong>Service</strong>s</strong>:<br />

Vodafone’s email and website services offer<br />

standard and professional levels for bandwidth<br />

provision, domain name, FTP access, web<br />

space with simple builder tools.


<strong>PSN</strong>/GPS Capability <strong>Service</strong><br />

requirements:<br />

1034<br />

Supply – Yes<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes<br />

System design - Yes<br />

<strong>Service</strong> Levels Available: Foundation<br />

Project management - Yes<br />

Support for equipment - Yes<br />

Commodity and managed service – No.<br />

Managed Only<br />

Enhanced<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total Communications<br />

Delivery Methodology to provide the required<br />

<strong>PSN</strong> capability services.<br />

Further Details<br />

Vodafone Mobile and Data <strong><strong>Service</strong>s</strong> customers will be able to view and share the content from their<br />

account via the web browser of a PC, laptop or netbook in the future; reducing the need to transfer<br />

content from one device to another Vodafone is offering a range of Hosted <strong><strong>Service</strong>s</strong> - Email, Web and<br />

Domain Names to complement our existing products and services. Vodafone also offer Office 365 which<br />

is a hosted, cloud-based IT email and website solution that combines Microsoft’s suite of<br />

communication tools with Vodafone’s telephony and connectivity services which is designed for<br />

organisations with 5-200 employees. Vodafone has formed a strategic partnership with Decho<br />

Corporation, a wholly owned subsidiary of EMC, to develop a range of cloud-based services for<br />

businesses that includes the ability to securely backup work-related or personal digital content from<br />

their computer to a remotely hosted site.<br />

.<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk Support<br />

Hours<br />

Foundation 08:00 – 18:00hrs<br />

Monday – Friday<br />

<strong>Service</strong><br />

Performance &<br />

Reporting<br />

Web based user<br />

driven service<br />

<strong>Service</strong> Model<br />

Help desk to help<br />

desk


Enhanced 08:00 – 18:00hrs Every<br />

Day<br />

1035<br />

Tier 1 remote support<br />

desk<br />

Comprehensive 24Hrs Support<br />

Weekdays<br />

Help desk to help desk<br />

model<br />

Total 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

On Site Level 1 Support<br />

Team<br />

reporting<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong><br />

Governance<br />

Lot 1.7 <strong>Service</strong> Description – Vodafone Internet Security <strong><strong>Service</strong>s</strong><br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> – Security<br />

services, antivirus, email scanning and<br />

filtering, firewalls, intrusion and spyware<br />

detection, authentication and application<br />

sign- on services<br />

Help desk to help<br />

desk<br />

Help desk to help<br />

desk<br />

Help desk to help<br />

desk<br />

Optional end user<br />

service desk or on-site<br />

support models<br />

available<br />

Vodafone’s Secure Remote Access (VSRA) is a<br />

policy based desktop security application that<br />

provides remote worker secures access to<br />

centralised documents held on the organisation’s<br />

internal network. VSRA provides a policy<br />

management platform for Data Leak Prevention by<br />

controlling access policies and configurations for<br />

laptop security and connectivity services.<br />

Deliverables of the <strong>Service</strong> Fixed and Mobile convergence<br />

Single number reach<br />

Single voicemail<br />

Single corporate directory<br />

Full OPEX-based managed service


<strong>PSN</strong>/GPS Capability <strong>Service</strong><br />

requirements:<br />

1036<br />

Supply – Yes<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes<br />

System design - Yes<br />

<strong>Service</strong> Levels Available: Foundation<br />

Project management - Yes<br />

Support for equipment - Yes<br />

Commodity and managed service – No Managed<br />

Only<br />

Enhanced<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total Communications<br />

Delivery Methodology (TCDM) to provide the<br />

required <strong>PSN</strong> capability services.<br />

Further Details<br />

Fixed and mobile convergence delivering the same PBX functionality to desk phone,<br />

softphone and mobile users alike. This provides options for Single number reach – each user<br />

can use their existing fixed geographic or mobile number as their single number. Vodafone<br />

provide a Single voicemail – rather than having to manage separate fixed and mobile<br />

voicemail systems, users will have just one single consolidated voicemail box for all calls. This<br />

can integrate into a Single corporate directory. The service also avoids the need for<br />

smartphone handsets as the integration is performed in the network, there is no need for users<br />

to use specific brands or types of mobile handsets. Users with the most basic mobile handset<br />

can take part in the service.<br />

Full OPEX-based managed service covering design, deployment, management, support and<br />

reporting. Vodafone OneNet Global Enterprise is a managed service where Vodafone provides<br />

a complete solution from design through to support.<br />

Integration with Unified Communications. Vodafone OneNet Global Enterprise can also be<br />

integrated with presence-based messaging, conferencing applications and collaborative tools to<br />

provide a true unified communications experience with mobility at the core. Vodafone OneNet<br />

Global Enterprise will support desktop integration with Microsoft and Lotus Unified<br />

Communications environments, providing click to call and mobile presence integration.


Presence – Vodafone OneNet Global Enterprise allows users to see the status of other users,<br />

allowing them to choose the most appropriate way to communicate. Presence information is<br />

extended out to smart mobile devices, extending collaboration to wherever you are. Integrated<br />

voicemail – to further unify messaging, the user’s voicemail box can be integrated with the<br />

enterprise email system to create a single integrated inbox for email and voicemail messages.<br />

This enables the user to listen, forward and manage voicemail messages as they would email –<br />

termed as the ‘voicemail to mail’ function.<br />

The Vodafone unified communication services are securely hosted in Vodafone network centres<br />

using the Cisco Unified Computing Solution and are virtualised using VMware technology. This<br />

provides a solution to support our customers’ UC requirements in a secure, cost-effective way,<br />

giving maximum flexibility to each customer for provision of their own UC features. The key<br />

benefit derived from this way of deploying UC applications is that each enterprise’s suite of<br />

hosted services can be rapidly deployed and flexibly expanded. The virtualised environment can<br />

also support the latest version of Cisco Unified Communication applications, meaning no<br />

‘feature lag’ when compared to on-premise alternatives.<br />

There are a number of core Cisco components which Vodafone has brought together to deliver<br />

the key features of the service. The technology utilised includes:<br />

Cisco Unified Communications Manager (CUCM) delivering call control for the customer’s<br />

estate<br />

Cisco Unity Connection providing single, integrated subscriber messaging.<br />

Cisco Unified Presence Server adding rich, presence capabilities to end-devices.<br />

Cisco Unified Operation Manager – part of the solution management suite.<br />

1037<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk<br />

Support Hours<br />

Foundation 08:00 – 18:00hrs<br />

Monday – Friday<br />

Enhanced 08:00 – 18:00hrs Every<br />

Day<br />

Tier 1 remote support<br />

desk<br />

Comprehensive 24Hrs Support<br />

Weekdays<br />

<strong>Service</strong><br />

Performance &<br />

Reporting<br />

Web based user<br />

driven service<br />

reporting<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

<strong>Service</strong> Model<br />

Help desk to help<br />

desk<br />

% <strong>Service</strong> Uptime<br />

Target MTBF (active<br />

redundancy)<br />

Target MTTR (time<br />

to restore)<br />

% <strong>Service</strong> Uptime<br />

Target MTBF (active


1038<br />

Help desk to help desk<br />

model<br />

Total 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

On Site Level 1<br />

Support Team<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

Monthly <strong>Service</strong><br />

Review meetings<br />

Monthly <strong>Service</strong><br />

Reports &<br />

Performance<br />

improvement plan<br />

<strong>Service</strong><br />

Governance<br />

Lot 1.8 <strong>Service</strong> Description – Vodafone Application <strong>Service</strong><br />

<strong>PSN</strong> <strong>Service</strong> component <strong>PSN</strong> <strong>Service</strong> element<br />

Communications <strong>Service</strong> – Messaging<br />

<strong><strong>Service</strong>s</strong>, real time information services,<br />

desktop messaging, messaging via email,<br />

SMS, pager and mobile fixed line<br />

telephone.<br />

redundancy)<br />

Target MTTR (time<br />

to restore)<br />

% <strong>Service</strong> Uptime<br />

Target MTBF (active<br />

redundancy)<br />

Target MTTR (time to<br />

restore)<br />

Vodafone’s Application <strong><strong>Service</strong>s</strong> deliver realtime<br />

messaging and control solutions that are<br />

focused on mobile, and remote based users<br />

under its Field Based Management solution<br />

portfolio.<br />

Deliverables of the <strong>Service</strong> Vodafone will provide Vodafone Application<br />

<strong><strong>Service</strong>s</strong> – this includes<br />

<strong>PSN</strong>/GPS Capability <strong>Service</strong><br />

requirements:<br />

messaging services<br />

desktop messaging<br />

messaging via email<br />

SMS<br />

pager and mobile or fixed line telephone<br />

Automated communication<br />

real time information services<br />

Supply – Yes<br />

Installation - Yes<br />

Maintenance – Yes<br />

Technical architecture - Yes


1039<br />

System design - Yes<br />

<strong>Service</strong> Levels Available: Foundation<br />

Project management - Yes<br />

Support for equipment - Yes<br />

Commodity and managed service – Yes<br />

Enhanced<br />

Comprehensive<br />

Total<br />

<strong>Service</strong> Delivery: Vodafone will use our Total Communications<br />

Delivery Methodology to provide the required<br />

<strong>PSN</strong> capability services.<br />

Further Details<br />

Vodafone Application <strong><strong>Service</strong>s</strong>:<br />

Vodafone’s Application <strong><strong>Service</strong>s</strong> are focused on mobile, and remote based users under its Field<br />

Based Management solution portfolio. Field <strong>Service</strong> Management solutions from Vodafone offer a set<br />

of tools to plan, schedule, automate, optimise, dispatch and analyse work activity in the field.<br />

Our solutions are purpose designed for fast deployment, and scalable to allow you to increase<br />

capability or add functionality should your needs change. Field <strong>Service</strong> Management solutions from<br />

Vodafone are fully mobile-enabled and can be deployed across a range of mobile networks on various<br />

handheld devices. Automated communication using multiple messaging platforms with field workers to<br />

allow real-time information and situation management at the point of service delivery, overcoming<br />

traditional time delays and revisits.<br />

Vodafone’s Field based management solution focuses on workflow process automation from<br />

work creation through to completion, resource planning and appointment booking, scheduling<br />

automation and optimisation with street level routing, automated dispatch, seamless<br />

connectivity with field technicians through fully integrated mobile capability which includes web<br />

and application sign on services; messaging services; real time information services; desktop<br />

messaging, GPS tracking and navigation, job tracking and SLA jeopardy management, accurate<br />

parts track-and-trace, timesheet process automation, service intelligence and decision support.<br />

<strong>Service</strong> Tier <strong>Service</strong> Desk<br />

Support Hours<br />

Foundation 08:00 – 18:00hrs<br />

Monday – Friday<br />

<strong>Service</strong> Performance<br />

& Reporting<br />

Web based user<br />

driven service<br />

reporting<br />

<strong>Service</strong> Model<br />

Help desk to help<br />

desk


Enhanced 08:00 – 18:00hrs<br />

Every Day<br />

1040<br />

Tier 1 remote<br />

support desk<br />

Comprehensive 24Hrs Support<br />

Weekdays<br />

Help desk to help<br />

desk model<br />

Total 24Hrs Support<br />

7 Days a week<br />

End User Support<br />

On Site Level 1<br />

Support Team<br />

Monthly <strong>Service</strong> Review<br />

meetings<br />

Monthly <strong>Service</strong><br />

Reports & Performance<br />

improvement plan<br />

Monthly <strong>Service</strong> Review<br />

meetings<br />

Monthly <strong>Service</strong><br />

Reports & Performance<br />

improvement plan<br />

Monthly <strong>Service</strong> Review<br />

meetings<br />

Monthly <strong>Service</strong><br />

Reports & Performance<br />

improvement plan<br />

<strong>Service</strong> Governance<br />

Help desk to help desk<br />

Help desk to help desk<br />

Help desk to help<br />

desk<br />

Optional end user<br />

service desk or on-site<br />

support models<br />

available

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!