F5 Beacon - Application performance - Direct / AWS CPPO
F5 Beacon, a SaaS offering, provides visibility and actionable insights into the health and performance of applications. Driven by an application-centric approach, F5 Beacon empowers leaders and app owners with the right set of visibility, monitoring, and analytics across their entire application portfolio.
Features
- End-to-end app visibility
- Account for all applications irrespective of where they are deployed
- Review the health status of applications
- Gain operations, security, and cost insights
- Single pane of glass
- Ingest telemetry data from different sources, leveraging built-in integrations
- Synthetic testing to track availability and performance characteristics for HTTP-endpoints
- Integration into common DevOps toolchains (such as Ansible)
- Flexible application modeling that aligns with existing environments and standards
Benefits
- Track performance, usage, and billing with detailed reports
- Pay for what you use
- Pricing based on the number of units
- Delivering 99.9 service guarantees with premium 24x7 support from experts
- Multi-cloud service options
- Use an intuitive web interface or APIs
Pricing
£1,000 to £500,000 a licence
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 4 2 0 2 8 1 8 0 6 2 3 1 0 3
Contact
FullProxy Ltd
Chris Templeton / Ewan Ferguson
Telephone: 0141 291 5500
Email: g-cloud@fullproxy.com
Service scope
- Service constraints
- None
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Initial response within 15 minutes
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Please see attached F5 Cloud Services Support Document
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
- Premium Support - 24x7 support availability, Community Support, F5 Cloud Services Resource Center, WebSupport Portal access, Initial response within 15 minutes
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
See attached services doc and also
https://clouddocs.f5.com/cloud-services/latest/f5-cloud-services-Beacon-WorkWith.html - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- No customer data is held
- End-of-contract process
- The contract ends as agreed under the terms and conditions agreed between the customer, the reseller and the supplier.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Please see
https://clouddocs.f5.com/cloud-services/latest/f5-cloud-services-Beacon-WorkWith.html - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- https://clouddocs.f5.com/cloud-services/latest/f5-cloud-services-Beacon-WorkWith.html
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
See API Guidelines Document at:-
https://clouddocs.f5.com/cloud-services/latest/f5-cloud-services-GS-API_Guidelines.html - API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- Other
- Other API automation tools
- Any tool that supports REST API's
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Services are automatically scaled for each user depending on their immediate and on-going needs.
- Usage notifications
- Yes
- Usage reporting
- API
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
-
- Attack events
- Service Health
- Event Category usage
- Attack sources
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- F5 / NGINX / Shape Security
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Our Privacy Shield certification is available at https://www.privacyshield.gov/list. To learn more about the Privacy Shield program, please visit https://www.privacyshield.gov.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Please see
https://portal.cloudservices.f5.com/legal/offerings/DNS/SLA - Approach to resilience
- Please speak to your account manager who can make this available upon request.
- Outage reporting
-
Dashboard - https://status.cloudservices.f5.com/
API
Email
Identity and authentication
- User authentication
- Other
- Other user authentication
- There is no "User" access - just a management portal.
- Access restrictions in management interfaces and support channels
- There is currently only a mangement interface
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International Ltd
- ISO/IEC 27001 accreditation date
- 30/11/2022
- What the ISO/IEC 27001 doesn’t cover
- Undisclosed
- ISO 28000:2007 certification
- Yes
- Who accredited the ISO 28000:2007
- Undisclosed
- ISO 28000:2007 accreditation date
- Undisclosed
- What the ISO 28000:2007 doesn’t cover
- Undisclosed
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- Undisclosed
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- Undisclosed
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Undisclosed
- PCI DSS accreditation date
- Undisclosed
- What the PCI DSS doesn’t cover
- Undisclosed
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- N/A
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Undisclosed
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Undisclosed
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Undisclosed
- Incident management type
- Supplier-defined controls
- Incident management approach
- Undisclosed
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Undisclosed
Social Value
- Fighting climate change
-
Fighting climate change
FullProxy position can be provided upon request - Covid-19 recovery
-
Covid-19 recovery
FullProxy position can be provided upon request - Tackling economic inequality
-
Tackling economic inequality
FullProxy position can be provided upon request - Equal opportunity
-
Equal opportunity
FullProxy position can be provided upon request - Wellbeing
-
Wellbeing
FullProxy position can be provided upon request
Pricing
- Price
- £1,000 to £500,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No