Skip to main content

Help us improve the Digital Marketplace - send your feedback

Resulting Ltd

JaaS, JiVS IMP as a service. Hosted Legacy System Retirement as a Service

JaaS enables the retirement of legacy, historical data into a compliant, user accessible managed Data Management platform.
JaaS is a highly scalable service. Your data is managed with JiVS with a high-level of security and acces to the data. You only pay for what you use, supporting full budgetary certainty.

Features

  • Flexible resource provisioning
  • Fast provisioning of resources
  • Highest level of security
  • Backup & recovery included
  • Professional Administration & Application Management
  • Defined Service Level Objectives
  • Single point of contact
  • Service and application support
  • Use of support ticketing service
  • Easy adoption of new features and technologies

Benefits

  • Minimal cost for running JiVS IMP
  • Low complexity and minimum infrastructure required
  • Data stored securely, protected against loss
  • Enables the customer to focus on core business objectives
  • Predictable and transparent cost calculations
  • Flexible resource and capacity management
  • Fast adoption of required resources minimising capacity bottlenecks

Pricing

£3,725 a licence a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Hello@resulting-it.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 8 4 4 0 2 3 8 6 1 6 8 9 8 1

Contact

Resulting Ltd Robbert Willemse
Telephone: +44 1925 906 662
Email: Hello@resulting-it.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Hosting service is provided as an add-on to the system retirement/migration and rightsizing project
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Possible operating hours: Monday-Friday 24x7
Availability: 98%
Planned Maintenance Windows: Max. 6 scheduled downtimes p.a.
Unscheduled Downtime per Month: 6 Hours
RTO: 6 Days
RPO: 24 Hours
System requirements
  • JiVS IMP software must be licensed separately
  • Valid maintenance / cloud agreement is mandatory for this service
  • JiVS IMP Web Application runs in the browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support Levels:
Confirmation:  2 business days for critical and 5 business days for all other issues
Assessment: +1 business day for critical and +2 business days for all other issues
Start of Work: +1 business day for critical and case by case for all other issues
Support Hours: 8:00-12:00am and 13:00-17:00pm CET
Business Day Calendar: Switzerland (Canton of Thurgau)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Self-Service: Manuals & Documentation
1st & 2nd Level Support: Issues are raised via an online ticketing system (or email). Cases are handled by internal specialists, typically with knowledge of the customer and a customers project / implementation. Support is provided by email or phone.
3rd Level Support can be engaged by 2nd Level Support if required.
The costs depend on the respective support agreement.
Support available to third parties
No

Onboarding and offboarding

Getting started
End User training is provided online in a 2h session on the customers system. A documentation and manuals are provided.
JaaS is provided to users following an initial implementation project which includes ingestion of data from legacy and operational systems, configuration of the extensive library of business objects to facilitate easy access for the users, UAT testing, remote user training with documentation and go-live. Access for the users to data will depend on individual user's roles, rights and authority.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The JaaS service is based on JiVS IMP's use of an MS SQL relational Database. This means that at the end of the contract, the data would be available for extraction into another database for the user (with appropriate access rights) to move to a database of their choice.
End-of-contract process
This service includes:
- Data and application management
- Infrastructure and provisioning management
- Security Management
- Backup & Disaster Recovery Management
- Support desk, single point of contact, ticketing service

Adittional Costs:
- Additional End User Training & Documentation
- Retirement of additional data sources
- Configuration of additional Business Views, Reports & Searches
- Training for Super users, who can then:
~ Train users
~ Configure additional Business Views, Reports & Searches
~ Develop Data Retention and Deletion rules based on the Customer's Corporate Data Retention Policies

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Via a browser on the mobile
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
HTML
Accessibility standards
None or don’t know
Description of accessibility
Via the browser
Accessibility testing
None
API
Yes
What users can and can't do using the API
The API offers functionality for the user management (get/create/edit/delete role, get/create/edit/delete users, …)
Data and documents stored in JiVS IMP can be searched and retrieved.
The API offers functionality to export application and user logs.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Access to data stored in JiVS IMP can be configured by the users (saved search queries and displayed data).
Admin users get access to the user management where roles and access rights can be created and configured.
The masking of data can be configured by users with respective rights.

Scaling

Independence of resources
The service is either hosted in a private cloud, a single-tenant public cloud with fixed ressources or on-premise.

Analytics

Service usage metrics
Yes
Metrics types
JiVS IMP provides full audit logs of all data searches performed by the users.
Metrics regarding the access of individual archived systems are provided.
Reporting types
API access

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Data Migration International (DMI)

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
The security of the data center is guaranteed by the provider (e.g. MS Azure).
Data at rest can also be encrypted at database level.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users with appropriate rights can export data to XLS, PDF and/or CSV files. Exports are triggered or configured in the JiVS IMP Web Application based on a user's search results.
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • Certified SAP connectors
  • JDBC
  • XLS

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Possible Operating Hours: Monday - Sunday 24x7
Availability: 98%
Planned Maintenance Windows: Max. 6 scheduled downtimes p.a.
Unscheduled Downtime per Month: 6 Hours
RTO: 6 Days
RPO: 24 Hours
Approach to resilience
Depending on the cloud environment (private cloud vs. single-tenant public cloud) and the agreed service level objectives, different resilience options are available.
More information is available on request.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
LDAP integration possible
Access restrictions in management interfaces and support channels
Depending on the customers requirements, access restrictions for the application management and support can be established.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
SV Cert Group
ISO/IEC 27001 accreditation date
First Issue Date: May 2019 Last Renewal: January 2024
What the ISO/IEC 27001 doesn’t cover
Anything outside of the following scope: Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems for DMIs and associated offices IT services.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO/IEC 27701:2019 (renewed in December 2023)
  • ISO/IEC 27001:2022 (renewed in January 2024)
  • ISO/IEC 27017:2015 (renewed in December 2023)
  • Penetration test of the software solution

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO/IEC 27701, ISO/IEC 27017
Information security policies and processes
ISO/IEC 27001 lays out normative requirements applicable to the development and operation of the ISMS (Information Security Management System). In order to implement the ISMS, DMI has created a 'Security Officer' ombudsman position, that is responsible for creating uniform rules for information security and risk management procedures; for adequately sensitizing all employees to the various aspects and the importance; as well as for adequately monitoring compliance with all security policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
JiVS IMP is a highly standardized product where developments to fulfill specific customer requirements enhance the standard software solution.
Changes to the software are assessed prior. Development is done internally and follows DMIs security guidelines.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
To ensure full control and to assure the JiVS security standards, software development takes place entirely in-house.
As part of the development teams DMI employees have trained security experts who define guidelines for secure development and ensure proper implementation. The technologies used are managed and monitored so that the software solution can be patched immediately in the event that security risks or vulnerabilities are identified.
Additionally, the software solutions are regularly penetration tested by external parties.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Used technologies are actively managed and monitored. If security risks or vulnerabilities are identified, software patches are developed with appropriate urgency.
Incident management type
Supplier-defined controls
Incident management approach
Processes and report templates are provided.
Responsibilities and lines of communication are defined.
Reports are discussed are reviewed with management.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Equal opportunity

Fighting climate change

JiVS IMP offers a comprehensive suite of features designed to minimize environmental IT footprint while maximizing operational efficiency. From reducing data volumes and energy consumption to ensuring legal compliance and security. JiVS IMP empowers organizations to align their data practices with their sustainability goals.
Additionally, DMI supports and engages in projects and activities such as beach cleaning days to protect the environment and ecosystems.

Covid-19 recovery

JiVS IMP is designed to significantly reduce IT operating costs (80% and more proven in customer projects) by decomissioning legacy IT systems while remaining fully compliant. The reduced costs and reduced complexity in the system landscape contribute greatly to ensuring a sustainable and secure future for companies.

Equal opportunity

DMI supports and engages in various activities to support local and international communities, such as funding Plus Sport (to help people with disabilities take part in a variety of sporting activities), or by supporting young talents in their education and initial career steps.

Pricing

Price
£3,725 a licence a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Hello@resulting-it.com. Tell them what format you need. It will help if you say what assistive technology you use.