JaaS, JiVS IMP as a service. Hosted Legacy System Retirement as a Service
JaaS enables the retirement of legacy, historical data into a compliant, user accessible managed Data Management platform.
JaaS is a highly scalable service. Your data is managed with JiVS with a high-level of security and acces to the data. You only pay for what you use, supporting full budgetary certainty.
Features
- Flexible resource provisioning
- Fast provisioning of resources
- Highest level of security
- Backup & recovery included
- Professional Administration & Application Management
- Defined Service Level Objectives
- Single point of contact
- Service and application support
- Use of support ticketing service
- Easy adoption of new features and technologies
Benefits
- Minimal cost for running JiVS IMP
- Low complexity and minimum infrastructure required
- Data stored securely, protected against loss
- Enables the customer to focus on core business objectives
- Predictable and transparent cost calculations
- Flexible resource and capacity management
- Fast adoption of required resources minimising capacity bottlenecks
Pricing
£3,725 a licence a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 8 4 4 0 2 3 8 6 1 6 8 9 8 1
Contact
Resulting Ltd
Robbert Willemse
Telephone: +44 1925 906 662
Email: Hello@resulting-it.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Hosting service is provided as an add-on to the system retirement/migration and rightsizing project
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
-
Possible operating hours: Monday-Friday 24x7
Availability: 98%
Planned Maintenance Windows: Max. 6 scheduled downtimes p.a.
Unscheduled Downtime per Month: 6 Hours
RTO: 6 Days
RPO: 24 Hours - System requirements
-
- JiVS IMP software must be licensed separately
- Valid maintenance / cloud agreement is mandatory for this service
- JiVS IMP Web Application runs in the browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support Levels:
Confirmation: 2 business days for critical and 5 business days for all other issues
Assessment: +1 business day for critical and +2 business days for all other issues
Start of Work: +1 business day for critical and case by case for all other issues
Support Hours: 8:00-12:00am and 13:00-17:00pm CET
Business Day Calendar: Switzerland (Canton of Thurgau) - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Self-Service: Manuals & Documentation
1st & 2nd Level Support: Issues are raised via an online ticketing system (or email). Cases are handled by internal specialists, typically with knowledge of the customer and a customers project / implementation. Support is provided by email or phone.
3rd Level Support can be engaged by 2nd Level Support if required.
The costs depend on the respective support agreement. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
End User training is provided online in a 2h session on the customers system. A documentation and manuals are provided.
JaaS is provided to users following an initial implementation project which includes ingestion of data from legacy and operational systems, configuration of the extensive library of business objects to facilitate easy access for the users, UAT testing, remote user training with documentation and go-live. Access for the users to data will depend on individual user's roles, rights and authority. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The JaaS service is based on JiVS IMP's use of an MS SQL relational Database. This means that at the end of the contract, the data would be available for extraction into another database for the user (with appropriate access rights) to move to a database of their choice.
- End-of-contract process
-
This service includes:
- Data and application management
- Infrastructure and provisioning management
- Security Management
- Backup & Disaster Recovery Management
- Support desk, single point of contact, ticketing service
Adittional Costs:
- Additional End User Training & Documentation
- Retirement of additional data sources
- Configuration of additional Business Views, Reports & Searches
- Training for Super users, who can then:
~ Train users
~ Configure additional Business Views, Reports & Searches
~ Develop Data Retention and Deletion rules based on the Customer's Corporate Data Retention Policies
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Via a browser on the mobile
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- HTML
- Accessibility standards
- None or don’t know
- Description of accessibility
- Via the browser
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
The API offers functionality for the user management (get/create/edit/delete role, get/create/edit/delete users, …)
Data and documents stored in JiVS IMP can be searched and retrieved.
The API offers functionality to export application and user logs. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Access to data stored in JiVS IMP can be configured by the users (saved search queries and displayed data).
Admin users get access to the user management where roles and access rights can be created and configured.
The masking of data can be configured by users with respective rights.
Scaling
- Independence of resources
- The service is either hosted in a private cloud, a single-tenant public cloud with fixed ressources or on-premise.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
JiVS IMP provides full audit logs of all data searches performed by the users.
Metrics regarding the access of individual archived systems are provided. - Reporting types
- API access
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Data Migration International (DMI)
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
The security of the data center is guaranteed by the provider (e.g. MS Azure).
Data at rest can also be encrypted at database level. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Users with appropriate rights can export data to XLS, PDF and/or CSV files. Exports are triggered or configured in the JiVS IMP Web Application based on a user's search results.
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Certified SAP connectors
- JDBC
- XLS
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Possible Operating Hours: Monday - Sunday 24x7
Availability: 98%
Planned Maintenance Windows: Max. 6 scheduled downtimes p.a.
Unscheduled Downtime per Month: 6 Hours
RTO: 6 Days
RPO: 24 Hours - Approach to resilience
-
Depending on the cloud environment (private cloud vs. single-tenant public cloud) and the agreed service level objectives, different resilience options are available.
More information is available on request. - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- LDAP integration possible
- Access restrictions in management interfaces and support channels
- Depending on the customers requirements, access restrictions for the application management and support can be established.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SV Cert Group
- ISO/IEC 27001 accreditation date
- First Issue Date: May 2019 Last Renewal: January 2024
- What the ISO/IEC 27001 doesn’t cover
- Anything outside of the following scope: Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems for DMIs and associated offices IT services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 27701:2019 (renewed in December 2023)
- ISO/IEC 27001:2022 (renewed in January 2024)
- ISO/IEC 27017:2015 (renewed in December 2023)
- Penetration test of the software solution
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO/IEC 27701, ISO/IEC 27017
- Information security policies and processes
- ISO/IEC 27001 lays out normative requirements applicable to the development and operation of the ISMS (Information Security Management System). In order to implement the ISMS, DMI has created a 'Security Officer' ombudsman position, that is responsible for creating uniform rules for information security and risk management procedures; for adequately sensitizing all employees to the various aspects and the importance; as well as for adequately monitoring compliance with all security policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
JiVS IMP is a highly standardized product where developments to fulfill specific customer requirements enhance the standard software solution.
Changes to the software are assessed prior. Development is done internally and follows DMIs security guidelines. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
To ensure full control and to assure the JiVS security standards, software development takes place entirely in-house.
As part of the development teams DMI employees have trained security experts who define guidelines for secure development and ensure proper implementation. The technologies used are managed and monitored so that the software solution can be patched immediately in the event that security risks or vulnerabilities are identified.
Additionally, the software solutions are regularly penetration tested by external parties. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Used technologies are actively managed and monitored. If security risks or vulnerabilities are identified, software patches are developed with appropriate urgency.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Processes and report templates are provided.
Responsibilities and lines of communication are defined.
Reports are discussed are reviewed with management.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
Fighting climate change
JiVS IMP offers a comprehensive suite of features designed to minimize environmental IT footprint while maximizing operational efficiency. From reducing data volumes and energy consumption to ensuring legal compliance and security. JiVS IMP empowers organizations to align their data practices with their sustainability goals.
Additionally, DMI supports and engages in projects and activities such as beach cleaning days to protect the environment and ecosystems.Covid-19 recovery
JiVS IMP is designed to significantly reduce IT operating costs (80% and more proven in customer projects) by decomissioning legacy IT systems while remaining fully compliant. The reduced costs and reduced complexity in the system landscape contribute greatly to ensuring a sustainable and secure future for companies.Equal opportunity
DMI supports and engages in various activities to support local and international communities, such as funding Plus Sport (to help people with disabilities take part in a variety of sporting activities), or by supporting young talents in their education and initial career steps.
Pricing
- Price
- £3,725 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- No