Opentext Micro Focus Application Delivery Management on Micro Focus SaaS
Application development and testing tools help you plan, develop, test, release, and monitor for continuous delivery of superior user journeys.
Components are hosted on Micro Focus SaaS service. Required services/products can be selected from the portfolio. Other licensing structures for private cloud deployment available as required.
Features
- Migration services from on premise,SaaS,other service providers
- Enterprise Agile Lifecycle Management & Visibility (ALM Octane)
- Enterprise DevOps (ALM, ALM Octane, QC, Quality Center, RC, DA)
- Functional Testing (UFT, UFT Developer, UFT Mobile)
- Performance & Load Testing (LoadRunner Professional, Enterprise and Cloud)
- Mobile Testing (UFT Mobile)
- Project & Portfolio Management (PPM)
- Deployment Automation (ALM, ALM Octane, Quality Center, DA)
- Change & Configuration Management (Dimensions CM)
Benefits
- Achieve application availability and performance that meet business expectations
- Improved user support
- Use methodology to deliver software at speed and quality
- No need to maintain rarely used skill sets
- Access to detailed tool knowledge and support
- Centralised planning and control for entire software release lifecyle
- Connect Dev and Ops by automating the deployment pipeline
- Automated fuctional mobile testing that replicates end user experience
- Powerful, realistic load, stress, and performance testing at enterprise scale
- Standardise and manage project and portfolio activities for real-time decisions
Pricing
£50 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 1 1 9 9 4 8 4 6 3 0 4 2 0 6
Contact
IOCO SOLUTIONS LIMITED
Mick Morey
Telephone: 0118 206 2938
Email: michael.morey@ioco.tech
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- For iOCO and MF SaaS hosted applications, weekly and monthly maintenance windows are in place to allow for security and application fixes to be applied.
- System requirements
-
- Internet Access
- Web Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Severity 1 (Critical Service Incident) - Within 1 hour
Severity 2 (Critical Service Incident) - Within 2 hour
Severity 3 (Non-Critical Service Incident) - Within 4 business hours Severity 4 (Minor Support Request) - Within 1 business day or see service catalogue - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide a service desk to log incidents and support requests. Calls are prioritised based on severity and assigned accordingly. 4 Levels of severity is classified. The service included 3 levels of support engineers cloud-
based on skill level (i.e 1st , 2nd and 3 rd level support ) as well as a vendor escalation process.We provide a client account manager and a cloud architect, as well as Service delivery manager where appropriate. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- There is extensive online documentation and training can be quoted on request.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data is not owned by the provider and can be extracted at anytime by the customer. Customer requirements for the data extraction will be agreed prior to completion of the contract.
- End-of-contract process
- Customer has 30 days from expiry of contract to extract all required data. This is commonly done via FTP site, details to be discussed prior to end of contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- The Service Interface is Application dependent - check documentation for details.
- Accessibility standards
- None or don’t know
- Description of accessibility
-
For Micro Focus software applications only:
Works diligently to ensure that the user interfaces of all of its products are designed to make product functionality accessible to people with physical, sensory, or cognitive disabilities. This is in conformance with the Section 508 amendment to the United States Workforce Rehabilitation Act and required by the Federal Acquisition Regulation (FAR). Detailed information on conformance of any Micro Focus product to Section 508 requirements is provided in a standardized form called a Voluntary Product Accessibility Template (VPAT) which is available from Micro Focus upon request. - Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Application dependent - Rest API are accessed via an API only user / user with sufficient permissions to perform task.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Adding custom code There are business rules and flows that can be developed and/or edited
Scaling
- Independence of resources
-
Applications are built to certain sizing guidelines, and where allowed, underlying infrastructure can be expanded on demand.
24/7 monitoring / alerting in place.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Application dependent - license usage metrics can be provided for tools where available.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Micro Focus Software as a Platinum SaaS and Support Partner
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Application dependent - check documentation for details.
Usually by csv, excel, API.
Raise support request for bespoke data request (e.g. SQL query) - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- XML
- HTML
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- Other
- Other protection within supplier network
- Each customer in iOCO Cloud is provided with their own dedicated network, that terminates on their own dedicated firewall.
Availability and resilience
- Guaranteed availability
-
IOCO hosted applications only: SLA 99.9% availability.
If service fails to meet this key objective in a given calendar month 5% of prorated monthly cloud service fee will be refunded directly to the customer account within 30 days.
MF SaaS hosted applications:
We provide Customer access to the Software-as-a-Service production application on a twenty-four hour, seven days a week (24x7) basis at a rate of 99.9 % (“SaaS Service Uptime Metric”). - Approach to resilience
-
Data Centres have a high resilience setup:
• Highly secure, Tier 4 data centres environment
• Dual power circuits with UPS
• Backup power generators
• Constant environmental monitoring
• Dual network and redundant data fabric
• Software-defined storage services
• Converged and hyper-converged infrastructure
• On-going capacity planning Application is built upon a containerised architecture. This is able to redeploy services on available hardware if it senses that an issue has occurred. - Outage reporting
- Email alerts, public dashboard can be made available on demand.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Can be linked to customer LDAP or ADFS where application and customer can allow.
- Access restrictions in management interfaces and support channels
- Restricted and vetted named users are allowed administrative access to the application management areas.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Can be linked to customer LDAP or ADFS where application and customer can allow.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The change management processes follow ISO27001 A.12.1.2 controlled mechanism for making changes to operational environments.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The change management processes follow ISO27001 A.12.1.2 controlled mechanism for making changes to operational environments.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We subscribe to multiple vendor provided vulnerability notification services. All vulnerabilities are reviewed and applicable patches are administered through the change control process . Mitigation measures will always be considered first, with critical patches targeted for resolution within 30 days.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Denial of Service is applied on all Internet links , with Intrusion detection\protection available to customers on request.
All security events are logged\notified based on severity. Any attempted platform security compromises are dealt with 24/7 by security engineers. The responsibility remains with the customer to ensure detected intrusions are re-mediated where customers have control, permission, or access to modify their service. iOCO recommends that customers follow security best practices including, but not limited to:
• Maintaining effective firewall rules
• Limiting the communication ports to only the necessary, for conducting business
• Locking down access - Incident management type
- Supplier-defined controls
- Incident management approach
- The incident response process complies with industry standards for legally admissible chain-of-custody and forensic data collection management processes and controls. Response standards, procedures, and methods are implemented based on the severity level of an incident. Incident reports are produced as part of standard post incident process and provided to customers on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
As this offering is a hosted cloud solution and can sit either on premise, in a private or a public cloud, the solution can adhere to the sustainability policy of the environment on which it is hosted. These would typically be in line with either the UK Government policy in the case of on-premise or the public or private cloud providers, which will all have their own sustainability and GreenOps targets that they adhere to.
Pricing
- Price
- £50 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Due to the variety of applications and hosting options, free trials can be requested on demand.