Qsome
Qsome gives you peace of mind by helping you ship bug-free software by exploiting cloud-based automated software testing. Our test automation efforts have helped clients reduce application testing time from 4 weeks to 2 days. Our customers also see an average reduction in bugs in production of 72%.
Features
- Cross-browser, cross-device and desktop application testing
- Test analytics
- Automated software testing
- Test management
- Risk-based software testing
- Video logs and screenshots of automated tests
- Downloadable PDF reports
- Defect management
- Code-less test execution
- Continuous testing through APIs with CICD pipelines
Benefits
- Test end-to-end user journeys across multiple applications
- Test end-to-end user journeys across multiple browsers & devices
- Two-click test execution
- Reduce software testing time from weeks to hours
- Reduce defect leakage (bugs-in-production) by an average of 72%
- Faster & cheaper maintenance of automated tests
- Faster bug fixing by using video logs and screenshots
Pricing
£1,196 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 3 6 7 3 8 5 5 7 6 5 4 7 1 2
Contact
Audacix
Ayush Trivedi
Telephone: +442034114974
Email: solutions@audacix.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Software, mobile app, ERP development and deployment services.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Qsome is used for functional test automation, not for load or performance testing. With the Qsome solution we can provide the cloud-based/on-premise testing tool as well as the services to build and maintain your automated test suite.
- System requirements
-
- Chrome or Firefox browser
- Internet access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Within 1 business day for standard support clients.
WIthin 30 minutes for premium support clients. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard support is a feature of all Qsome agreements and includes:
- Email & Slack communication
- 9am to 5pm BST on Monday to Friday, excluding public holidays
- Responses within 1 business day
Premium support incurs an additional cost of approximately £2697 per month and includes:
- Support provided through email, Slack, phone & video conferencing
- 3 offshore person days per monthly billing cycle to maintain automated scripts (cannot be used for new scripts, datasets or models)
- Support available 9am to 5pm BST on Monday to Friday, excluding public holidays
- Triage within 60 mins during business hours
- Prioritised implementation within next sprint, if possible, for new feature requests
- Customer success manager - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- On-site training, online training videos and user documentation, training through video conferencing.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- By downloading the java-based test automation scripts.
- End-of-contract process
- All test artefacts created during an agreement term belong to the client. This information is fully accessible for the duration of the agreement and for up to 14 days after the agreement ends. There is no additional cost to accessing this information.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- User interface modified for smaller viewports.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- APIs to execute tests, retrieve results, check batch status. Users cannot create their own APIs, but such requests are prioritised when mutually agreed with clients.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Users can decide the number of nodes they wish to deploy and the number of test engineers they require when building and maintaining their automated regression suites.
Scaling
- Independence of resources
-
1. For government clients we use single-tenant environments, so useage by other clients will never affect the performance of other environments.
2. For all our environments, we have load balancing combined with auto-scaling to ensure that performance levels are not impacted by peak loads.
3. We conduct exhaustive performance testing prior to each of our releases to ensure that performance regressions are not introduced with a new release.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Number of tests performed, number of defects open, test success rate by age, time taken to run tests + many other analytics
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- By downloading java files, PDF files and CSV files.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- .java
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- MP4
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We guarantee 99.9% uptime. Users will receive a pro-rata service credit on a monthly basis if this SLA is not achieved for a given month. Our SLA can be viewed in full here: https://www.audacix.com/p/saas-service-level-agreement.html
- Approach to resilience
- We use AWS and Google Cloud services for our datacentre needs. These providers are considered best-in-class in terms of service resiliency. As far as our application and network is concerned, we maintain best-in-class resilience by combining best practice backup, disaster recovery, traffic routing and application architecture practices to deliver a service that conforms to our stated SLAs.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Access to management interfaces is restricted using strict user role and user access policies as well as whitelisting of approved email domains. These controls are tested for vulnerabilities during each external penetration test.
Access to support channels is restricted by username and password mechanisms as well as whitelisting of approved email domains. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 30/04/2019
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
We follow documented information security policies that comply with ISO27001. The Board of Directors give overall strategic direction by approving and mandating the information security principles but delegate operational responsibilities for physical and information security to the CEO and chief architect. These principles and policies are reviewed at least annually.
Our CEO and chief architect are responsible for coordinating and directing our security framework, including the information security controls.
Our managers have KPIs to ensure the day-to-day implementation of the information security policy manual and ensuring that suitable technical, physical and procedural controls are in place in accordance with the manual, and are properly applied and used by all workers.
All team members are responsible for complying with the principles and policies in the information security policy manual, where relevant to their jobs. They are responsible for maintaining the security of all information entrusted to them. Each worker, as a condition of employment, undertakes to comply with our information security policies. Any worker failing to comply with the security policies could be subject to disciplinary action, potentially including termination of employment or contract and/or prosecution.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We have adopted and implement lean change management processes that strike an effective balance between speed and flexibility. All changes to our application are submitted, amended, discussed, approved and implemented using our various development management tools.
Our configuration management process follows a similar path but allow for more consultation with our client base, where the configuration change is the result of client feedback.
All changes made to our software products are assessed for security risks starting from the design phase, through to delivery. Our security policies are detailed here: https://www.audacix.com/p/security-practices.html - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We conduct regular vulnerability assessments, internal penetration testing and external penetration testing using accredited partners. Vulnerability assessments start from the design phase where our team assesses potential threats of new or amended features.
Critical patches are deployed at the earliest, usually within a few hours, depending on the scope of the change. Non-critical patches are deployed with the next release at the end of the current sprint.
Our development team and internal security team constantly monitors vulnerability databases for those relevant to our tech stack. We also receive up-to-date information from our external security partners. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We use enterprise-grade SIEM tools for protective monitoring of our cloud and application environment. Our security policy details steps that our teams undertake to triage, quantify, isolate and remedy potential compromises.
Our security policies require us to prioritise the patching of security vulnerabilities. Generally, critical vulnerabilities are patched within hours, depending on the scope of the vulnerability and the patch.
Automated alerts allow us to respond to critical alerts within 30 minutes. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
In the event of a security breach, we will promptly notify you of any unauthorised access to your data. We have incident management policies and procedures in place to handle such an event and all our team members are trained in how to handle such breaches.
Further, in the event of a breach our processes dictate that all internal and externally contracted subject matter experts will be mobilised to triage the breach, help patch affected areas and work with our teams to ensure that the probability of future breaches is minimised.
Users can report incidents to us by emailing security@audacix.com
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We understand that the actions and inactions of our firm will have an impact on the ability of our environment to support current and future generations. This impact can be positive or negative, but it is rarely neutral.
Our company is committed to promoting the conservation and re-use of consumable materials, such as paper in reports and to support the use of renewable energy sources, where possible.
Key principles include:
• Minimise waste by evaluating operations and ensuring they are as efficient as possible.
• Minimise toxic emissions through the selection and use of low-emission, high mileage rental cars.
• Promote rechargeable batteries wherever possible.
• Actively promote recycling both internally and at our clients’ locations.
• Meet or exceed any environmental legislation that relates to our firm.
• Utilise all opportunities to suggest actions that will help minimise our environmental footprint. - Equal opportunity
-
Equal opportunity
Audacix is committed to the values of equal opportunity, diversity, equity
and inclusion. Our dedicated leadership team actively works to advance equity, racial justice, and equal opportunity for all employees and applicants. We do so by rooting out systemic racism and gender inequality, while building trust within and outside of our organisation. We must hold ourselves accountable toward meeting these goals. A workplace which is fair and free from unlawful discrimination and harassment is more productive and better able to meet its business goals. Accordingly, our Equal Employment Opportunity (EEO) policy sets out employment practices that are designed so that existing and potential employees are able to compete for, or be awarded, employment, promotions, transfers, training and other employment related benefits on their merits without reference to personal characteristics.
Pricing
- Price
- £1,196 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- The free trial period is a proof-of-concept period. During this time you can experience the benefits of our Qsome test automation solution as it is used to test your software. We offer both the Qsome testing tool & our test automation services during this PoC.