BMC Helix Control-M
BMC Helix Control-M integrates, automates, and orchestrates application and data workflows across complex and changing technology ecosystems. It simplifies workflow complexity and delivers a single end-to-end enterprise view from on-premises to the cloud, with interfaces for developers, IT operations, and business users.
Features
- Build, monitor and manage batch workflows from a single point
- Monitor workflows in real time, identify and troubleshoot workflow errors
- Pre-define scheduling calendars, resources, events, and variables
- Receive real-time warnings on potential or actual workflow SLA breaches
- Run scripts or commands on UNIX, Linux, or Windows OS
- Transfer files between physical servers, virtual machines, and the cloud
- Run jobs on SAP R3 and Business Warehouse
- Define Stored Procedure, SQL Script, SSIS Package, and Embedded Queries
- Run tasks in your Big Data Hadoop cluster
- Control-M benefits the whole organisation — developers, operations, business users
Benefits
- Reduce costs and improve service delivery
- Identify and resolve issues faster with historical data
- Improve visibility and control by integrating file transfers
- Improve critical app services by designing custom job types
- Reduce storage and infrastructure costs
- Reduce time to launch new applications with Jobs-as-Code
- Reduce personnel onboarding time
Pricing
£20,000 an instance a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 4 8 1 0 9 7 6 0 5 1 1 7 1 9
Contact
Tekwurx Limited
Keith Pound
Telephone: +44 208 148 3717
Email: keith@tekwurx.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
The BMC SaaS Operations team provides operation and management of BMC Helix Control-M services 24 hours a day, 7 days a week.
https://docs.bmc.com/docs/ctmhelix/service-levels-and-support-hours-964536235.html - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
The BMC SaaS Operations team provides operation and management of BMC Helix Control-M services 24 hours a day, 7 days a week. There is no additional cost.
Support level details: https://docs.bmc.com/docs/ctmhelix/service-levels-and-support-hours-964536235.html - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Tekwurx has extensive experience in architecting and deploying Control-M solutions, from single installations covering a few hundred jobs through to large multi-region organisations. We focus on delivering the highest quality project for each and every client.
A typical engagement consists of:
- Initial discussion to understand the basic requirements
- Review the “as-is”
- Follow-up discussion to clarify details and agree on the scope and estimated project fees
- Deliver an in-depth workshop to better understand the details, develop the design and agree on all major elements of the project deliverables
- Produce the architecture design
- Deploy agreed design
- Undertake UAT testing and production deployment
- Create build and configuration documentation
- Provide knowledge transfer and training sessions
- Work with the customer on initial BAU remediation activities
- Provide on-going support - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Tekwurx will provide build documentation in the customer's required format
- Microsoft Word
- End-of-contract data extraction
- Data may be extracted into CSV or XML format to import into other scheduling systems
- End-of-contract process
-
There is no end of contract activity built into the price.
Tekwurx will be pleased to assist migrating data out of Control-M if required as a costed exercise
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Simplified Self-Service option for users
Simplified option for Operators to check on job progress and perform remediation actions - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Accelerate the deployment of digital services by building and deploying workflows in code.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- The BMC Helix Control-M architecture provides scalability and is used by organisations that run tens of thousands of jobs each day. Customers exceeding 50,000 executions in a single day will be required to purchase an additional production instance to accommodate this volume.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The statistics and reporting utilities generate and display various statistics.
By including a utility command in the command line of a job processing definition, you can run the utility at a predetermined time or under a predetermined set of conditions without being present. - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- BMC Software
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- There are many ways in which data can be exported, depending on user permissions. For instance, you can export job and folder definitions, which enables you to save your definitions as an XML file, and later import them to another environment. You can also use the Job and Folder File Editor tool to transfer job and folder definitions in a Workspace between environments. Exports are initiated using menu-driven commands or via the command-line interface.
- Data export formats
-
- CSV
- Other
- Other data export formats
- XML
- Data import formats
- Other
- Other data import formats
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- Not applicable
Availability and resilience
- Guaranteed availability
-
BMC commits to a specific service level agreement (SLA) for availability for its services, with penalties if the agreement is breached. The target availability SLA for Helix Control-M is 99.95% for production environments and 99.9% for non-production environments.
https://docs.bmc.com/docs/ctmhelix/bmc-helix-control-m-availability-policy-964536241.html - Approach to resilience
- This is a function of the Cloud provider
- Outage reporting
- This is a function of the Cloud provider
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
As part of the logging in process, Control-M components send user name and password information to Control-M/Server components for authentication. You can define security permissions for every Control-M component to ensure maximum security. For every Control-M component you can define the following:
- Authorization security: Defines which users are allowed to view and which operations (including data modification) that users can perform. At the Control-M/EM and Control-M/Server levels, you can define security for individual users and for groups.
- Authentication security: Defines run as user authentication for Control-M/Agent - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Please refer to the selected Cloud provider for details
- ISO/IEC 27001 accreditation date
- Please refer to the selected Cloud provider for details
- What the ISO/IEC 27001 doesn’t cover
- Please refer to the selected Cloud provider for details
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- Please refer to the specified Cloud provider
- CSA STAR certification level
- Level 5: CSA STAR Continuous Monitoring
- What the CSA STAR doesn’t cover
-
Please refer to the selected Cloud provider for details
AWS: https://aws.amazon.com/compliance/csa/ - PCI certification
- Yes
- Who accredited the PCI DSS certification
- Please refer to the selected Cloud provider for details
- PCI DSS accreditation date
- Please refer to the selected Cloud provider
- What the PCI DSS doesn’t cover
- Please refer to the Cloud provider for details https://aws.amazon.com/compliance/pci-dss-level-1-faqs/
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Please refer to the selected Cloud provider for details
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- This is a function of the Cloud provider
- Information security policies and processes
-
The Product Security Group at BMC is responsible for upholding BMC's corporate standards of quality, especially as those standards relate to defining, evangelizing, and measuring all aspects of security within all product line development lifecycles. BMC has a governing policy, metrics, and guidelines for ensuring that all BMC products meet security standards.
More details here: https://docs.bmc.com/docs/security/a-holistic-approach-to-bmc-product-security-851061458.html
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- This is a function of the Cloud provider
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
BMC welcomes input on potential vulnerabilities from all sources
Our team follows a formal escalation process for vulnerability disclosure regardless of their source—customers, researchers, internal QA teams, or others.
Based on the severity, the vulnerability is routed through senior management, remediated by the relevant development team, and communicated to affected customers.
More details here: https://www.bmc.com/corporate/trust-center/vulnerability-disclosure.html - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Identifying a problem before it impacts service is critical to outage avoidance. BMC has extensive monitoring capabilities in place to proactively monitor performance for the production instances through use of its own tools.
More details here: https://docs.bmc.com/docs/helixsubscriber/system-monitoring-826833345.html - Incident management type
- Supplier-defined controls
- Incident management approach
-
BMC's incident management procedure enables swift response to any potential incident. This procedure covers emergency incidents, escalation, and public vulnerability disclosure. BMC’s practices include procedures for documenting the incident in detail and producing a report for future reference or management attention.
More details here: https://www.bmc.com/corporate/trust-center/vulnerability-disclosure.html
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Tekwurx cloud solutions and services assist in COVID-19 recovery efforts by:
1. Facilitating remote work setups, allowing businesses and organisations to continue operations while adhering to social distancing measures.
2. Tekwurx Cloud services offer scalability and flexibility, enabling organisations to quickly scale up or down their IT resources based on fluctuating demandsCovid-19 recovery
Tekwurx cloud solutions and services assist in COVID-19 recovery efforts by:
1. Facilitating remote work setups, allowing businesses and organisations to continue operations while adhering to social distancing measures.
2. Tekwurx Cloud services offer scalability and flexibility, enabling organisations to quickly scale up or down their IT resources based on fluctuating demandsTackling economic inequality
Tekwurx Cloud Solutions and Services can tackle economic inequality by fostering inclusive practices within the company, investing in communities, and advocating for policies that promote economic justice and opportunity for all.Equal opportunity
TekWurx Cloud Solutions and Services promotes equal opportunities in several ways:
1. We implemented diverse hiring practices that ensure our workforce represents various backgrounds, including gender, race, ethnicity, and socio-economic status. This promotes equal opportunities within the company itself.
2. We offer training and development programs that help all our team develop the skills they need to advance within the company
3. We ensure that promotions and opportunities for advancement within the company are based on merit rather than factors such as gender or ethnicity. This creates a level playing field for all employees.Wellbeing
By focusing on efficiency, flexibility, security, collaboration, customer satisfaction, and employee development, TekWurx's cloud solutions and services can significantly promote well-being within its team and customer base.
Pricing
- Price
- £20,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 30-day trial with no limitations
- Link to free trial
- https://tekwurx.com/contact-us/