Atlassian Application Lifecycle Management (ALM) Solution
Valiantys is Atlassian's Partner of the Year 2022 for Cloud Solutions. We offer complete ALM solutions built upon the Atlassian Suite which helps our clients build competitive digital products, enabling faster deployments and unmatched user adoption. Our unique ALM implementation methodology includes pre-built processes, end-to-end traceability, training and user adoption.
Features
- Robust requirements management process to track solution build
- Software development and configuration management
- Code review and guidance
- Project management
- Test management
- Workflow management
- Finance and time tracking for efficient management and reporting
- Software Versioning Control systems
- Release management to build, test and deploy your code
- Portfolio management and capacity planning
Benefits
- Integrated solution for faster deployment of higher quality digital products
- Improved collaboration and communication among teams
- Improved quality of delivery
- Effective product planning
- Easy to use and configure
- Meets requirements for regulatory standards and compliance
- Fast adoption and ROI
- Bi-directional traceability
- Powerful reporting
Pricing
£1,500 to £500,000 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 7 4 0 0 6 6 0 1 2 5 0 2 8
Contact
Valiantys Ltd
Luc Boucher
Telephone: +44 (0) 203 176 7980
Email: orders.uk@valiantys.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- If/when security breaches are discovered by the software vendor (Atlassian), they would contact all their customers and advise on the different steps to take. If any maintenance has to be undertaken on the servers provided by Valiantys, our hosting team will contact our customers to confirm which time is most suitable for this planned maintenance. We will always aim at reducing down time and lowering the impact on users. Atlassian hardware requirements are available in the Atlassian documentation: https://confluence.atlassian.com/alldoc/atlassian-documentation-32243719.html.
- System requirements
-
- Licences for the required Atlassian products and potential add-ons
- Web browser
- Access to Internet
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We offer different support packages (Standard, Enterprise or Unlimited ) which have different SLAs, further detail here https://valiantys.com/legal/sla.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer different support packages (Standard, Enterprise or Unlimited ) which have different SLAs, further detail here: https://valiantys.com/legal/sla.
Indicative costs for each of them are listed in our pricing document.
Our customers have access to a team of support engineers who can assist them with their queries. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
- Online documentation
- Training if required (additional cost) - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Online
- End-of-contract data extraction
- Users can extract all data through an XML export.
- End-of-contract process
- We will provide an XML export containing all the tools' data. We would then delete all backups and any sensitive information from the client. Data migration to another system may require days of consultancy, which would come at an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our service can be accessed through a browser on mobiles as well. In this case, there wouldn't be any difference with the desktop service. The client can also install the mobile application which has a different user interface. Functionalities available in the desktop version may not always be available in the mobile version. We will be able to confirm those differences and limitations based on the client's requirements.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Interface is an online web portal that can be accessible via any desktop or mobile browser, or dedicated applications
- Accessibility standards
- None or don’t know
- Description of accessibility
- All relevant information can be found here: https://www.atlassian.com/accessibility.
- Accessibility testing
- All relevant information can be found here: https://www.atlassian.com/accessibility.
- API
- Yes
- What users can and can't do using the API
- You can use the REST API to build add-ons for Jira, develop integrations between Jira and other applications, or script interactions with Jira.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Available customisations: - On the user interface (service provider, administrator and/or end user based on permissions) - On reports and dashboards (service provider, administrator and/or end user based on permissions) - Using add-ons to enhance the tool's functionalities (service provider, administrator and/or end user based on permissions) - Through configuration (service provider, administrator and/or end user based on permissions) - With our managed hosting service: main options are adding a staging environment, VPN Tunnel, File system encryption, Disaster recovery. (service provider) Most customisations can be done through simple configuration of the tool. Scripts or add-ons can also be used.
Scaling
- Independence of resources
- We set up a virtual private cloud per client.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide service metrics regarding our managed hosting services: e.g. CPU usage, RAM, support usage, etc.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- They can export some data on their own, or can also contact their service provider for a full data export (XML).
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The level of availability of our service is 99.5%. Refunds are limited to 10% of the total amount of the contract, and will be negotiated on a case-by-case basis before contract sign-off.
- Approach to resilience
- This will mainly depend on the architecture and set up (different based on each client's requirements: i.e. cluster environment, disk speed, etc.). Network and equipment are guaranteed by a third party.
- Outage reporting
- Email alerts and/or provided software.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Personal named accounts with password and user name.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 14/06/2021
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- EU GDPR Compliant
- Privacy Shield Compliant
- HIPAA Compliant
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Responsibility for security sits under the following: - Our hosting provider, which rents us a data center - Valiantys, who handle service installation and support - Atlassian, who develops and maintain the software. The main security policies/processes we follow are: - Physical and environmental security (e.g. Fire detection and suppression, Power, Climate and temperature, Storage device decommissioning, Physical access to the data center). - Business continuity management (Availability, Company-wide executive review) - Network security (Secure network architecture, Secure access points, Transmission protection, Fault-tolerant design, Network monitoring and protection, Account review and audit, Background checks, VPN, Workstation security, Separated private clouds per customer, Firewalls, etc.) - Credentials (Individual user accounts, Password policy, Multi-factor authentication, Server access) - Data security (Data access, Data deletion at the end of the contract, SSL, Data encryption, Security logs, Backups, Backup retention, Restore procedure, Restore procedure check, Pen tests) - Operations (Security organisation, Change management process, Incident management process, Problem management process, Periodic access rights review, Security incident management, Disaster recovery) For further information please contact us.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our change management process is based on ITIL best practices. A change is created whenever something needs to be added/modified/removed on any of our server or global AWS configuration. The change will go through several validation before being released in production.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Everyone at Valiantys has the ability to create a security incident, to be handled by our hosting and support team. Security incidents are also raised when security vulnerabilities are found on Atlassian tools or any middleware tools we use (SSL, MySQL, Java, Apache Tomcat, Apache HTTPD). Our hosting and support team is continuously monitoring for potential security vulnerabilities on any of those tools. When a vulnerability is found, we immediately inform our customers, and raise a change in order to apply a patch to fix the issue in the best delay.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Everyone at Valiantys has the ability to create a security incident, to be handled by our hosting and support team. Security incidents are also raised when security vulnerabilities are found on Atlassian tools or any middleware tools we use (SSL, MySQL, Java, Apache Tomcat, Apache HTTPD). Our hosting and support team is continuously monitoring for potential security vulnerabilities on any of those tools. When a vulnerability is found, we immediatly inform our customers, and raise a change in order to apply a patch to fix the issue in the best delay.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents are created by customers using emails, our support portal or by the Valiantys hosting and support team. An incident can be declared as blocker if it has significant impact on end-users (service down or a major bug, for example). Our hosting and support team handles tickets in the following priority order: - Service down (incidents are automatically created from our monitoring tool) - 30mn SLA - Blocker incidents - Security incidents - SLA breached tickets - All other tickets
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
Fighting climate change
Valiantys is dedicated to combating Climate Change by integrating sustainable practices throughout its operations. This commitment is part of our core strategy to ensure that our business activities contribute positively to the global effort against environmental degradation. Valiantys’ Environmental Policy outlines our strategic approach to minimizing our carbon footprint and enhancing environmental performance across all aspects of our business. We recognize that our operations, particularly in the tech industry, have a tangible impact on the environment, primarily through energy consumption and GHG emissions. To address these impacts, we have implemented several initiatives: Energy Efficiency: We strive to reduce our energy consumption by optimizing the use of servers and promoting energy-efficient practices within our offices. Our partnership with Amazon Web Services (AWS) is a pivotal part of this strategy. AWS is committed to achieving 100% renewable energy usage by 2025, which significantly aligns with our goals to minimize the carbon footprint associated with our digital operations. Resource Management: Valiantys actively works towards the preservation of natural resources by adopting sustainable office practices. This includes minimizing the use of paper, encouraging recycling, and reducing disposable packaging. We continuously evaluate the environmental impact of the products we purchase and favor those that are more environmentally friendly and efficient. Sustainable Transportation: We encourage our employees to reduce travel by opting for virtual meetings and teleconferencing whenever possible. For necessary travel, we promote the use of public transportation and bicycles and support the use of 'green' vehicles by maintaining a fleet that meets high environmental standards. Pollution Control: We have identified our major sources of pollution and implemented strict waste management procedures to ensure that all waste, particularly electronic waste and consumables, is disposed of responsibly. Our offices are equipped with facilities for proper segregation and recycling, reducing the overall environmental impact of our waste.Tackling economic inequality
Valiantys is deeply committed to tackling Economic Inequality through its corporate practices and business strategies. Our approach centers on creating inclusive employment opportunities, fostering diversity, and promoting economic development in the communities where we operate. These efforts are integral to our broader corporate social responsibility (CSR) strategy and reflect our commitment to contributing positively to society. Supporting Local Economies Recognizing the importance of local economies in tackling economic disparities, Valiantys prioritizes local hiring and procurement. By engaging local suppliers and contractors, we contribute to the economic vitality of the communities in which we operate. This not only supports small and medium-sized enterprises but also reduces our logistical footprints and promotes sustainable economic growth. Our Sustainable Procurement Policy is designed to ensure that our business practices contribute to the welfare of local economies, thus supporting our commitment to fair and equitable treatment of suppliers and fostering long-term business mutually beneficial relationships. Employee Development and Fair Remuneration Valiantys is committed to the professional growth and development of our employees, which is a key factor in addressing economic inequality. We offer comprehensive training and development programs that enable employees to advance their skills and careers within the company. This commitment is coupled with our adherence to fair pay practices, ensuring that all employees receive competitive and equitable compensation that reflects their roles and contributions. These practices help mitigate economic inequality by providing our workforce with the skills and opportunities needed to improve their economic standing. Community Engagement and Development Beyond our internal policies, Valiantys actively participates in community engagement initiatives aimed at economic development. We collaborate with non-profit organizations and community groups to support projects that enhance educational opportunities, improve access to technology, and foster entrepreneurship. These initiatives are particularly focused on underserved communities where the impact of economic support can be transformative.Equal opportunity
Equal opportunity Valiantys is committed to fostering Equal Opportunities across all aspects of our operations, from recruitment practices to professional development and leadership opportunities. Our dedication to equal opportunity is rooted in the belief that diversity enhances creativity, innovation, and business success. Here is how Valiantys implements this commitment: Robust Inclusion Policies Our Equality, Diversity, and Inclusion Charter serves as the foundation of our commitment to equal opportunity. This charter not only sets out to prevent all forms of discrimination but actively promotes diversity within our workforce. Valiantys ensures that recruitment, training, and career advancement opportunities are based solely on individual qualifications, performance, skills, and experience, regardless of gender, ethnicity, age, disabilities, sexual orientation, religion, or any other status. Recruitment and Hiring Practices Valiantys has implemented transparent and fair recruitment processes that aim to attract a diverse pool of candidates. We use standardized criteria to assess candidates to avoid biases that might prevent equal employment opportunities. Our job postings are designed to be inclusive and are disseminated through channels that reach diverse demographic groups. Additionally, we employ training programs for our HR personnel and hiring managers to raise awareness about unconscious biases and promote best practices in inclusive hiring. Workplace Flexibility Understanding the diverse needs of our employees, Valiantys supports flexible working arrangements that accommodate different life stages and responsibilities, such as parenthood or caring for family members. This flexibility ensures that all employees have the opportunity to succeed professionally without sacrificing their personal commitments. In conclusion, Valiantys' commitment to equal opportunity is a comprehensive approach that encompasses our hiring practices, workplace policies, supplier engagement, and community involvement. By fostering an environment where all individuals are valued and have the opportunity to thrive, we not only enhance our organizational effectiveness but also contribute positively to social equity.
Pricing
- Price
- £1,500 to £500,000 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free temporary licences can be requested to evaluate the service. Those licences are valid for 30 days and offer the exact same set of functionalities as commercial licences. Temporary licences can be renewed up to two times. Please contact us to request a temporary licence.