UST QE360 (Automated Testing)
UST’s QE360 AI driven continuous testing platform offers comprehensive capabilities tailored for digital enterprises and technologies, covering end-to-end testing needs. It seamlessly integrates a diverse range of tools, including both open source and commercial solutions. This integration enables multi-layered and multi-type testing throughout the test life cycle, expediting testing activities
Features
- User story validation , Identification of anomalies using AI
- Scriptless and scripted automation with self-healing capability
- Accessibility testing and Digital experience Reports
- Continuous quality monitoring, Analysis of Incidents, user pattern and sentiments
- Autonomous automation,Gen AI crafts test strategies,scenraios , scrpts and data
- Testcase optimizer,Optimize test cases, detect duplicates, visualize functional traceability
- Continuous performance engineering solution to identify client and server performance
- Vulnerability policing,SAST, DAST and User story-based security tests
- Infrastructure as code (IaC) Scanning,find vulnerabilities in infrastructure as code
- Analytics and insights,Centralized dashboard encompassing quality footprint
Benefits
- Reduction in feedback cycle time
- Improve test design productivity
- Faster Automation
- Reduction in test maintenance effort
- Test execution cycle time reduction
- Improve customer experience
- Reduce production issues
- Improve the visibility of quality status
- Reduce testing effort and Cost
Pricing
£9,033.34 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 9 1 2 8 3 0 9 2 3 1 3 6 3 0
Contact
UST Global Pvt Ltd
Patrick Marren
Telephone: 07544102103
Email: ukpublicsectorsales@ust.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- App Service
- MSSQL DB Server
- VM - for storage and deployment
- VM - for Kubernetes [Master]
- VM - for Kubernetes [Node]
- Storage Account
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Critical (P1) - 1 hour, High (P2) - 4hours, Medium (P3) - 8 hours,Low(P4) - 16 hours. Support for critical issues available post business hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- 3 Levels of Support L1, L2 and L3
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We will follow structured training approach to make the team self-sufficient Results based training curriculum to upskill the team in 20 hours Detailed usage guide comprising of execution, maintenance & troubleshooting steps Web based trainings to reduce learning time by allowing users to progress at their own pace Special orientation sessions will be conducted when new features are rolled out
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Ms Word
- End-of-contract data extraction
- Platform allows the users to export their assets into supported formats
- End-of-contract process
- End of contract will be as per the conditions described in the statement of work with each customer. User can export/ download their data at the end of contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- By using cloud computing services which allow automatic scaling of resources such as servers and storage etc. Load balancing, Distribute incoming traffic across multiple servers or instances using load balancers. This helps prevent any single server from becoming overwhelmed by the demand and ensures that users are evenly distributed across available resources
Analytics
- Service usage metrics
- Yes
- Metrics types
- Active Users,Frequency of use,Resource usage,Feature adoption
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Platform allows the users to export their assets into supported formats
- Data export formats
- Other
- Other data export formats
-
- Maven Project
- Ms Excel
- Data import formats
- Other
- Other data import formats
- Ms Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- We adhere to widely recognized standards for safeguarding personally identifiable information (PII) that is provided to us. Data is securely transmitted via SSL protocols, and when stored, it is safeguarded with appropriate security measures. Passwords are encrypted using industry-standard hashing algorithms
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- We adhere to widely recognized standards for safeguarding personally identifiable information (PII) that is provided to us. Data is securely transmitted via SSL protocols, and when stored, it is safeguarded with appropriate security measures. Passwords are encrypted using industry-standard hashing algorithms
Availability and resilience
- Guaranteed availability
- Application is hosted in third party cloud service providers such Google, AWS and Azure. Adhere with the availability aspects of Google cloud
- Approach to resilience
- All our services are engineered to utilize the redundant data center infrastructure that powers Google services
- Outage reporting
- Through ticketing system and email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- User name and Password
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Intertek
- ISO/IEC 27001 accreditation date
- 25/09/2023
- What the ISO/IEC 27001 doesn’t cover
- The certification includes application development, application management, infrastructure management services, engineering services, business process, outsourcing services, support functions such as human resources, finance, workplace management, sales & marketing, information services, information security management system, covering on-premises and cloud environments within UST.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 22301
- SOC1 SOC2 type II
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Security Governance standards ISO/IEC 27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All the enahancement ,changes , Fixes and and new feature release go thorugh the change control process requiring approval and testing prior to production roll out
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability assessment and penetration testing (VAPT)carried out at regular intervals. VAPT team manages and tracks the vulnerability issues for remediation and closure
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The cloud infrastructure,Network, Server and storage is monitored using in-house monitoring tools and Dashboards. Alerts are monitored by the product support team. For every alert , an incident is logged to the ticketing system and assigns to the respective point of contacts for resolution and closure
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Incidents are autologged via email to the ticketing system /portal. Incident management process involves the below
1. Auto logging of tickets
2. Ticket classification
3.investigation and diagnosis
4. Resolution & Testing
5.Release and closure
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
UST engages in numerous initiatives for tackling economic inequality, these include:
• Working with local Combined Authorities and training providers to build training courses (focussed on digital skills) for economically disadvantaged citizens.
• People who engage in these courses can then be hired by UST into full-time roles and begin their career in technology.
• UST support closing skills gaps in key technology areas e.g. UST have developed a mobile application to support the development of skills in Artificial Intelligence for 3 key user profiles – those looking to start a career in AI, those looking to move into an AI role, and citizens who are interested in AI.
• UST are keen to support local SME’s and can agree with a buyer as to how many local SME’s will be utilised in an engagement.
• UST invest significant sums into innovation aimed at delivering more productivity at lower cost e.g. we have developed our own Generative AI Testing platform.Equal opportunity
UST engages in numerous initiatives for promoting equal opportunities, these include:
• Working TechSheCan to enable great access to women within the world of tech careers. UST also invested in building the training platform for TechSheCan.
• UST work with numerous partners to support veterans who want to start a carer in Tech once they have left the military.
• UST are an equal opportunities employer and do not discriminate on the basis of age, sex, gender, disability, or religion. We can share our policies and process for this to support discussions.
• UST have published a detailed Modern Slavery statement and have processes in place to support this. More details can be found at: https://www.ust.com/content/dam/ust/documents/modern-slavery-statement-2022.pdf
• UST works with local skills development partners to support the development of tech skills amongst numerous societal groups.Wellbeing
• UST have developed a Digital Inclusion Community App to support the development of essential digital skills amongst digital excluded people. This enables citizens to be able to use digital services, from both Public and Private organisations, driving a more integrated digital community.
Pricing
- Price
- £9,033.34 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 30 day trial