Skip to main content

Help us improve the Digital Marketplace - send your feedback

FIMATIX UK LTD

Cloud based performance testing

Performance testing software and licensing located in the cloud. Build and execute your performance or stress test of your applications over the internet, testing all layers of your network and infrastructure generating realistic response times that your users will experience.

Features

  • Performance testing hardware, software and licensing included.
  • Cloud load generators simulate users accessing software from the internet
  • Software and hardware are not shared with other organisations
  • Choice of open source or commercial performance testing tool available
  • Our testers build and execute performance test scripts.
  • Our testers can access the Cloud offering from anywhere.
  • A wide range of protocol support available.
  • Performance stats and response times available

Benefits

  • Useful in agile environments with integration to Continuous Integration tools.
  • Speed up test cycle, testers can focus on resolving issues.
  • Input parameter files enable wide range data values in scripts
  • Scripts work with a wide range of application technologies.
  • Comprehensive end of test reporting.
  • Scheduling facility enables testing to take place overnight.
  • No need to manage and support performance testing hardware.
  • All in one package eases procurement process.
  • Available from a minimum of 1 month rental.
  • Risk Assessment to determine no/go risk for performance testing

Pricing

£200 to £49,000 a licence a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at proposals@fimatix.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 4 2 2 5 6 7 2 1 5 4 3 0 9 5

Contact

FIMATIX UK LTD Tim Howarth
Telephone: 07702574720
Email: proposals@fimatix.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No constraints we have come across. As a SME we make sure that any maintenance is carried out a time that is least disruptive to the end user.
System requirements
Ability to use remote desktop software

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
1st Line Support 1st line support will be available between the hours of 09:00 – 17:00 via the following channels; • Web : • Phone : • email : 2nd Line Support 2nd line support which will operate between the hours of 09:00 – 17:00. Definition of SLA’s (Will provide list) • 0 – Critical – Within 1 Hour - Callback • 1 – Severe – Within 2 Hours - Callback • 2- High – 24 hours • 3 – Medium – 48 hours • 4 – Cosmetic – 72 hours
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide user documentation, online training, and onsite training when requested.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Data is copied via remote desktop software.
End-of-contract process
Access to the service is terminated. Once the customer has removed all data they require, all remaining data and assets left behind by the customer are removed and the cloud based virtual machine is rebuilt.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Different tools will be recommend depending on device.
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
No
Customisation available
Yes
Description of customisation
Tools can be customised to suit client requirements, though in most cases this is not necessary. This is done by our in-house team. This is a detailed operation that can not be address within the space provided. First, an assessment of requirements would take place to see if they are necessary and viable. Then we would be able to work out the levels of output required and cost accordingly.

Scaling

Independence of resources
Each user has their own virtualised server(s)

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Open Text (MicroFocus ,Borland), HP, Tricentis

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Via the remote desktop software interface
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Any format, zip files make sense.
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Any format, zip files make sense.

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Each user has their own virtualised server(s)
Data protection within supplier network
Other
Other protection within supplier network
Are able to flex to meet the level of security you require.

Availability and resilience

Guaranteed availability
Definition of SLA’s • 0 – Critical – Within 1 Hour - Callback • 1 – Severe – Within 2 Hours - Callback • 2- High – 24 hours • 3 – Medium – 48 hours • 4 – Cosmetic – 72 hours
Approach to resilience
The service is limited by having to support physical mobile devices. Upon service failure, devices need to be manually moved to a new machine.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Userid & Password only known to the customer,
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
19/10/2021
What the ISO/IEC 27001 doesn’t cover
Full Service is covered.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001

The Fimatix Management System defines IS Policy. Fimatix Management Team manages security polices and ensures they are implemented.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Rigid processes are used to control and track changes. Changes are tested before deployment. Significant changes will trigger a penetration test.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Patches are deployed automatically as soon as they are available from the vendor. A security partner provides updates on threats as they become known.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Patches are deployed automatically as soon as they are available from the vendor. A security partner provides updates on threats as they become known.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Emails received are dealt with according to priority to meet SLA. Escalation to senior management routes available.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

At Fimatix, we are deeply committed to promoting equal opportunities and fostering a diverse and inclusive workplace culture. Our proactive approach to addressing systemic bias and promoting Diversity, Equity, and Inclusion (DEI) is guided by our Head of HR, who ensures that our DEI strategy is regularly updated, approved by our Board, and integrated into every aspect of our organization.

Our DEI strategy is grounded in fair recruitment and onboarding practices and is sustained through ongoing awareness-building and training initiatives. We firmly believe in the value of diversity and strive to create an environment where all individuals feel respected, valued, and empowered to succeed. To achieve this, we focus on four key DEI action points:

1. Embracing Diversity: We celebrate the unique backgrounds, perspectives, and experiences of all individuals, recognizing that a diverse workforce fosters greater innovation, creativity, and overall success.

2. Inclusive Leadership: Fimatix managers lead by example, promoting inclusive behaviors such as active listening, respect for diverse perspectives, and creating a psychologically safe environment where everyone feels valued and heard.

3. Addressing Unconscious Bias: Our managers are trained to recognize and address unconscious biases in the workplace, and we support mentorship and sponsorship programs to foster a culture of inclusion.

4. Tackling Systemic Bias: We are committed to raising awareness of systemic bias through mandatory training, workshops with leading DEI experts, and embedding DEI principles in our culture. Additionally, we maintain inclusive policies and practices, such as fair recruitment processes, flexible work arrangements, and family-friendly policies.

Wwe ensure transparency and accountability by measuring and reporting on our progress towards DEI goals. We publish data on employees, partners, associates, and job applicants, allowing us to track our diversity metrics and identify areas for improvement.

Pricing

Price
£200 to £49,000 a licence a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Our consultancy means we are happy to work with you to evaluate your needs, provide a demo of viable solutions and help establish your requirements

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at proposals@fimatix.com. Tell them what format you need. It will help if you say what assistive technology you use.