Cloud based performance testing
Performance testing software and licensing located in the cloud. Build and execute your performance or stress test of your applications over the internet, testing all layers of your network and infrastructure generating realistic response times that your users will experience.
Features
- Performance testing hardware, software and licensing included.
- Cloud load generators simulate users accessing software from the internet
- Software and hardware are not shared with other organisations
- Choice of open source or commercial performance testing tool available
- Our testers build and execute performance test scripts.
- Our testers can access the Cloud offering from anywhere.
- A wide range of protocol support available.
- Performance stats and response times available
Benefits
- Useful in agile environments with integration to Continuous Integration tools.
- Speed up test cycle, testers can focus on resolving issues.
- Input parameter files enable wide range data values in scripts
- Scripts work with a wide range of application technologies.
- Comprehensive end of test reporting.
- Scheduling facility enables testing to take place overnight.
- No need to manage and support performance testing hardware.
- All in one package eases procurement process.
- Available from a minimum of 1 month rental.
- Risk Assessment to determine no/go risk for performance testing
Pricing
£200 to £49,000 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 2 2 5 6 7 2 1 5 4 3 0 9 5
Contact
FIMATIX UK LTD
Tim Howarth
Telephone: 07702574720
Email: proposals@fimatix.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No constraints we have come across. As a SME we make sure that any maintenance is carried out a time that is least disruptive to the end user.
- System requirements
- Ability to use remote desktop software
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- 1st Line Support 1st line support will be available between the hours of 09:00 – 17:00 via the following channels; • Web : • Phone : • email : 2nd Line Support 2nd line support which will operate between the hours of 09:00 – 17:00. Definition of SLA’s (Will provide list) • 0 – Critical – Within 1 Hour - Callback • 1 – Severe – Within 2 Hours - Callback • 2- High – 24 hours • 3 – Medium – 48 hours • 4 – Cosmetic – 72 hours
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide user documentation, online training, and onsite training when requested.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Data is copied via remote desktop software.
- End-of-contract process
- Access to the service is terminated. Once the customer has removed all data they require, all remaining data and assets left behind by the customer are removed and the cloud based virtual machine is rebuilt.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Different tools will be recommend depending on device.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
- Tools can be customised to suit client requirements, though in most cases this is not necessary. This is done by our in-house team. This is a detailed operation that can not be address within the space provided. First, an assessment of requirements would take place to see if they are necessary and viable. Then we would be able to work out the levels of output required and cost accordingly.
Scaling
- Independence of resources
- Each user has their own virtualised server(s)
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Open Text (MicroFocus ,Borland), HP, Tricentis
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Via the remote desktop software interface
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Any format, zip files make sense.
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Any format, zip files make sense.
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Each user has their own virtualised server(s)
- Data protection within supplier network
- Other
- Other protection within supplier network
- Are able to flex to meet the level of security you require.
Availability and resilience
- Guaranteed availability
- Definition of SLA’s • 0 – Critical – Within 1 Hour - Callback • 1 – Severe – Within 2 Hours - Callback • 2- High – 24 hours • 3 – Medium – 48 hours • 4 – Cosmetic – 72 hours
- Approach to resilience
- The service is limited by having to support physical mobile devices. Upon service failure, devices need to be manually moved to a new machine.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Userid & Password only known to the customer,
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 19/10/2021
- What the ISO/IEC 27001 doesn’t cover
- Full Service is covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ISO 27001
The Fimatix Management System defines IS Policy. Fimatix Management Team manages security polices and ensures they are implemented.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Rigid processes are used to control and track changes. Changes are tested before deployment. Significant changes will trigger a penetration test.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Patches are deployed automatically as soon as they are available from the vendor. A security partner provides updates on threats as they become known.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Patches are deployed automatically as soon as they are available from the vendor. A security partner provides updates on threats as they become known.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Emails received are dealt with according to priority to meet SLA. Escalation to senior management routes available.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
At Fimatix, we are deeply committed to promoting equal opportunities and fostering a diverse and inclusive workplace culture. Our proactive approach to addressing systemic bias and promoting Diversity, Equity, and Inclusion (DEI) is guided by our Head of HR, who ensures that our DEI strategy is regularly updated, approved by our Board, and integrated into every aspect of our organization.
Our DEI strategy is grounded in fair recruitment and onboarding practices and is sustained through ongoing awareness-building and training initiatives. We firmly believe in the value of diversity and strive to create an environment where all individuals feel respected, valued, and empowered to succeed. To achieve this, we focus on four key DEI action points:
1. Embracing Diversity: We celebrate the unique backgrounds, perspectives, and experiences of all individuals, recognizing that a diverse workforce fosters greater innovation, creativity, and overall success.
2. Inclusive Leadership: Fimatix managers lead by example, promoting inclusive behaviors such as active listening, respect for diverse perspectives, and creating a psychologically safe environment where everyone feels valued and heard.
3. Addressing Unconscious Bias: Our managers are trained to recognize and address unconscious biases in the workplace, and we support mentorship and sponsorship programs to foster a culture of inclusion.
4. Tackling Systemic Bias: We are committed to raising awareness of systemic bias through mandatory training, workshops with leading DEI experts, and embedding DEI principles in our culture. Additionally, we maintain inclusive policies and practices, such as fair recruitment processes, flexible work arrangements, and family-friendly policies.
Wwe ensure transparency and accountability by measuring and reporting on our progress towards DEI goals. We publish data on employees, partners, associates, and job applicants, allowing us to track our diversity metrics and identify areas for improvement.
Pricing
- Price
- £200 to £49,000 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Our consultancy means we are happy to work with you to evaluate your needs, provide a demo of viable solutions and help establish your requirements