BMC Helix Control-M
BMC Helix Control-M integrates, automates, and orchestrates application and data workflows across complex and changing technology ecosystems. It simplifies workflow complexity and delivers a single end-to-end enterprise view from on-premises to the cloud, with interfaces for developers, IT operations, and business users.
Features
- Build, monitor and manage batch workflows from a single point
- Monitor workflows in real time, identify and troubleshoot workflow errors
- Pre-define scheduling calendars, resources, events, and variables
- Receive real-time warnings on potential or actual workflow SLA breaches
- Run scripts or commands on UNIX, Linux, or Windows OS
- Transfer files between physical servers, virtual machines, and the cloud
- Run jobs on SAP R3 and Business Warehouse
- Define Stored Procedure, SQL Script, SSIS Package, and Embedded Queries
- Run tasks in your Big Data Hadoop cluster
- Control-M benefits the whole organisation — developers, operations, business users
Benefits
- Reduce costs and improve service delivery
- Identify and resolve issues faster with historical data
- Improve visibility and control by integrating file transfers
- Improve critical app services by designing custom job types
- Reduce storage and infrastructure costs
- Reduce time to launch new applications with Jobs-as-Code
- Reduce personnel onboarding time
Pricing
£20,000 an instance a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 5 9 5 4 3 5 8 9 7 3 5 6 4 3
Contact
Tekwurx Limited
Keith Pound
Telephone: +44 208 148 3717
Email: keith@tekwurx.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times for requests are based on severity: P1 — 15 mins, P2 — 30 mins, P3 — 4 business hours, P4 — 16 business hours. Tekwurx provides annual support to suit a customer's requirements.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- 24x7 for Severity 1 incidents
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Tekwurx has extensive experience in architecting and deploying Control-M solutions, from single installations covering a few hundred jobs through to large multi-region organisations. We focus on delivering the highest quality project for each and every client.
A typical engagement consists of:
- Initial discussion to understand the basic requirements
- Review the “as-is”
- Follow-up discussion to clarify details and agree on the scope and estimated project fees
- Deliver an in-depth workshop to better understand the details, develop the design and agree on all major elements of the project deliverables
- Produce the architecture design
- Deploy agreed design
- Undertake UAT testing and production deployment
- Create build and configuration documentation
- Provide knowledge transfer and training sessions
- Work with the customer on initial BAU remediation activities
- Provide on-going support - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Tekwurx will provide build documentation in the customer's required format
- Microsoft Word
- End-of-contract data extraction
- Data may be extracted into CSV or XML format to import into other scheduling systems
- End-of-contract process
-
There is no end of contract activity built into the price.
Tekwurx will be pleased to assist migrating data out of Control-M if required as a costed exercise
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Simplified Self-Service option for users
Simplified option for Operators to check on job progress and perform remediation actions - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Accelerate the deployment of digital services by building and deploying workflows in code.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- The BMC Helix Control-M architecture provides scalability and is used by organisations that run tens of thousands of jobs each day. Customers exceeding 50,000 executions in a single day will be required to purchase an additional production instance to accommodate this volume.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The statistics and reporting utilities generate and display various statistics.
By including a utility command in the command line of a job processing definition, you can run the utility at a predetermined time or under a predetermined set of conditions without being present. - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- BMC Software
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- There are many ways in which data can be exported, depending on user permissions. For instance, you can export job and folder definitions, which enables you to save your definitions as an XML file, and later import them to another environment. You can also use the Job and Folder File Editor tool to transfer job and folder definitions in a Workspace between environments. Exports are initiated using menu-driven commands or via the command-line interface.
- Data export formats
-
- CSV
- Other
- Other data export formats
- XML
- Data import formats
- Other
- Other data import formats
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- Not applicable
Availability and resilience
- Guaranteed availability
- This is a function of the Cloud provider
- Approach to resilience
- This is a function of the Cloud provider
- Outage reporting
- This is a function of the Cloud provider
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
As part of the logging in process, Control-M components send user name and password information to Control-M/Server components for authentication. You can define security permissions for every Control-M component to ensure maximum security. For every Control-M component you can define the following:
- Authorization security: Defines which users are allowed to view and which operations (including data modification) that users can perform. At the Control-M/EM and Control-M/Server levels, you can define security for individual users and for groups.
- Authentication security: Defines run as user authentication for Control-M/Agent - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Please refer to the selected Cloud provider for details
- ISO/IEC 27001 accreditation date
- Please refer to the selected Cloud provider for details
- What the ISO/IEC 27001 doesn’t cover
- Please refer to the selected Cloud provider for details
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- Please refer to the specified Cloud provider
- CSA STAR certification level
- Level 5: CSA STAR Continuous Monitoring
- What the CSA STAR doesn’t cover
-
Please refer to the selected Cloud provider for details
AWS: https://aws.amazon.com/compliance/csa/ - PCI certification
- Yes
- Who accredited the PCI DSS certification
- Please refer to the selected Cloud provider for details
- PCI DSS accreditation date
- Please refer to the selected Cloud provider
- What the PCI DSS doesn’t cover
- Please refer to the Cloud provider for details https://aws.amazon.com/compliance/pci-dss-level-1-faqs/
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Please refer to the selected Cloud provider for details
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- This is a function of the Cloud provider
- Information security policies and processes
- This is a function of the Cloud provider
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- This is a function of the Cloud provider
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- This is a function of the Cloud provider
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- This is a function of the Cloud provider
- Incident management type
- Supplier-defined controls
- Incident management approach
- This is a function of the Cloud provider
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Tackling economic inequality
-
Tackling economic inequality
To support this initiative, we recruited an apprentice who will earn an IT Technical Sales Level 3 Diploma, awarded by the British Computer Society. The programme offers a previously unemployed graduate the opportunity to consolidate existing competencies and nurture additional skills, to elicit a marked improvement in the habits and practices of Sales Professionals.
Pricing
- Price
- £20,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 30-day trial with no limitations
- Link to free trial
- https://tekwurx.com/contact-us/