Responsiv Cloud Integration Platform
Responsiv Cloud Integration Platform (RCIP) is used to connect systems, allowing them to share data directly and in real-time. Create and expose APIs to make data and functions more widely available using consistent security, protocols, and standardised data model. It provides connectors and hosts logic you need to access information.
Features
- Enterprise Application Integration (EAI) workflows, API libraries, and Microservices
- Information inspection, transformation, augmentation, and validation between systems
- Integration patterns for publish subscribe, one to many, etc
- Included connectors for database, Kafka, JMS, and enterprise system integration
- Low code, graphical, extended SQL options for describing integration applications
- Built-in functionality for declarative parsing of inputs and outputs
- Highly available Development, Test, and Production environments
- Supports standard API protective protocols including OAuth2, OpenID, and JWT
- Integrated and secured by the Responsiv Cloud Security Service
- Full Enterprise Service Bus (ESB) Capability
Benefits
- Expose data and functionality difficult to access, enhanced multi-cloud environments.
- Extended connectivity across Cloud Services, SaaS, cloud platforms, on-premises applications
- Handle events from IoT devices, change data capture, real-time notifications
- Secured by the Responsiv Cloud Security Service for multi-factor authentication
- 100% compatible with IBM software and middleware to streamline migration
- Create microservices and expose them as APIs in minutes
- Reduce the cost of maintenance compared to point-to-point interfaces
- Powerful debugging and error messages that are descriptive and useful
- Save cost and effort with a managed service
- Delivers fast time to value for multiple hybrid integrations
Pricing
£7,020 a unit a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 9 0 4 7 3 5 0 2 9 0 6 8 7 7
Contact
Responsiv Solutions Ltd
Mike Axial
Telephone: +44 (0)1344 266 980
Email: sales@responsiv.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Responsiv Cloud Automation and Decision platforms, Responsiv Robot Services
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Cloud Services are designed to be available 24/7, subject to maintenance. Client will be notified of scheduled maintenance.
- System requirements
- Supported browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response time depends upon request severity. Severity 1 has an RTO of 4 hours, whilst a Severity 4 has an RTO within 1 business day (Monday-Friday business hours) Full details at https://responsiv.co.uk/responsiv-cloud-platform-support/
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Included within the price https://responsiv.co.uk/responsiv-cloud-platform-support/ On-site support provided as a Time & Materials basis and will be scoped and agreed before attending site
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite and online training can be provide as required (charges apply). Extensive user documentation exists online
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- No data persists within the platform. Configuration data can be exported. Responsiv will return the Client Data within a reasonable period in a reasonable and common format upon receiving written instructions from the Client prior to termination or expiration
- End-of-contract process
- If the user chooses not to renew the contract the account will be suspended and access denied. The platform is then deleted and all data erased.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Flows and integration servers are represented by tiles on the dashboard. The tiles show summary information about the flow, API, or integration server, such as whether a flow is running or stopped, and if it produced an error. You can click the tick and exclamation point icons to see when the flow last ran successfully, or what errors were raised. Click the three dots Icon of three vertical dots opens a menu to start, stop, edit, or delete the flow to open a menu to start, stop, edit, or delete your resources.
- Accessibility standards
- None or don’t know
- Description of accessibility
- https://www.ibm.com/able/product_accessibility/request?requestId=57f7ef7f2cdb4f670ca9703945cf1fa1
- Accessibility testing
- https://www.ibm.com/able/product_accessibility/request?requestId=57f7ef7f2cdb4f670ca9703945cf1fa1
- API
- Yes
- What users can and can't do using the API
- Responsiv Cloud Connectivity Platform can expose both Restful and SOAP based APIs as part of the integrations deployed. Command line access to configure the connectivity between systems is also available.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- The architecture of Responsiv cloud platforms and services maintains logical separation of client data. Internal rules and measures separate data processing, such as inserting, modifying, deleting, and transferring data, according to the contracted purposes.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their configuration through the web user interface. No data persits in the solution.
- Data export formats
- Other
- Other data export formats
-
- Broker Archive File (Zip File)
- .Log
- Data import formats
- Other
- Other data import formats
- Broker Archive File (zip file)
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Responsiv will encrypt content not intended for public or unauthenticated viewing when transferring content over public networks. Further, unless excluded by a TD, Responsiv will enable use of a cryptographic protocol, such as HTTPS, SFTP, and FTPS, for Client’s secure transfer of content to and from the Cloud Service over public networks.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Use of segregated networks behind a firewall
Availability and resilience
- Guaranteed availability
- Technical support for the Cloud Service, including support contact details, severity levels, support hours of availability, response times, and other support information at https://responsiv.co.uk/support/ Availability during a contracted month = Compensation (% of monthly subscription fee for contracted month that is the subject of a claim) <99.9% = 2% <99.0% =5% <95.00% = 10.0%
- Approach to resilience
- Available on request
- Outage reporting
- Email notifications for scheduled changes
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Responsiv maintains individual role-based authorisation of privileged accounts that is subject to regular validation. A privileged account is a duly authorised Responsiv user identity with administrative access to a Cloud Service, including associated infrastructure, networks, systems, applications, databases and file systems.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Citation ISO Certification Limited
- ISO/IEC 27001 accreditation date
- 02/12/2024
- What the ISO/IEC 27001 doesn’t cover
- N/a
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- Responsiv has a set of security policies documented as part of our policy framework. Responsibility and accountability for executing internal security programs is established through these formal documented policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Responsiv maintains policies and procedures to manage risks associated with making changes to the Responsiv Cloud Platform offerings. Changes are documented and tested against non-production environments to develop detailed run-books that are used to implement changes. Where possible changes are scripted and automated to further reduce the potential for human error and mitigate security risks.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Responsiv Cloud Services are regularly assessed for potential security vulnerabilities and deployed in an isolated manner to mitigate the risk of contagion. Operating systems and other components are chosen with security in mind. Patches are tested and deployed as needed and according to a specific risk assessment. Potential threats are identified through our vendor and partner links, and security forums.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Administrative access and activity to Responsiv Cloud Platform and Services are logged, and the logs retained. Our policies and measures help identify unauthorised access and activity to facilitate a timely and appropriate response.
- Incident management type
- Supplier-defined controls
- Incident management approach
- In the event of an incident, automated monitoring in the Responsiv Cloud Platform will raise a ticket in our ITIL based service desk. Standardised processes are then followed to address the incident. A root cause analysis is performed where appropriate and notified to the customer. Incident details are recorded in our service desk and where appropriate available to the specific customer. Root cause reports are recorded in the same way for records and sent to the customer.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
All our software run in sustainable datacentres decreasing our clients carbon footprint through delivering the workload of our solutions in a sustainable manner.
Our hosting uses renewable energy and monitor the Power Usage Effectiveness (PUE) and strive to achieve an as low as possible PUE score. Combined with our suppliers advanced cooling technology as well as other advanced efficiency technologies, our clients can benefit from the reduced demand on energy in their data centres and select a service provider with genuine intent to drive the carbon footprint of technology down.
Pricing
- Price
- £7,020 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- No