Continuous Network Assessment - IoT Performance Monitor
Online user experience monitoring. It uses IoT sensors to emulate user
activity and report on performance and availability of online services, including WiFi, Cloud Apps, DNS, etc. Additionally, it discovers the network elements in the path, giving you end-to-end visibility of your IT service chain.
Features
- 24/7 availability and performance monitoring of business-critical applications
- Fast integration with no change required to existing infrastructure
- Private Cloud, Public Cloud and Hybrid delivery models
- Retention of results for historical reference and trend analysis
- Dashboard customisation to provide the best fit for your services
Benefits
- Holistic view of IT infrastructure and business-critical applications
- Provide performance of your IT services from user perspective
- Identify deficiencies before they become incidents
- Ease identification of IT faults, shorten RTO
- Maximise IT investment with continuous assessment of the purchased services
Pricing
£22.50 a device
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 5 7 8 5 8 8 9 3 8 7 1 8 4 0
Contact
Visionist
Elaine Glock
Telephone: +44 (0)1202 112168
Email: info@visionist.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No constrains - the service aims to report online user experience, which requires sensors to be positioned at the user locations and consume the connectivity used by the users.
- System requirements
-
- CloudUnit Virtual-Machines(Private or Public), unless consumed as cloud-service
- Sensors require connection WiFi or LAN, and power socket
- Sensors need to communicate with the Cloud Unit
- Details of IT services to be monitor
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within an hour
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Our chat software has been tested with various web browsers which support various assistive technologies, including Dragon and Jaws.
- Onsite support
- Yes, at extra cost
- Support levels
-
Monday - Friday 0800-1800
Saturday - Sunday 1000-1600
Technical Account Manager is assigned to the client for initial on boarding and on a regular basis to ensure service satisfaction - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The onboarding process is provided with online training and demo. Documentation and reference manual are also provided. Service is delivered to cater for your needs, pre-configured dashboards will be used for the initial set-up and will be further customised to fit the service monitored.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data is collected on backend systems. Its extraction will via a support request.
- End-of-contract process
- The customer access to the service will be terminate. The customer can return the sensors no longer active for free of charge disposal.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The portal is accessible on mobile devices and graphic will scale to the reduced screen size. This is offered with limited support.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- CNA portal visualises the data collected from the sensors. Graphs are arranged in dashboards that can be customised to best fit the service monitored. The graphs represent the performance of your IT services. A threshold can be configured on a graph to alert you when a certain value is exceeded. Alerts can be configured to trigger notifications.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Self-evaluation: the content was evaluated by the developer of the portal. Manual testing is being performed regularly for all major browser and operating systems, plus the following screen readers: VoiceOver on MacOS with Safari, Chrome, and Edge NVDA on Windows with Chrome and Firefox Orca on Linux Automated evaluation
- API
- Yes
- What users can and can't do using the API
- The portal backend exposes an HTTP API, which is the same API that is used by the frontend to do everything from saving dashboards, creating users, and updating data sources.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Uses can be setup as read-only or editor. Editor will be able to create and modify dashboard, thresholds, alert, etc.
Scaling
- Independence of resources
- Sizing of the Cloud Unit is based on the number of sensors deployed and probing configured. Resources consumption is reviewed every quarter.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The service provide insight into availability and performance of IT services consumed by your organisation. Metrics are relative to the service monitored (e.g. response time, successful resolution, signal strength, etc.) Optional: a dashboard can be created to show portal utilisation.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- No user data collected. Dashboards and graphs can be saved as snapshots. Export is in JSON format.
- Data export formats
- Other
- Other data export formats
-
- Json
- Snapshot (on portal)
- Data import formats
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- IP source white-listing. Optional (at extra cost): Firewall, static/dynamic VPN, micro- segmentation
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Firewall, IP source White-listing, micro- segmentation
Availability and resilience
- Guaranteed availability
- Cloud Unit Target Availability/Month (during service hours): 99.50% Sensors availability is Best Endeavour
- Approach to resilience
- CNA service is delivered by a fleet of sensors, orchestrated by the Cloud Unit (CU). Resilience for sensors is achieved by duplication (more sensors to monitor the service) The CU is formed by a back-end collecting the sensor inputs, a management station, and a front-end for the portal. CU can run on public and private clouds. Resilience is achieved using cloud- native constructs (availability zones, autoscaling, etc.)
- Outage reporting
- Alert notifications (email, IM, etc.) and dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- OAuth, LDAP, SAML(additional cost)
- Access restrictions in management interfaces and support channels
- IP Source whitelisting, security-group. Additional cost for NGFW, ZTNA, microsegmentation
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Security industry standards NCSC guidance Risk assessment Frameworks to design IT and security infrastructure up-to-date cyber security skill
- Information security policies and processes
- NCSC guidance Cyber Essentials
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes are introduced with a strict 6 steps process: 1. planned with details on the specific part modified and risk associated 2. tested in the development environment 3. documented with findings and any deviation from the plan 4. scheduled with each deployed environment separately 5. implemented according to agreed schedule using blue/green approach 6. observed and accepted or reverted
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Potential threats are assessed from design through implementation and operational support for each element of the solution. The deployment is built with minimal exposure resulting in strong security posture - for example, sensors have no inbound connectivity. SLA Sensors/CU Patching Routine: Monthly outside Service Hours Critical Security Patches: Next working day
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Sensors are managed and monitored 24/7. Central Unit Cloud service is hosted in AWS Virtual Private Cloud (unless privately cloud is required) where instances and traffic are monitored for performance, availability, and threat detection. The response is activated by the alerting mechanism and customer informed.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident escalation is via the support team. Incidents are managed by classification: Application or Infrastructure. Application: service not available, data issue, application bug, Report not coming up. Infrastructure: system-down (CU server issue), Sensor not responding. Report will be provided on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Fundamental to our customer proposition is our commitment to help our clients reduce their carbon footprint and reliance on natural resources. The core of our business lies in identifying, recording, and reporting on energy and water usage to deepen our customers’ understanding of their utilities. This understanding leads to changed behaviours within businesses that reduces their impact on the environment as they strive for more sustainable solutions. We can provide every industry with a higher level of insight that will ultimately lead to a greener future, one in which we believe sustainability will be key. - Covid-19 recovery
-
Covid-19 recovery
The COVID-19 pandemic pushed employee health and well-being to the front of the Smarter Technologies business agenda. We looked to play a vital role in protecting our employees from the risk of infection by implementing stringent public health measures and supporting the need to work from home, pivoting our office structure to put employee health and well-being first. Throughout this time, we have taken additional measures in response to COVID-19, such as providing support directly to individual employees’ needs and concerns, ensuring that individuals have a safe space to raise any mental or physical health issues, and by catering to home office requirements. As we continue through the pandemic and its many phases, we remain malleable to the changes that come from putting our employees first. - Tackling economic inequality
-
Tackling economic inequality
Our solutions are designed to help everyone, and by doing so, we are empowering the idea that anyone can make a difference. Smarter Technologies, by its very nature, promotes a future of better opportunity and smarter choices. From the small business owner to the large corporate, from the local government department to the publicly-owned company, from the restaurant owner in England to the farmer in South Africa or South America. Smarter Technologies seeks to serve as much of the business community as we can. We believe that by working together globally, we have the best chance of creating a positive influence on the lives of everyone. - Equal opportunity
-
Equal opportunity
Smarter Technologies are committed to ensuring an inclusive workplace that embraces and promotes diversity. We understand the importance of empowering individuals and enabling everyone to reach their full potential. Successfully managing a diverse workforce means recognising every individual’s contribution. We respect and value the diversity of our people and know that it is a key factor in our ability to make a positive difference to those we work with, each and every day. We aim to provide differently abled employees with the opportunity to develop their career while preventing any negative impact on their health, career sustainability or self-sufficiency. At Smarter Technologies, we respect and accept, and we embrace ambiguity and diversity. We focus on supporting our people by taking action to remove unconscious bias and encouraging honesty in all areas of our business. - Wellbeing
-
Wellbeing
Smarter Technologies believes in the provision of good and safe work for all. We take a proactive approach to providing a workplace environment that enables healthier choices for employees, regardless of position and status. This is carried out by an extensive support system across our business, where employees truly respect and admire each other. Our employees know that a channel of safe communication is available should they have health issues, either now or in the future. This is delivered across the company's HR system in accordance with evidence-based guidance for best practice and achieves the best outcomes for our employees’ health improvement.
Pricing
- Price
- £22.50 a device
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Demo equipment is available (FCFS) for trial at no cost. This include a pair of sensors and access to demo portal.