Skip to main content

Help us improve the Digital Marketplace - send your feedback

W3Partnership Limited

nJAMS Monitoring

nJAMS helps deliver and improve business outcomes from your existing IBM, MuleSoft and TIBCO integration platforms. You receive an enterprise wide, top-down perspective of process flows and transaction data aligned with your business strategy. Easily and quickly monitor your IBM ACE / IIB flows and IBM DataPower Processes.

Features

  • Monitoring
  • Process Flow
  • KPI
  • Process Data
  • Dashboard

Benefits

  • Process Efficiency
  • Reduce Time to Market
  • GUI

Pricing

£1,600 a licence a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@w3partnership.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 3 5 8 7 6 5 9 8 0 9 0 4 7 4

Contact

W3Partnership Limited Hunmbal Khan
Telephone: 08458685041
Email: info@w3partnership.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
N/A
System requirements
Licenced Software

User support

Email or online ticketing support
Email or online ticketing
Support response times
Business Hours Support
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
One support level: 24/7/365 support for nJAMS products provided by IM Team for all IM products
Telephone support during buisness hours from 08:00 to 17:00
Support available to third parties
Yes

Onboarding and offboarding

Getting started
PoC. Training and Consultancy are provided
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
TBC
End-of-contract process
TBC

Using the service

Web browser interface
Yes
Supported browsers
Chrome
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Dashboard
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
N/A
API
No
Customisation available
No

Scaling

Independence of resources
NJAMS scales based on the scalability of the underlying Elasticsearch data store. Elasticsearch allows for adding more nodes to horizontally scale the platform to handle more load.

Analytics

Service usage metrics
Yes
Metrics types
- Throughput
- Availability
- Response Time
- Status (Success, Warning, Error)
- Infrastructure performance metrics such as CPU, Memory and Disk
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Integration Matters

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
TBC
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Using REST APIs
Data export formats
Other
Other data export formats
JSON
Data import formats
Other
Other data import formats
JSON

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
NJAMS uses Amazon Gateways to ensure high availability of the service. According to Amazon, the availability reaches at least 99.95%
Approach to resilience
AWS infrastructure enables resilience including availability, disaster recovery and backup and restore.
Outage reporting
NJAMS outages are reported by AWS to nJAMS Support team, which in turn informs customers about outages, which may affect the nJAMS service.

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
Authentication via LDAP and OpenId is supported by nJAMS.
Access restrictions in management interfaces and support channels
NJAMS uses roles to assign privileges to users. A user can have one more roles.
Access restriction testing frequency
Less than once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LQRA
ISO/IEC 27001 accreditation date
05/04/2018
What the ISO/IEC 27001 doesn’t cover
A.14.2.1 Secure development policy (NEW) and A.14.2.7 Outsourced development
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Not disclosed
PCI DSS accreditation date
Not disclosed
What the PCI DSS doesn’t cover
Not disclosed
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
The security governance approach taken for the nJAMS solution is based on an efficient and effective governance model, which includes both organizational and technical aspects of the platform. It ensures the consistent application of the defined policies across all involved teams
Information security policies and processes
NJAMS Platform is fully based on AWS and makes use of the underlying security policies and processes.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration artefacts are stored in a relational database. Changes to the configuration are managed by privileges and audited.

Changes to the configuration are allowed for users with the corresponding privileges only. A user can implement changes via the UI or using the REST interface of the application.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability Assessments are conducted regularly to uncover security gaps within the application and underlying infrastructure.

The vulnerability process is implemented to continuously identify, evaluate, remediate, and report on security vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Protective monitoring is achieved by means to logging events and signals that may collected from the application and it's underlying infrastructure using data sources that are available.

nJAMS uses real-time Protective monitoring available by AWS to protect the platform from violations and suspicious activities. Protective monitoring also includes preventing loss of data and system health monitoring .
Incident management type
Supplier-defined controls
Incident management approach
Incident management is implemented to ensure services are running with no interruption and restored as quick as possible. nJAMS solution is designed to run 24/7/365.

nJAMS is a monitoring platform, which informs and reports in real-time on incidents occurring inside the platforms it monitors. nJAMS components are monitored by Amazon services. Monitoring events are forwarded to support team for immediate resolution.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Covid-19 recovery
  • Tackling economic inequality

Covid-19 recovery

We are a UK based SME, so by engaging us for a contract, the buyers will help create more jobs and training opportunities locally in the integration monitoring sector that has a known skills shortage in the UK.,

Tackling economic inequality

By using nJAMS monitoring service, our clients benefit from access to knowledgeable experts. Our experts can then provide mentoring and knowledge transfer to our clients and help them overcome skill shortages in this very specialised field.

Pricing

Price
£1,600 a licence a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Free of Charge PoC can be run

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@w3partnership.com. Tell them what format you need. It will help if you say what assistive technology you use.