nJAMS Monitoring
nJAMS helps deliver and improve business outcomes from your existing IBM, MuleSoft and TIBCO integration platforms. You receive an enterprise wide, top-down perspective of process flows and transaction data aligned with your business strategy. Easily and quickly monitor your IBM ACE / IIB flows and IBM DataPower Processes.
Features
- Monitoring
- Process Flow
- KPI
- Process Data
- Dashboard
Benefits
- Process Efficiency
- Reduce Time to Market
- GUI
Pricing
£1,600 a licence a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 3 5 8 7 6 5 9 8 0 9 0 4 7 4
Contact
W3Partnership Limited
Hunmbal Khan
Telephone: 08458685041
Email: info@w3partnership.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- Licenced Software
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Business Hours Support
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
-
One support level: 24/7/365 support for nJAMS products provided by IM Team for all IM products
Telephone support during buisness hours from 08:00 to 17:00 - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- PoC. Training and Consultancy are provided
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- TBC
- End-of-contract process
- TBC
Using the service
- Web browser interface
- Yes
- Supported browsers
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Dashboard
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- N/A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- NJAMS scales based on the scalability of the underlying Elasticsearch data store. Elasticsearch allows for adding more nodes to horizontally scale the platform to handle more load.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
- Throughput
- Availability
- Response Time
- Status (Success, Warning, Error)
- Infrastructure performance metrics such as CPU, Memory and Disk - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Integration Matters
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- TBC
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Using REST APIs
- Data export formats
- Other
- Other data export formats
- JSON
- Data import formats
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- NJAMS uses Amazon Gateways to ensure high availability of the service. According to Amazon, the availability reaches at least 99.95%
- Approach to resilience
- AWS infrastructure enables resilience including availability, disaster recovery and backup and restore.
- Outage reporting
- NJAMS outages are reported by AWS to nJAMS Support team, which in turn informs customers about outages, which may affect the nJAMS service.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Authentication via LDAP and OpenId is supported by nJAMS.
- Access restrictions in management interfaces and support channels
- NJAMS uses roles to assign privileges to users. A user can have one more roles.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LQRA
- ISO/IEC 27001 accreditation date
- 05/04/2018
- What the ISO/IEC 27001 doesn’t cover
- A.14.2.1 Secure development policy (NEW) and A.14.2.7 Outsourced development
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Not disclosed
- PCI DSS accreditation date
- Not disclosed
- What the PCI DSS doesn’t cover
- Not disclosed
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- The security governance approach taken for the nJAMS solution is based on an efficient and effective governance model, which includes both organizational and technical aspects of the platform. It ensures the consistent application of the defined policies across all involved teams
- Information security policies and processes
- NJAMS Platform is fully based on AWS and makes use of the underlying security policies and processes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration artefacts are stored in a relational database. Changes to the configuration are managed by privileges and audited.
Changes to the configuration are allowed for users with the corresponding privileges only. A user can implement changes via the UI or using the REST interface of the application. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerability Assessments are conducted regularly to uncover security gaps within the application and underlying infrastructure.
The vulnerability process is implemented to continuously identify, evaluate, remediate, and report on security vulnerabilities. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Protective monitoring is achieved by means to logging events and signals that may collected from the application and it's underlying infrastructure using data sources that are available.
nJAMS uses real-time Protective monitoring available by AWS to protect the platform from violations and suspicious activities. Protective monitoring also includes preventing loss of data and system health monitoring . - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident management is implemented to ensure services are running with no interruption and restored as quick as possible. nJAMS solution is designed to run 24/7/365.
nJAMS is a monitoring platform, which informs and reports in real-time on incidents occurring inside the platforms it monitors. nJAMS components are monitored by Amazon services. Monitoring events are forwarded to support team for immediate resolution.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Tackling economic inequality
Covid-19 recovery
We are a UK based SME, so by engaging us for a contract, the buyers will help create more jobs and training opportunities locally in the integration monitoring sector that has a known skills shortage in the UK.,Tackling economic inequality
By using nJAMS monitoring service, our clients benefit from access to knowledgeable experts. Our experts can then provide mentoring and knowledge transfer to our clients and help them overcome skill shortages in this very specialised field.
Pricing
- Price
- £1,600 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Free of Charge PoC can be run