Virtual Lead System Architect (iVLSA)
Virtual Lead System Architect conducts regular reviews of Pega applications remotely, providing real-time suggestions to developers during the implementation cycle. Once set-up, the review process can be initiated as a one-time activity or scheduled to run periodically. A detailed Pega application review document is then generated and sent via-email.
Features
- Virtual LSA bot examines various aspects of the Pega application
- Provides recommendations and best practices during the implementation cycle
- Schedule the review
- Establishes a uniform development guidelines and quality checks across teams
Benefits
- Allows for scheduling of reviews and automated email on completion
- 50% increase in management of multiple deployments
- Provides recommendations and best practices
- Reduces deployment delays
- Better performing code
- Graphical representation of areas for review
Pricing
£40,000.00 to £250,000.00 a licence
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 1 5 9 1 3 9 5 8 7 4 3 8 8 1
Contact
COFORGE U.K. LIMITED
Ali Rahman
Telephone: 07801573323
Email: Bids.eu@coforge.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Pegasystems Pega Platform
- Pega Document Management
- Pega KM
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- This is subject to the individual contractual agreements for each engagement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- We provide application support at three levels: Level1 support : Level 1 support provides resolution to minor issues within an application Level2 support: Level 2 support will provide a secondary resolution function and management of solution configuration Level3 support: The Level 3 support will provide advanced technology diagnosis and resolution. The cost of each level of support is subject to different parameters per contract; e.g. the size of application, the hours of support required etc.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide training both onsite as well as remotely through channels such as video conferencing. The duration and medium of training is mutually agreed upon. We also provide user manual as part of our service which details the usage of delivered application for different categories of application users.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- IVLSA does not store any data, it is a robotic process automation tool, iVLSA carries out code quality assessment and send out daily/weekly email of the report.
- End-of-contract process
- The original contract by default does not include decommissioning of the application. Since the amount of data to be extracted would keep on increasing with time, an assessment is performed to identify the effort required for data extraction and decommissioning once the decision is made to discontinue the usage of the application. Accordingly the cost of extraction and decommissioning is determined.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
- IVLSA runs on robotic process automation(RPA), based on the requirement, iVLSA - RPA engine can be configured to run custom process automation for Pega Applications. iVLSA can automate code quality review of Activities, Connectors, Agents, Flows etc. Customization can be done by RPA - SME.
Scaling
- Independence of resources
- We use standard global cloud services hosting platforms to host our applications which take care of independence of resources in case of concurrent access by multiple users.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Virtual Lead System Architect (iVLSA) conducts regular reviews of Pega applications remotely, providing real-time suggestions to developers during the implementation cycle. iVLSA can be configured to generate necessary metrics.
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- With their available document management system.
- Data export formats
- Other
- Other data export formats
- IVLSA does not store any data
- Data import formats
- Other
- Other data import formats
- IVLSA does not store any data
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Monthly uptime percentage of 99.95% is the typical SLA adhered to in our service provisions. In the event of Monthly uptime percentage not meeting the SLA during subscription month, a service credit model can be defined.
- Approach to resilience
- This information will be available on request.
- Outage reporting
- The outages are reported through dashboards and email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The access restriction in management portals/interfaces and support channels through Access Groups. Each user is associated to one or more access groups. The access group associated with a user helps in defining the accessibility of the user to different portals within the application. It also determines which roles (such as Management role, Support role) the user can take within the application.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSCIC
- ISO/IEC 27001 accreditation date
- 20 May 2021
- What the ISO/IEC 27001 doesn’t cover
- This will be available on request.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We are certified ISO27001 . We follow the processes as per these standards.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- This information will be available on request.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We have a documented vulnerability management process. This process is reviewed by an independent third party at least once in a year. The process is aligned as per the requirement of ISO2001. Detailed process document will be available on request.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We have a documented protective monitoring process. This process is reviewed by an independent third party at least once in a year. The process is aligned as per the requirement of ISO2001. Detailed process document will be available on request.
- Incident management type
- Undisclosed
- Incident management approach
- We have a documented protective monitoring process. This process is reviewed by an independent third party at least once in a year. The process is aligned as per the requirement of ISO2001. Detailed process document will be available on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our UK strategy has been informed by clients and our global environmental strategy. This is aligned with Government’s 25-year environmental plan, Fighting Climate Change theme from PPN 06/20, and with HMRC’s Greening Government Commitments delivered through carbon zero target, reduction of CO2 emissions and items entering landfill, promoting resource efficiency and green energy.
Our Organizational Targets
1.Be Carbon Net Zero by 2038 (reducing emissions 20% p.a.) within UK from a baseline of 185.7 tCO2e
2.Achieve quality standard, Green Mark’s EMS index (Sept 2026), and reach ISO 14001 (Sept 2026), reducing energy, water and material resource usage
3.Reduce carbon footprint by eliminating domestic air travel and promoting hybrid working.
4.Prioritise Cloud hosting over datacentre services lowering CO2 emissions.
Pricing
- Price
- £40,000.00 to £250,000.00 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No