Digital Cloud Integration
Infosys Digital Cloud Integration competency is a strong 8000+ team focusing on API, Integration and Microservice implementation is in existence for over 22+ years. Focusing on leading Middleware and API products such as MuleSoft, APIGEE, Azure Integration Services, AWS, SAG, Biztalk, TIBCO, IBM, IPaaS etc.
Features
- Cloud First Integration (CFI)
- Cloud Hyper Engineering
- Connected Ecosystem
- B2B Led System Integration
- Low Code Platform
- Event management
- Managed File Transfer
- Integration Platform As a service
Benefits
- Avoid lock-in with bulky integration product vendors
- Channel-less customer interaction
- Robust, flexible and scalable with configurable order workflows
- E2E Managed Implementation, Support & Ops
- Cloud Integration
Pricing
£158 to £1,100 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 1 8 0 1 0 5 9 3 4 7 7 3 6 3
Contact
Infosys Limited
Peter Gill
Telephone: +44 7391393866
Email: ukps@infosys.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- SAP CPI,SAP IS, MuleSoft, Software AG, Tibco, Apigee, Boomi, Azure Integration Services AWS IBM Suite, Google
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Specific constrains can be applicable for select software and this can be discussed during the solution design phase
- System requirements
-
- Web Browsers- Google Chrome, Mozilla Firefox, Microsoft Edge, Apple Safari
- OS Windows , Linux, Unix
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- We do the analysis of the ticket and based on the complexity of the system, we work on the SLAs along with the client
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
-
L1, L2,L3,L4 & L5 Support
At high level, L1, L2 & L3 can be mapped to
L1 Support -> Application operations and monitoring, Categorization and logging of tickets, Fixing known/commonly occurring issues, Escalating issues to next level within SLA timelines in absence of a known resolution.
L2 Support -> Application production support, Problem Management, configuration Management, Escalated Incident Management for tickets escalated from L1 team
L3 Support - > change and release management, SLA management, Escalated Incident Management for tickets escalated from L2 team, Minor Enhancements < 40 hours (typically), Bug fixes .
Support SLAs will be driven by the severity of the tickets
We provide cost for support services levels L1 , L2, L3 , L4 & L5.
We can provide either Technical account Manager or Cloud Support Engineer based on the actual service required - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide training for the end solution. Platform training has to be obtained from the respective technology partner.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data is stored on the customer instance and we do not retain any data.
- End-of-contract process
- When the contract ends, Infosys will hand over the credentials back to the customer and all the accesses will be reverted and any extra charges will be calculated as per the MSA
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference in functionality and experience.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Predominantly either browser based interface or eclipse based design studios
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- API services depend on the technology platform and they provide a range of services from user creation to deployment management and monitoring
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Service team will be dedicated for the customer
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide SLA adherence, time to respond, time to resolution, availability, and schedule adherence related metrics
- Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- SAP, MuleSoft, Software AG, Tibco, Apigee, Boomi, Microsoft,AWS,IBM, Google
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- N/A
- Data export formats
-
- CSV
- Other
- Other data export formats
- PDF,EXcel,Word,XML
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We depend on the product vendor for availability SLAs and we have back to back contracts and penalties can be agreed upon as part of the contract
- Approach to resilience
- It's available on request
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
The selected Cloud partner follows the Role Based Access Control security standards for user management and this provides capabilities to grant or restrict access to the desired application objects by role. A wide spectrum of enterprise roles is pre-delivered, and any variation of these roles can be adjusted or defined with the security model.
Relying on a high level of granularity, custom users, roles, groups, and permissions/responsibilities can be created and managed through the administrative tools. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas Holding SAS - UK
- ISO/IEC 27001 accreditation date
- 2017
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 27001
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
Infosys is ISO/IEC 27001:2013 certified.
Oracle Cloud - ISO/IEC 27002:2017, ISO/IEC 27017:2015 and ISO/IEC 27018:2014 - Information security policies and processes
-
Infosys’ Information Security Policy framework is aligned and certified to ISO 27001:2013 Information Security Standard. The information security framework is supported by a set of supplementary policies, procedures & standards aimed at achieving the enterprise level information security objectives.
The Information Security Policy provides an overview of the below areas:
1. Security Governance
2. Security Management
3. Security Measurement and Improvement
4. Risk Management
5. Supplier Risk Management
6. Threat and Incident Management
7. Technical Security Management
8. Asset Management
9. People Management
10. System Access
11. Physical and Environmental Security
12. System Acquisition, Development and Maintenance
13. Operations Management
14. Networks and Communications
Infosys’ Information Security policies and procedures are internal documents and cannot be shared. However, the same can be showcased to the Customer through live meeting/WebEx or during campus visit/audits by the Customer.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Infosys has vast experience supporting clients during the change process. We will manage the changes to any services in a controlled manner with minimal disruption of services.
Changes can be triggered from various sources like:
• Problems
• New initiatives
• Service Improvement programs
• Change in business or customer requirements etc…
Infosys will efficiently govern the changes which includes proper management of the risks and minimizing its possible adverse impact on the business. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Infosys works with its selected partner to utilize network vulnerability assessment tools to identify security threats and vulnerabilities. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Hosting provider takes actions on the notification of a threat or risk once confirmed that a valid risk exists, that the recommended changes are applicable to service environments, and the changes will not otherwise adversely affect the services.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Infosys works with its Cloud partner to utilise protective monitoring tools to identify potential compromises. Formal procedures are in place to assess, validate, prioritise, and remediate identified compromises. Monitoring information is used to continually tune the environment and improve application performance with all system changes made by Cloud Partner in the standard maintenance windows. Monitoring systems and data are accessed only by authorised individuals and teams with the operational responsibility for monitoring.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Infosys has a comprehensive Security Incident Response and Management procedure, aligned with ISO 27035:2011 standard, which elaborates the steps to be taken for reporting, isolating, handling incidents and learning from security incidents. All incidents are captured by and reported to the respective departments and are handled according to the nature of the incident.
Infosys establishes a governance model with each of its customers. There is a relationship manager assigned to every customer and the relationship manager will formally inform the customer in case of any privacy or security breach.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Infosys’ balanced approach to environmental, social, and governance (ESG) enabled the company to become carbon neutral as of 2023. The same approach will be taken with GCloud14, with a strong emphasis on governance and transparency.
Coupled with our strong governance approach and the environmentally sympathetic design of our delivery model, we can:
• Achieve Net Zero by 2028,
• Adopt UN Climate Neutral Now definition of Net Zero: “where a balance between anthropogenic greenhouse gas (GHG) emissions and removals is achieved”
• Identify 100% of emissions, from design to implementation, prioritising the elimination of emissions
• Offset emissions that cannot be eliminated
• Offsets assured by an external environmental consultancy
• Have our suppliers present an action plan to move from offset to elimination by 2029, setting course for a carbon negative future
In compliance with PPN 06/21, Infosys publishes its Carbon Reduction Plan which is available at Crown Commercial Website as well as Infosys’ own website: https://www.infosys.com/about/corporate-responsibility/documents/carbon-reduction-plan.pdf
For Call-Off Contracts, a baseline emissions level set prior to contract commencement will be created using data supplied by the incumbent supplier, Contracting Authority, and Environmental Contractor. This allows environmental performance to be measured against the previous approach. While the commitment to establishing carbon neutrality is set at 2028, granular targets depend upon consultation with the Contracting Authority, as reflected in the timeline.
Supply chain emissions management will be in place prior to contract commencement through the Contracting Partners’ procurement methodology. The reporting design on emissions will be supplied to the Contracting Authority, with aggregated subcontractor emission provided within an integrated biannual report. A sustainability manager will be aligned to the initiative, who will, working with the client, develop a project plan during the first month identifying, each obligation, associated event/activity and required resources (people, venue, collateral, rollout).Covid-19 recovery
Infosys will invest in the local communities and in partnership through this contract will help create opportunities to tackle economic inequality, increase supply chain resilience and capacity thereby helping support COVID-19 recovery. Infosys has announced it will create 1,000 new Digital Jobs in the UK to support post -Pandemic Growth (Infosys to Create 1,000 Digital Jobs in the UK to Fuel Post-Pandemic Growth): https://www.infosys.com/newsroom/press-releases/2021/create-digital-jobs-uk.htmlTackling economic inequality
Infosys’ plan for GCloud14 contracts include addressing economic and aspirational inequality, ensuring end-users can forge a meaningful career and follow curated, individualised development paths toward success.
Infosys creates opportunities for personal growth through training and career development. Increased online training opens a wide range of options to those looking to enhance their skills or grow into a new field, particularly among under-represented demographics where classroom learning is unsuitable. This democratisation of knowledge will revolutionise how people of all backgrounds develop their career. The data on uptake of such training can ensure all demographics are reached and, where proven to be less effective, steps can be taken to identify why.
Infosys has long recognised the importance of tackling inequality; it is essential to creating a workplace where professional growth faces as few barriers as possible. We are adamant that what barriers remain are determined only by aptitude and hard work – never by background or physical characteristics.
This is evidenced by Infosys’ approach to Corporate Social Responsibility (CSR), with its global foundation investing £30 million last year on education in deprived communities, alongside its community-focussed Springboard learning platform and other philanthropic efforts. We have the commitment and expertise to deliver a transformation that has a meaningful impact on economic inequality.
Working with Local Authorities, including Brent and Sandwell Borough Councils, Infosys has made over 220 vocational courses available to the public free of charge. Local Authorities have adopted the technology as their skills platform of choice and are driving citizens towards the tool.
This will result in high-quality training reaching those in need, doubling the reach of the Infosys Springboard deployment in the UK. Furthermore, it will ensure that the co-morbidities of poor educational and health outcomes linked to economic inequality are addressed through a single tool.Equal opportunity
Infosys supports businesses to create their modern slavery policy, helping them to map their supply chain and create robust procedures. This methodology ensures a proactive, compliant approach to modern slavery whereby action planning is reviewed and renewed to adapt to the changing practices.
The UK proudly boasts the highest ranking on Global Slavery Index as the most active country in the world fighting the practice. This achievement is the perfect expression of the values at the core of Britain’s democratic traditions; its global leadership in this area is a source of pride for colleagues working on this engagement.
We will contribute to this under-celebrated achievement by ensuring the Gcloud14 contracts result in net reduction of Modern Slavery. We will achieve this by keeping the practice out of our supply chain while taking targeted action to improve the lives of people most at risk of exploitation. We will build our approach with close reference to the UK Government guidance on modern slavery.
To ensure a clear understanding of the risks of modern slavery and human trafficking across our organisations, we conduct training with relevant members of the supply chain on staffing benefits and appropriate anti-sexual harassment policies. In line with the policies that apply to our own staff, we require our human resource suppliers to provide training to their employees on their rights, wages policy, benefits, and grievance redressal forums; this is periodically and randomly audited. We have also circulated to our supply chain management employees a training module to improve awareness on modern slavery and human trafficking –a core responsibility of their role.
The programme will be governed by the overall social value governance model under the Social Value Manager’s accountability, who will share a narrative report every six months with the contracting authority on supplier performance.Wellbeing
At Infosys, employee’s health and wellbeing drives a culture of wellness.
Through our efforts, our employee well-being rates reached an all-time high of 91% among employees across locations, even with the virtual setup. The sense of connectedness stands at 88% because of the ability of different teams to come together and collaborate with each other emotionally. We successfully touched the lives of 150,000+ employees through 431+ initiatives, witnessing a three-fold increase in employee participation virtually.
We created three aspects essential to shaping employee experience:
1. Self-Help: Emphasises providing our employees the right tools and resources for them to take charge of their wellbeing.
2. Micro-Environment: Our objective is to create an environment that is conducive for individuals to work together, seamlessly.
3. Macro Environment: The focus here is on driving the programs centrally, conceptualising policies keeping the user at the centre.
Great Place to Work® and Fortune have recognised Infosys as one of the Best Big Companies to Work For™. In alignment with the organisations’ social value themes to ensure Employee wellbeing and health improvement, Infosys invests in following engagements:
• New approaches to focus on prevention, resilience supported by internal policies. For instance, digital platforms for scientifically validated therapies such as cognitive behavioural therapy (CBT) to improve access to care options.
• Infosys Employee Assistance Programme, powered by LifeWorks via Generali, a 24/7 service for our employees or eligible dependents.
• Infosys, in collaboration with Virgin Pulse are committed to augment health and wellness agenda of UK by providing free/subsidised memberships.
To monitor the effectiveness of these programmes our HR team conduct regular surveys, and as part of town halls take direct feedback. Data collected is used to ensure that the programmes are reaching the right people and are adjusted to meet the changing needs of our employees.
Pricing
- Price
- £158 to £1,100 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No