Cloud Based Mobile Device Test Automation
Use test automation against mobile apps. Test automation software and devices are located in the cloud. Install your apps, build automated test cases, execute automated test scripts against your mobile app and get test execution reports so you can quickly raise test defects.
Features
- Script-less automation, no need for developer level automated testers
- One automated test script covers multiple devices & operating systems
- Devices securely stored away but available to all users.
- Scheduling facility queues automation waiting for the device to free-up.
- Comprehensive reporting options to produce evidence of test coverage.
- Performance stats and response times for device under test available.
- iOS devices do not need to be jail broken
- Automation will work with web and native apps.
- Centralised storage of script assets to enhance collaboration.
- Scripts can be generated without requiring access to the device.
Benefits
- Useful in agile environments with integration to Continuous Integration tools.
- Speed up test cycle, testers can focus on defect management.
- Input parameter files enable wide range data values in testcases.
- Automation is accurate and can generate defect information on failure.
- Scheduling facility enables testing to take place overnight.
- Automated testers do not need technical skills.
- After an initial upfront cost, automation quickly reduces costs.
- Scripts work with any device, can easily scale devices tested.
Pricing
£1,600 to £49,000 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 4 0 3 0 7 3 6 8 8 5 3 8 6 8
Contact
FIMATIX UK LTD
Tim Howarth
Telephone: 07702574720
Email: proposals@fimatix.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Only support automation and management of iOS and Android devices.
- System requirements
- Ability to use remote desktop software
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- 1st & 2nd line support provided at no extra cost. Onsite support available at a cost.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training can be provided, either remote or onsite. Documentation available.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Data is copied via remote desktop software.
- End-of-contract process
- Access to the service is terminated. Once the customer has removed all data they require, all remaining data and assets left behind by the customer are removed and the cloud based virtual machine is rebuilt.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
- The range and type of mobile devices available can be specified.
Scaling
- Independence of resources
- Each user has their own virtualised server(s)
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- MicroFocus (Borland), HP, Neotys
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via the remote desktop software interface
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Any format, zip files make sense.
- Data import formats
- Other
- Other data import formats
- Zip files make sense
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- We have a flexible offering and look to use hosted virtual machines with the level of security that you require.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Are able to flex to meet the level of security you require.
Availability and resilience
- Guaranteed availability
- Definition of SLA’s • 0 – Critical – Within 1 Hour - Callback • 1 – Severe – Within 2 Hours - Callback • 2- High – 24 hours • 3 – Medium – 48 hours • 4 – Cosmetic – 72 hours
- Approach to resilience
- The service is limited by having to support physical mobile devices. Upon service failure, devices need to be manually moved to a new machine.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Userid & Password only known to the customer,
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 19/10/2021
- What the ISO/IEC 27001 doesn’t cover
- Covers entire service
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Software is used to protect machines. A penetration test is carried out annually looking for security flaws
- Information security policies and processes
- The security officer manages security polices and ensures they are implemented.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Rigid processes are used to control and track changes. Changes are tested before deployment. Significant changes will trigger a penetration test.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Patches are deployed automatically as soon as they are available from the vendor. A security partner provides updates on threats as they become known.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Patches are deployed automatically as soon as they are available from the vendor. A security partner provides updates on threats as they become known.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Emails received are dealt with according to priority to meet SLA. Escalation to senior management routes available.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Fimatix prioritizes employee wellbeing through a comprehensive framework encompassing policies, programs, and initiatives. Our policies, including Social Value, Health and Safety, Diversity (EDI), and Sickness & Attendance Management, are regularly reviewed and communicated through induction programs and annual updates. We maintain an open and inclusive recruitment process, providing reasonable adjustments and support for candidates with disabilities or health conditions.
Employees have access to initiatives such as our Employee Assistance Plan (EAP) and Health Cash Plan, offering confidential support helplines, mental health services, and a wide range of healthcare treatments. Vitality private medical insurance (PMI) promotes healthy lifestyles and covers employees and their families. Additional wellbeing measures include discounted gym memberships, nutrition advice, and health screening.
Our Time Off policy supports flexibility for medical appointments, screenings, and caregiving responsibilities, facilitating early health intervention. Within our Home Office Delivery Team, three contact points—Resource Team, Delivery Lead, and Client Principal—provide support and pastoral care.
We have a track record of aligning delivery KPIs with team wellbeing, as demonstrated in our work with HMCTS’s Crime Programme. By monitoring KPIs like Absenteeism and Culture Pulse, we gain insights into employee health and engagement, informing our continuous improvement efforts.
Through our Delivery Assurance Process (DAP), we ensure transparency and accountability in performance evaluation while promoting employee wellbeing. Regular reporting, review meetings, and collaborative actions contribute to creating a supportive work environment that fosters the health and wellbeing of our team members
Pricing
- Price
- £1,600 to £49,000 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We have a flexible consultancy service that includes pre-sales support to help a client with risk assessment, requirements definition, ROI, and demo of recommended tools.