Skip to main content

Help us improve the Digital Marketplace - send your feedback

Softcat Limited

Salesforce - Heroku

Heroku, a Salesforce company enables developers to focus on application code and data instead of managing servers or operations. Code with agility in open source: Ruby, Node.js, Java, PHP and more. Deploy and scale on demand. Extend apps with 100s of different add-ons. Includes EU Model Contract Clauses. SFDCS2024GC14

Features

  • Fully managed container runtime environment
  • Scale, dynamically scale up or down instantly to meet demand
  • Buildpacks, open source supported and supplied or build your own
  • Config, manage specific configurations separately from your source code
  • Deploy, with Git. We'll handle compilation, dependencies, assets and executables
  • Fork, creates a duplicate instance of your application immediately
  • Extend, over 100 add-ons, integrated to Heroku.
  • Region, US, Europe and APAC, EU Model Contract Clauses supported
  • Data sync into Salesforce Sales, Service, & Marketing Clouds
  • Open source, Ruby, Node.js, Python, Java, PHP, Scala or Clojure

Benefits

  • Efficient, Developers can focus on the app, not the infrastructure
  • Skills, prevalent in the market giving you greater choice
  • Community, active to help you learn and share code
  • Cost, cheaper than hosting and supporting your own environment
  • Agile, create new apps, then deploy on demand
  • Platform, API automate/extend with services in a programmatic manner
  • Security, Virtual Private Cloud, SSO with OAuth SAML & GDPR
  • Flexibility, listed here avoiding lengthy credit-card approvals
  • Heroku, Connect pre-built integration to the best of Salesforce
  • Speed, scales to millions, exploit the AWS underpin

Pricing

£25.53 a unit a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psitq@softcat.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 4 1 1 3 4 2 9 9 4 5 3 8 5 6

Contact

Softcat Limited Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com

Service scope

Service constraints
Usage Limits
Services and content are subject to usage limits, including, for example, the quantities specified in order forms.
A user’s password may not be shared with any other individual.

If you exceed a contractual usage limit, we may work with you to seek a reduction in your usage so that it conforms to that limit. If, notwithstanding our efforts, you are unable or unwilling to abide by a contractual usage limit, you will execute an order form for additional quantities of the applicable services or content promptly upon our request.

Full details are contained in our terms and conditions.
System requirements
  • Heroku Dashboard - web based use any browser
  • Heroku CLI - for Mac OSX, Windows, Debian/Ubuntu and standalone
  • Heroku API - connect programatically

User support

Email or online ticketing support
Email or online ticketing
Support response times
Guaranteed 30 minute response time on urgent issues. Urgent support available 24x7. Within Business Hours receive deployment consultations, architectural guidance and best practices from Customer Solutions Architects.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
No
Support levels
Urgent support available 24x7. Within Business Hours receive deployment consultations, architectural guidance and best practices from Customer Solutions Architects.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customer Solutions Architects proactively assist customers onboard to the service - providing guidance on initial access and setup and continue to provide white glove support on an ongoing basis
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Dependent on the service being consumed. Code should alway exist outside of Heroku and should already be available - if not it can be extracted from applications on Heroku. Data stored in data services can be extracted using standard tools for the service being used. Extraction for add-on services will vary.
End-of-contract process
Off-boarding from the service will be specific to the nature of the code and service as deployed. The customer therefore always has access to the code, and the data held within the PaaS offering. Typically most customers use the supported databases in conjunction with Heroku, and as such data exports and backups can be taken as required. Code can be saved to GitHub such that off-boarding from Heroku is predictable. Being open source based Heroku can make your data available via an industry standard and easily readable format to make it as easy as possible for you to migrate to another service if you wish to do so.

Using the service

Web browser interface
Yes
Using the web interface
The Heroku Dashboard is the web user interface for Heroku’s core features and functionality. It provides UI support for things like creating/renaming/deleting apps, configuring add-ons, managing Heroku Teams, creating Heroku Pipelines, deploying your application, viewing and responding to application metrics, and accessing usage, invoices and billing information.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Heroku Services are developed with accessibility standard awareness - automated testing tools are used to validate errors and changes are made where necessary.
Web interface accessibility testing
No public information available.
API
Yes
What users can and can't do using the API
The platform API empowers developers to automate, extend and combine Heroku with other services. You can use the platform API to programmatically create apps, provision add-ons and perform other tasks that could previously only be accomplished with Heroku toolbelt or dashboard.
API automation tools
  • Ansible
  • Chef
  • Terraform
  • Puppet
  • Other
Other API automation tools
  • Jenkins
  • Bamboo
  • Codeship
  • Travis
  • Capistrano
  • CircleCI
  • VisualStudio
  • Otto
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • Other
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
The Heroku Command Line Interface (CLI), formerly known as the Heroku Toolbelt, is a tool for creating and managing Heroku apps from the command line / shell of various operating systems. All capabilities available in the API are available via the CLI.

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Heroku provides both single and multi-tenant instances. Single tenant instances are dedicated only for single customer use and isolated from the risk of 'noisy neighbours'. As a platform Heroku serves many billions of requests on a monthly basis.
Usage notifications
No

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
Request Throughput
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Salesforce

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Data is encrypted at rest by using AES-256, block-level storage encryption. Data encryption is implemented using the AWS EBS disk encryption feature. Encryption keys are fully managed by AWS and are not visible to Heroku or Heroku customers.

Heroku automatically encrypts data-at-rest at the disk level for most Heroku plans; however, for customers with advanced encryption needs, there is the BYOK feature for Heroku data add-ons. This feature allows customers to create and manage their own Customer Managed Key (CMK) and the ability to disable the CMK which makes all data encrypted by the key inaccessible.
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Configuration - application configuration and settings
  • Data - data stored in Heroku managed data services
  • Other - backup capabilities of add-ons vary by provider
Backup controls
Heroku performs automatic backups of the platform, customer application configuration, and Heroku data services attached to applications. Customers can trigger additional backups on a manual or scheduled basis.

Every Heroku database on the Standard tier or higher comes with an automatic Continuous Protection mechanism that captures physical backups for disaster recovery. Heroku uses physical backups for continuous protection by persisting incremental snapshots or base backups of the file system, and write ahead log (WAL) files to external, reliable storage. Snapshots are taken on most databases while the database is fully available and makes a verbatim copy of the instance’s disk.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Each application on the Heroku platform runs within its own isolated environment and cannot interact with other applications or areas of the system. This restrictive operating environment is designed to prevent security and stability issues. These self-contained environments isolate processes, memory, and the file system using Linux containers (LXC), while host-based firewalls restrict applications from establishing local network connections.

Customer data is stored in separate access-controlled databases per application. Each database requires a unique username and password that is only valid for that specific database and is unique to a single application.

Availability and resilience

Guaranteed availability
We'll use commercially reasonable efforts to make the online Purchased Services available 24 hours a day, 7 days a week.

Applications deployed on the Heroku Services and Customer Data submitted to the Heroku Services, up to the last committed transaction, are automatically replicated on a near real-time basis at the database layer and are backed up as part of the deployment process on secure, access controlled, and redundant storage
Approach to resilience
The Heroku platform is designed for stability, scaling, and inherently mitigates common issues that lead to outages while maintaining recovery capabilities. The platform maintains redundancy to prevent single points of failure, is able to automatically replace failed components, and utilises multiple data centres designed for resiliency. In the case of an outage, the platform is deployed across multiple data centres using current system images and data is restored from backups. Heroku reviews platform issues to understand the root cause, impact to customers, and improve the platform and processes. In the event of an interruption of Heroku services, details are posted on the status page: https://status.heroku.com/

The Heroku platform itself is designed to provide highly available and redundant services, so that applications and databases may be replicated quickly in the event of an outage.

Production data centers used to provide the Heroku Services have access system controls in place. These systems permit only authorised personnel to have access to secure areas. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, are secured by around-the-clock guards, two-factor access screening, and escort-controlled access, and are also supported by on-site back-up generators in the event of a power failure.
Outage reporting
Status website, RSS feed and X

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Username or password
  • Other
Other user authentication
Access to the Heroku Services requires a valid user ID and password combination, which are encrypted via SSL/TLS while in motion and passwords are stored using a one-way salted hash. Alternatively, Heroku supports Single Sign On (SSO) utilizing SAML 2.0 which uses Public Key Encryption and does not require Heroku to store a password. Following a successful authentication, a randomly generated credential is transmitted to the user’s browser or command line interface (CLI). All subsequent requests are authenticated with that credential.
Access restrictions in management interfaces and support channels
Management access to services is restricted to specific personnel - fine grained control over which systems they have access to is in-place. Strong security rotation policies are in place and access to maintain the platform is only completed from authorised machines over secure channels. Heroku Support personnel only have access to customer applications if the customer gives them permission to do so.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
Access restriction involves utilising the Kerberos security system. Authentication through Kerberos is mandatory for certain roles to perform administrative tasks.

There are no login credentials to access customer production data, rather they have separate login credentials to their interface accomplished through a proprietary login credentialing system.
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
EY CertifyPoint.
ISO/IEC 27001 accreditation date
January 25, 2024
What the ISO/IEC 27001 doesn’t cover
Listing of current exclusions within the ISO27001 Statement of Applicability available to view at https://compliance.salesforce.com/en/documents/a006e000010P47JAAS
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Coalfire Systems Inc.
PCI DSS accreditation date
27th July 2023
What the PCI DSS doesn’t cover
No exclusions
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • SOC 1, 2, 3
  • ISO27017
  • ISO27018
  • SOC 2
  • HDS
  • NEN-7510
  • ISMAP
  • APEC Processor Seal

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO 27017
ISO 27018
NEN7510
SOC 1,2, 3
HDS Certificate
PCI DSS
UK Cyber Essentials Plus
Data Privacy Framework (DPF) Program
HIPAA
CSA STAR
Information security policies and processes
Salesforce's information security policies are based on the ISO 27002 framework of best practices and are ISO 27001 certified. The EVP of Security has responsibility for the information security policies and ISMS. The Salesforce Security Steering Committee approves/authorizes all changes to the policies, the Statement of Applicability (SoA), the information security manual, and any separate policy statements. During the ISO 27001 audit process (as well as other audits such as SOX and SSAE 16 SOC 1), Senior Management for various departments are involved in verifying that policies and procedures are in place and adhered to. Policies are reviewed/approved at least annually.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Changes to Salesforce products in pre-production and production environments and data centers, including changes to applications, information systems, network topologies, configurations, and data center facilities, must be managed by a documented change control process and approved change management system.

The Heroku Security team performs change management in line with the Salesforce change management standards which closely align with the ITIL framework. Change Management processes dictate that system changes and maintenance are documented in Salesforce’s internal ticketing system. Changes require approval, security impact and risk analysis and testing prior to deployment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The vulnerability management process is designed to remediate risks without customer interaction or impact. Heroku is notified of vulnerabilities through internal and external assessments, system patch monitoring, and third party mailing lists and services.

Each vulnerability is reviewed to determine if it is applicable to Heroku’s environment, then it is categorised according to risk management and assigned to the appropriate team for resolution.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Heroku security and engineering staff monitor various tools and log feeds to detect anomalous behaviour. The teams review authentication events, sudo requests, data traffic patterns, and other data sources. More detail to specific questions available on request.
Incident management type
Supplier-defined controls
Incident management approach
Salesforce has a formal Incident Management Process that guides the Salesforce Computer Security Incident Response team in investigation, management, communication, and resolution activities.

Salesforce will promptly notify the customer in the event of any security breach of the Service resulting in an actual or reasonably suspected unauthorized disclosure of Customer Data. Notification may include phone contact by Salesforce support, email to customer's administrator and Security Contact and public posting on trust.salesforce.com.

Salesforce.com is a member of the prestigious Forum of Incident Response and Security Teams (FIRST) and complies with the FIRST framework and best practices for incident response.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
Linux containers (LXC)
How shared infrastructure is kept separate
Each application on the Heroku platform runs within its own isolated environment and cannot interact with other applications or areas of the system. This restrictive operating environment is designed to prevent security and stability issues. These self-contained environments isolate processes, memory, and the file system using Linux containers (LXC), while host-based firewalls restrict applications from establishing local network connections. Infrastructure uses a fully virtualized hardware provided by AWS.

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.

We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.

We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.

At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.

In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.

Tackling economic inequality

As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.

We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.

We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.

We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.

For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.

We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.

Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.

Equal opportunity

Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.

Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.

Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.

Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.

Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.

Wellbeing

At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.

Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.

Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.

Pricing

Price
£25.53 a unit a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Yes

Fully functional limited by time, or limited user without expiry
Link to free trial
Please contact us for a current link

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psitq@softcat.com. Tell them what format you need. It will help if you say what assistive technology you use.