Salesforce - Heroku
Heroku, a Salesforce company enables developers to focus on application code and data instead of managing servers or operations. Code with agility in open source: Ruby, Node.js, Java, PHP and more. Deploy and scale on demand. Extend apps with 100s of different add-ons. Includes EU Model Contract Clauses. SFDCS2024GC14
Features
- Fully managed container runtime environment
- Scale, dynamically scale up or down instantly to meet demand
- Buildpacks, open source supported and supplied or build your own
- Config, manage specific configurations separately from your source code
- Deploy, with Git. We'll handle compilation, dependencies, assets and executables
- Fork, creates a duplicate instance of your application immediately
- Extend, over 100 add-ons, integrated to Heroku.
- Region, US, Europe and APAC, EU Model Contract Clauses supported
- Data sync into Salesforce Sales, Service, & Marketing Clouds
- Open source, Ruby, Node.js, Python, Java, PHP, Scala or Clojure
Benefits
- Efficient, Developers can focus on the app, not the infrastructure
- Skills, prevalent in the market giving you greater choice
- Community, active to help you learn and share code
- Cost, cheaper than hosting and supporting your own environment
- Agile, create new apps, then deploy on demand
- Platform, API automate/extend with services in a programmatic manner
- Security, Virtual Private Cloud, SSO with OAuth SAML & GDPR
- Flexibility, listed here avoiding lengthy credit-card approvals
- Heroku, Connect pre-built integration to the best of Salesforce
- Speed, scales to millions, exploit the AWS underpin
Pricing
£25.53 a unit a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 4 1 1 3 4 2 9 9 4 5 3 8 5 6
Contact
Softcat Limited
Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com
Service scope
- Service constraints
-
Usage Limits
Services and content are subject to usage limits, including, for example, the quantities specified in order forms.
A user’s password may not be shared with any other individual.
If you exceed a contractual usage limit, we may work with you to seek a reduction in your usage so that it conforms to that limit. If, notwithstanding our efforts, you are unable or unwilling to abide by a contractual usage limit, you will execute an order form for additional quantities of the applicable services or content promptly upon our request.
Full details are contained in our terms and conditions. - System requirements
-
- Heroku Dashboard - web based use any browser
- Heroku CLI - for Mac OSX, Windows, Debian/Ubuntu and standalone
- Heroku API - connect programatically
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Guaranteed 30 minute response time on urgent issues. Urgent support available 24x7. Within Business Hours receive deployment consultations, architectural guidance and best practices from Customer Solutions Architects.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- Urgent support available 24x7. Within Business Hours receive deployment consultations, architectural guidance and best practices from Customer Solutions Architects.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Customer Solutions Architects proactively assist customers onboard to the service - providing guidance on initial access and setup and continue to provide white glove support on an ongoing basis
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Dependent on the service being consumed. Code should alway exist outside of Heroku and should already be available - if not it can be extracted from applications on Heroku. Data stored in data services can be extracted using standard tools for the service being used. Extraction for add-on services will vary.
- End-of-contract process
- Off-boarding from the service will be specific to the nature of the code and service as deployed. The customer therefore always has access to the code, and the data held within the PaaS offering. Typically most customers use the supported databases in conjunction with Heroku, and as such data exports and backups can be taken as required. Code can be saved to GitHub such that off-boarding from Heroku is predictable. Being open source based Heroku can make your data available via an industry standard and easily readable format to make it as easy as possible for you to migrate to another service if you wish to do so.
Using the service
- Web browser interface
- Yes
- Using the web interface
- The Heroku Dashboard is the web user interface for Heroku’s core features and functionality. It provides UI support for things like creating/renaming/deleting apps, configuring add-ons, managing Heroku Teams, creating Heroku Pipelines, deploying your application, viewing and responding to application metrics, and accessing usage, invoices and billing information.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Heroku Services are developed with accessibility standard awareness - automated testing tools are used to validate errors and changes are made where necessary.
- Web interface accessibility testing
- No public information available.
- API
- Yes
- What users can and can't do using the API
- The platform API empowers developers to automate, extend and combine Heroku with other services. You can use the platform API to programmatically create apps, provision add-ons and perform other tasks that could previously only be accomplished with Heroku toolbelt or dashboard.
- API automation tools
-
- Ansible
- Chef
- Terraform
- Puppet
- Other
- Other API automation tools
-
- Jenkins
- Bamboo
- Codeship
- Travis
- Capistrano
- CircleCI
- VisualStudio
- Otto
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Other
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- The Heroku Command Line Interface (CLI), formerly known as the Heroku Toolbelt, is a tool for creating and managing Heroku apps from the command line / shell of various operating systems. All capabilities available in the API are available via the CLI.
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Heroku provides both single and multi-tenant instances. Single tenant instances are dedicated only for single customer use and isolated from the risk of 'noisy neighbours'. As a platform Heroku serves many billions of requests on a monthly basis.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
- Request Throughput
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Salesforce
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Other
- Other data at rest protection approach
-
Data is encrypted at rest by using AES-256, block-level storage encryption. Data encryption is implemented using the AWS EBS disk encryption feature. Encryption keys are fully managed by AWS and are not visible to Heroku or Heroku customers.
Heroku automatically encrypts data-at-rest at the disk level for most Heroku plans; however, for customers with advanced encryption needs, there is the BYOK feature for Heroku data add-ons. This feature allows customers to create and manage their own Customer Managed Key (CMK) and the ability to disable the CMK which makes all data encrypted by the key inaccessible. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Configuration - application configuration and settings
- Data - data stored in Heroku managed data services
- Other - backup capabilities of add-ons vary by provider
- Backup controls
-
Heroku performs automatic backups of the platform, customer application configuration, and Heroku data services attached to applications. Customers can trigger additional backups on a manual or scheduled basis.
Every Heroku database on the Standard tier or higher comes with an automatic Continuous Protection mechanism that captures physical backups for disaster recovery. Heroku uses physical backups for continuous protection by persisting incremental snapshots or base backups of the file system, and write ahead log (WAL) files to external, reliable storage. Snapshots are taken on most databases while the database is fully available and makes a verbatim copy of the instance’s disk. - Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
-
Each application on the Heroku platform runs within its own isolated environment and cannot interact with other applications or areas of the system. This restrictive operating environment is designed to prevent security and stability issues. These self-contained environments isolate processes, memory, and the file system using Linux containers (LXC), while host-based firewalls restrict applications from establishing local network connections.
Customer data is stored in separate access-controlled databases per application. Each database requires a unique username and password that is only valid for that specific database and is unique to a single application.
Availability and resilience
- Guaranteed availability
-
We'll use commercially reasonable efforts to make the online Purchased Services available 24 hours a day, 7 days a week.
Applications deployed on the Heroku Services and Customer Data submitted to the Heroku Services, up to the last committed transaction, are automatically replicated on a near real-time basis at the database layer and are backed up as part of the deployment process on secure, access controlled, and redundant storage - Approach to resilience
-
The Heroku platform is designed for stability, scaling, and inherently mitigates common issues that lead to outages while maintaining recovery capabilities. The platform maintains redundancy to prevent single points of failure, is able to automatically replace failed components, and utilises multiple data centres designed for resiliency. In the case of an outage, the platform is deployed across multiple data centres using current system images and data is restored from backups. Heroku reviews platform issues to understand the root cause, impact to customers, and improve the platform and processes. In the event of an interruption of Heroku services, details are posted on the status page: https://status.heroku.com/
The Heroku platform itself is designed to provide highly available and redundant services, so that applications and databases may be replicated quickly in the event of an outage.
Production data centers used to provide the Heroku Services have access system controls in place. These systems permit only authorised personnel to have access to secure areas. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, are secured by around-the-clock guards, two-factor access screening, and escort-controlled access, and are also supported by on-site back-up generators in the event of a power failure. - Outage reporting
- Status website, RSS feed and X
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Other
- Other user authentication
- Access to the Heroku Services requires a valid user ID and password combination, which are encrypted via SSL/TLS while in motion and passwords are stored using a one-way salted hash. Alternatively, Heroku supports Single Sign On (SSO) utilizing SAML 2.0 which uses Public Key Encryption and does not require Heroku to store a password. Following a successful authentication, a randomly generated credential is transmitted to the user’s browser or command line interface (CLI). All subsequent requests are authenticated with that credential.
- Access restrictions in management interfaces and support channels
- Management access to services is restricted to specific personnel - fine grained control over which systems they have access to is in-place. Strong security rotation policies are in place and access to maintain the platform is only completed from authorised machines over secure channels. Heroku Support personnel only have access to customer applications if the customer gives them permission to do so.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
-
Access restriction involves utilising the Kerberos security system. Authentication through Kerberos is mandatory for certain roles to perform administrative tasks.
There are no login credentials to access customer production data, rather they have separate login credentials to their interface accomplished through a proprietary login credentialing system. - Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- EY CertifyPoint.
- ISO/IEC 27001 accreditation date
- January 25, 2024
- What the ISO/IEC 27001 doesn’t cover
- Listing of current exclusions within the ISO27001 Statement of Applicability available to view at https://compliance.salesforce.com/en/documents/a006e000010P47JAAS
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Coalfire Systems Inc.
- PCI DSS accreditation date
- 27th July 2023
- What the PCI DSS doesn’t cover
- No exclusions
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- SOC 1, 2, 3
- ISO27017
- ISO27018
- SOC 2
- HDS
- NEN-7510
- ISMAP
- APEC Processor Seal
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
-
ISO 27017
ISO 27018
NEN7510
SOC 1,2, 3
HDS Certificate
PCI DSS
UK Cyber Essentials Plus
Data Privacy Framework (DPF) Program
HIPAA
CSA STAR - Information security policies and processes
- Salesforce's information security policies are based on the ISO 27002 framework of best practices and are ISO 27001 certified. The EVP of Security has responsibility for the information security policies and ISMS. The Salesforce Security Steering Committee approves/authorizes all changes to the policies, the Statement of Applicability (SoA), the information security manual, and any separate policy statements. During the ISO 27001 audit process (as well as other audits such as SOX and SSAE 16 SOC 1), Senior Management for various departments are involved in verifying that policies and procedures are in place and adhered to. Policies are reviewed/approved at least annually.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Changes to Salesforce products in pre-production and production environments and data centers, including changes to applications, information systems, network topologies, configurations, and data center facilities, must be managed by a documented change control process and approved change management system.
The Heroku Security team performs change management in line with the Salesforce change management standards which closely align with the ITIL framework. Change Management processes dictate that system changes and maintenance are documented in Salesforce’s internal ticketing system. Changes require approval, security impact and risk analysis and testing prior to deployment. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
The vulnerability management process is designed to remediate risks without customer interaction or impact. Heroku is notified of vulnerabilities through internal and external assessments, system patch monitoring, and third party mailing lists and services.
Each vulnerability is reviewed to determine if it is applicable to Heroku’s environment, then it is categorised according to risk management and assigned to the appropriate team for resolution. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Heroku security and engineering staff monitor various tools and log feeds to detect anomalous behaviour. The teams review authentication events, sudo requests, data traffic patterns, and other data sources. More detail to specific questions available on request.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Salesforce has a formal Incident Management Process that guides the Salesforce Computer Security Incident Response team in investigation, management, communication, and resolution activities.
Salesforce will promptly notify the customer in the event of any security breach of the Service resulting in an actual or reasonably suspected unauthorized disclosure of Customer Data. Notification may include phone contact by Salesforce support, email to customer's administrator and Security Contact and public posting on trust.salesforce.com.
Salesforce.com is a member of the prestigious Forum of Incident Response and Security Teams (FIRST) and complies with the FIRST framework and best practices for incident response.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- Linux containers (LXC)
- How shared infrastructure is kept separate
- Each application on the Heroku platform runs within its own isolated environment and cannot interact with other applications or areas of the system. This restrictive operating environment is designed to prevent security and stability issues. These self-contained environments isolate processes, memory, and the file system using Linux containers (LXC), while host-based firewalls restrict applications from establishing local network connections. Infrastructure uses a fully virtualized hardware provided by AWS.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.
We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.
We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.
At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.
In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.Tackling economic inequality
As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.
We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.
We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.
We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.
For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.
We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.
Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.Equal opportunity
Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.
Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.
Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.
Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.
Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.Wellbeing
At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.
Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.
Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.
Pricing
- Price
- £25.53 a unit a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Yes
Fully functional limited by time, or limited user without expiry - Link to free trial
- Please contact us for a current link