Software AG (UK) Limited

Software AG - webMethods.io CloudStreams

webMethods.io CloudStreams consists of sophisticated connection management with pre-built Connectors to many popular SaaS applications to easily use the often complex SaaS APIs. . It also provides a wizard driven approach to creating custom SaaS connectors and the ability to easily update connectors to new versions of API.

Features

  • SaaS connectivity with a huge library of pre-built connectors
  • Standard connector framework for creating custom connectors
  • Manage and simplify often complex SaaS vendor APIs
  • SaaS connection management
  • Service orchestration, to create complex integrations
  • Mapping, transformation and enrichment of data
  • Graphical user interface
  • Secure on-premise connectivity to integrate SaaS and on-premise
  • Monitoring and reporting

Benefits

  • Faster business implementation of SaaS applications
  • Scales on demand to meet the requirements of the business
  • Quickly deploy existing webMethods integrations to the cloud
  • Lower TCO due to elimination of maintenance and upgrade projects
  • Greater reuse of existing integration investments
  • Greater flexibility since people can work from anywhere
  • Improved customer satisfaction by reducing errors caused by bad data
  • Support Citizen Integrators as well as IT Developers

Pricing

£1800 to £25000 per unit per month

Service documents

G-Cloud 11

101019833886442

Software AG (UK) Limited

Colm Roberts

01332 611000

colm.roberts@softwareag.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to WebMethods.io Cloud Deployment is an extension to Siftware AG's webMethods.io Integration iPaaS.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints None - Software AG offers a flexible deployment model that can be suited to the customer requirements. This includes Public, Private or Hybrid cloud deployments using a variety of technologies.
System requirements System requirements not applicable as are managed cloud solutions.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Depends on the level of support.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels With standard support offerings, Software AG provides 4 Support levels termed as Critical Priority, High Priority, Medium Priority and Low Priority - all of which have target response times derailed in the SLA. Standard Support comes with the product for a standard fee. For more tailored support, clients can selects a Managed Service option whereby the SLA’s and response times are configured in accordance with their requests. This service can include aspects such as Technical Account Manager, Capacity Management and any other service the client might want to add. The fee for the managed service is determined by the service required.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Standard Training and Full documentation provided - Training and documentation and video's can also be tailored/ created to meet specific customer requirements. Train the trainer is also available upon request.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Open standard exporting of Data can be provided at Contract end using tooling capability.
End-of-contract process At end of contract customers typically decide to continue with the service. Alternatively they can choose to export the data for example to another Service Provider. Software AG is happy to assist with this process.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices No
API Yes
What users can and can't do using the API A command line interface is available deploying services to the cloud. This is provided to enable the solution to fit in with organisation's continuous integration and continuous deployment (DevOps) practices.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Users can create custom connectors to non-supported SaaS solutions using the cloud connector framework.

Scaling

Scaling
Independence of resources Scoping and on-boarding processes define the optimum specification for the customers requirements. The required amount of computer capacity is assigned to the customer. software AG technology is fully equipped to leverage via AWS scalable hosting

Analytics

Analytics
Service usage metrics Yes
Metrics types Software Cloud Operations provides SLA performance monitoring for AWS cloud resources and the applications executed by customers and publishes our most up-to-the-minute information on service availability on the Service Health Dashboard. AWS Cloudwatch provides monitoring for AWS cloud resources and the applications customers execute on AWS - Refer to aws.amazon.com/cloudwatch for additional details.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Integrations created with the solution can be imported and exported from the administration browser screen as zip archive files.
Data export formats Other
Other data export formats Zip
Data import formats Other
Other data import formats Zip

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99.99, assured by contractual commitment
Approach to resilience Software AG’s cloud services provide 99.95% infrastructure availability (over AWS) and 99.5% availability for the solution itself.
Outage reporting Software AG’s Cloud Trust Centre website provides web-based access to
• Live data on our cloud system availability
• Current and historical information on system performance

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Authentication is required and is implemented access cloud accounts and account activities are logged using AWS Cloud Trail services. In addition, The cloud product permits the configuration of a connection to customer's Single Sign On Services through an Identity Federation Capability via SAML2. In addition, the AWS Identity and Access Management (IAM) service provides identity federation to the AWS Management Console. Multi-factor authentication is an optional feature that a customer can utilize. A certification based authentication is not required.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Compliant with customers private cloud secuity arrangements

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Security testing and policies
(SOC) Type II, independent third-party auditor certification 
AICPA Trust Services 
Implement and maintain a standards based ISMS 
Comply with (IaaS) provider, Amazon Web Services security policy 
Cloud Security Alliance (CSA) 
CSA Consensus Assessment Initiative Questionnaire (CAIQ)
Security testing type
Penetration testing 
IT Health Checks 
Risk analysis 
Other

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Behind the scenes, Software AG’s Cloud Service Operations team manages our cloud offerings so the customer doesn't have to. The standard included services are:
• Regular upgrades to latest software versions (following product release cycle)
• Seamless patching during maintenance windows to minimize vulnerabilities or bug impact
• Performance monitoring
• Service continuity and recovery procedures for high up-time
Vulnerability management type Supplier-defined controls
Vulnerability management approach Software AG’s Cloud Service Operations team carries out Seamless patching during maintenance windows to minimize vulnerabilities or bug impact
Protective monitoring type Supplier-defined controls
Protective monitoring approach Our auditor’s SOC 2 Type II report certifies the operational effectiveness of our systems that keep your sensitive data secure. This provides a high level of transparency into our controls that mitigate operational and compliance risks. Because it requires an attestation by an independent and objective CPA who bears professional liability for his or her opinion, the SOC 2 is more stringent and credible than other types of reporting on information security controls.
Incident management type Undisclosed
Incident management approach All Cloud Products are covered by Software AG's Standard Support Agreement. Support issues should be raised through Software AG’s customer service portal, Empower, which is available 24x7. Three levels of support are available, with standard support offering 24x7 access to the support portal, 9 to 5 telephone support for standard and critical incidents and 24x7 support service for crisis incidents.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1800 to £25000 per unit per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑