APPTechnology

Legacy Application Management Service - Private or Public Cloud

Legacy by APPtechnology enables your 16 Bit and 32 Bit complex business critical applications to be securely provided to your users, overcoming compatibility and platform support issues. Hosting your Legacy applications for delivery to Windows 10, using a combination of toolsets (Droplet, Glassware or Browsium) and APPtechnology managed services.

Features

  • Any application from any platform to any device
  • Includes 16 Bit and 32 Bit applications
  • Desktop OS, server OS or mainframe applications supported
  • Allows managed interaction between legacy application and modern desktop
  • Windows , MacOS or Andriod clients, or HTML5 configurations
  • Virtual Appliance based solution, Azure or VDI options
  • Cloud Scalable, with Private or Public options
  • Cloud, Physical or Hybrid approach
  • Legacy Solution based on Glassware, Droplet or Browsium Software
  • Fix once, irrespective of user operating system

Benefits

  • SLA Based secure provisioning of your Legacy Applications
  • Scalable Solution to manage your apps until their retirement
  • Cost effective approach compared to redevelopment
  • Removes the security profile risk of Legacy applications
  • Full Disater Recovery resilience
  • Legacy Solution can host multiple applications
  • Applications can be retired or replaced as required
  • Offline use and data sync options available

Pricing

£15.25 per user

  • Free trial available

Service documents

G-Cloud 10

173118005191505

APPTechnology

Martin Sweeney

0207 469 4053

martin.sweeney@apptechnology.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints None - Glassware can deliver your Legacy applications, hosted in an in support and secure server to any device that has HTML5 access.
System requirements
  • Hosting of virtual appliance in your private cloud
  • Microsoft Windows licensing can be included or utilise your EA

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical - response within one hour. Serious - response within 3 hours. Moderate - response within 48 hours.
Support service hours are available 24x7 Monday to Friday, excluding public holidays. Calls made outside of service hours will be re-directed to our out of hours call answering service where you will be able to log an incident. A Support Engineer will then contact you back either via phone or email during service hours. If you are on our support service and you have a critical issue, a Support engineer will contact you back within 1 hour of logging an incident
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels P1 Critical - Submit via Phone. 1st call response: Within 1 hour, during manned service desk hours.

P2 Serious - Submit via Phone. 1st call response: Within 3 hours, during manned service desk hours.

P3 Moderate - Submit via Phone or Email. 1st call response: Within 48 hours, during service hours
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started A Proof of Concept engagement will demonstrate your application functioning on your target systems. The Glassware 2.0 solution is then implemented in your private cloud (or Hybrid combination of Physical and Virtual appliances), and your Legacy application(s) are imported into the system. Operational training to cover deployment is given, along with packaging training to allow administrators to add further applications as required.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction There is no user data retained within the virtual appliance. User access control is via your corporate AD. Any data related to the functioning of your legacy application is handled by either live integration with your internal Database systems or by folder redirection.
End-of-contract process Subject to no extensions, licensing will reduce the functionality of the Legacy system and alert your administrators.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Chrome
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None - provision of Legacy applications is to any device that supports HTML5
Accessibility standards None or don’t know
Description of accessibility Administrators can view performance of Legacy application provisioning by accessing the web portal interface. Target users interact with their Legacy applications in the same manner as they did when installed on their old OS devices.
Accessibility testing None
API No
Customisation available Yes
Description of customisation Subject to the licensing model chosen, system capacity and application requirements, administrators can add further applications to the Legacy system, thereby increasing it's application scope.

Scaling

Scaling
Independence of resources Scalability is built into the design of your Legacy Application Solution.

Analytics

Analytics
Service usage metrics Yes
Metrics types Web portal available to administrators showing current activity and history.
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Sphere3D

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Not applicable
Data export formats Other
Other data export formats Not applicable
Data import formats Other
Other data import formats Not applicable

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks Not Applicable, Solution is hosted within your own private cloud.
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Solution is hosted on your private cloud, so your own cloud uptime is the restricting factor. If using a hardware and private cloud design then full datacentre DR capability to ensure uptime is available. Software support and SLA levels are within the EULA.
Approach to resilience Resilience is built into the design and capacity of the Solution. We can leverage your private cloud, and include multi DC DR resilience, with seamless user handover incorporated.
Outage reporting Internal Web Portal

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Other
Other user authentication Users are authenticated by your Active Directory
Access restrictions in management interfaces and support channels Administrator access controlled by internal policy or your Active Directory based on requirements.
Access restriction testing frequency At least once a year
Management access authentication
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Cyber Essentials Plus
Information security policies and processes Internal Data Protection Policy

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Supplier defined controls
Vulnerability management type Supplier-defined controls
Vulnerability management approach Annual assessment via Cyber Essentials Plus
Protective monitoring type Supplier-defined controls
Protective monitoring approach Supplier defined controls
Incident management type Supplier-defined controls
Incident management approach Pre defined supplier processes

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £15.25 per user
Discount for educational organisations No
Free trial available Yes
Description of free trial For standalone Legacy applications we can demonstrate the Solution provisioning your application to a target platform. For Enterprise legacy applications with back end and live data connectivity this requires a Proof of Concept engagement.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑