Slowhorse Ltd

Enterprise Architecture Tools & Consultancy

Provision of Enterprise Architecture Cloud-based tooling & associated consultancy services. Slowhorse Ltd will provide an Enterprise Architecture Cloud hosted toolset and, where required, the consultancy services to maximise the value of this tooling.

Features

  • Delivering an enterprise-level view of the ICT estate
  • Tracking business services through to technology services
  • Managing technology lifecycles and technical obsolescence

Benefits

  • Define the critical business services in your organisation
  • Understand the technology linked to delivering business services
  • Identify risks associated with technical obsolescence
  • Clearly articulation the health of the ICT estate
  • Model the business from the organisation's underlying data sources

Pricing

£2,000 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.whitby@slowhorse.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

1 7 9 7 0 8 1 5 6 4 4 2 5 2 6

Contact

Slowhorse Ltd Ian Whitby
Telephone: 07760478005
Email: ian.whitby@slowhorse.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
N/A
System requirements
  • Buyers will be required to procure the hosted software solution
  • Buyers will require VPN connections to the hosted solution

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Weekend and Out of Office Hours support are offered.
Terms and response times will be based on the client's requirements.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support is provided:

ENHANCED SUPPORT
- 7 days / week (08:00-18:00 GMT)

STANDARD SUPPORT
- Mon - Fri (08:00-18:00 GMT)

Support costs are dependant upon the client's specific requirements.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Enterprise Architecture tooling will be offered to the client together with consultancy services on the correct use of the product. Training may be provided as onsite presentations; workshops; one-to-one or group training sessions. Documentation will be made available online and as downloadable content.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The client will have a System Administrator role for the service and be able to download, modify or delete their data as required from the underlying data repository.

Where required consultancy can be offered to assist in the extraction of client data.
End-of-contract process
The client contract provides access to enterprise architecture toolset.
Four weeks prior to the end of the contract the client will be made aware of the impending termination. The client will, as System Administrator, have the opportunity to remove all client data from the enterprise architecture tool prior to termination.

Upon contract termination the client will lose all access to the Enterprise Architecture tool provided by Slowhorse Ltd.

Following the termination of the contract Slowhorse Ltd will create a full download of the client's data still held within the Enterprise Architecture tool at the point of termination and make this available to the client as a digital download.

Following this digital download all data remaining within the client's enterprise architecture tool will be deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
Yes
Description of customisation
The product stores information on Enterprise Architecture artefacts (e.g. business services; application processes; technology objects) within a central database repository.

The customer is able to both customise the attributes that are stored and to modify how these are presented to the audience. The presentation interface includes a highly configurable Microsoft Power BI component which is both powerful and intuitive.

Scaling

Independence of resources
The service is Cloud-hosted managed service. The infrastructure is initially sized to allow for the client's expected peak demand. However the infrastructure is monitored for increases in demand and will respond by instantiating addition hardware resources if demand exceeds the safe operating limits placed on the deployed hardware.

Analytics

Service usage metrics
Yes
Metrics types
As a minimum the service provides metrics on:

*) Service user activity
*) Checked out documents/objects/diagrams
*) Created documents/objects/diagrams
*) Helpdesk tickets (Open tickets; Closed Tickets; Response Rates; Resolution Rates)
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The client will be granted a System Administrator role. This role will allow the upload or download of user data to the Cloud-based platform.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Service Level Agreements are offered to reflect the SLAs offered by vendors of the underlying tooling. Slowhorse Ltd will make these agreements available prior to the procurement of the service.
Approach to resilience
Data resilience information is available upon request.
Outage reporting
Service outages are scheduled in coordination with the client. Slowhorse Ltd will work with the client to ensure each outage is notified within the defined notification window and that the circulation of this information reaches all individuals named by the client.

For most clients outage notifications are coordinated by their own System Administrator who we work with to align to the client's needs.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Aligned to industry best practice
Access restriction testing frequency
Less than once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Security governance is aligned to CESG best practise.
Information security policies and processes
Aligned to CESG best practice

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Aligned to ITIL processes
Vulnerability management type
Undisclosed
Vulnerability management approach
Aligned to industry best practice
Protective monitoring type
Undisclosed
Protective monitoring approach
Aligned to industry best practice
Incident management type
Undisclosed
Incident management approach
Aligned to industry best practice

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£2,000 a user a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.whitby@slowhorse.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.