Software AG (UK) Limited

Software AG - Cloud Ready SIAM Management Tool

Whether the SIAM service capability is managed in-house or by an external 3rd party, there is an absolute need for Business and IT synchronization.To execute SIAM correctly there needs to be thorough understanding of the current landscape and what the future landscape look like correlating to the required business objectives.


  • Enterprise Architecture Management as Business Decision Enabler
  • Real-time picture of the current state of the EA landscape
  • Real time view of all applications, technologies and processes
  • Future-state IT infrastructure modeling and analysis supporting business planning
  • Project management with milestones, priorities and measurement
  • Provides IT governance, risk, security and compliance capability
  • Provides IT financial management including ROI, OPEX and CAPEX evaluation
  • Multi Sourcing Management
  • Service disaggregation management


  • Identification on the impact of portfolio change on other portfolios
  • Identification on the impact of portfolio change on other portfolios
  • Platform for collaborative content and coordinated stakeholder alignment
  • Platform for collaborative content for different stakeholders road maps
  • Links business capabilities to supporting applications, technologies ensuring alignment
  • Enables and manages Service disaggregation and multi sourcing requirements


£200 to £1500 per user per month

Service documents


G-Cloud 11

Service ID

1 7 9 7 7 0 4 0 3 5 3 3 2 4 1


Software AG (UK) Limited

Steve McReavy

07584 337122

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Software AG's Digital Busienss Platform which includes but not limited to : -
API mgmt

connects customers existing application and data sets together to achieve business and technical Transformation.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None - Software AG offers a flexible deployment model that can be suited to the customer requirements. This includes Public, Private or Hybrid cloud deployments using a variety of technologies.
System requirements
System requirements not applicable as are managed cloud solutions.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are SLA specific and dependent on overall solution needs.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
With standard support offerings, Software AG provides 4 Support levels termed as Critical Priority, High Priority, Medium Priority and Low Priority - all of which have target response times derailed in the SLA. Standard Support comes with the product for a standard fee. For more tailored support, clients can selects a Managed Service option whereby the SLA’s and response times are configured in accordance with their requests. This service can include aspects such as Technical Account Manager, Capacity Management and any other service the client might want to add. The fee for the managed service is determined by the service required.
Support available to third parties

Onboarding and offboarding

Getting started
Standard Training and Full documentation provided - Training and documentation and video's can also be tailored/ created to meet specific customer requirements. Train the trainer is also available upon request.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Open standard exporting of Data can be provided at Contract end using tooling capability.
End-of-contract process
At end of contract - customer typically decide to continue with the service. Alternatively they can choose to export the data for example to another Service Provider. Software Ag is happy to assist with this process.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All applications have been optimised to work with both Android and iOS
User experience can be designed to ensure that the user interface is optimised to be used on the mobile device.
Service interface
What users can and can't do using the API
A cloud-based service enabling instant, intuitive management of IT portfolios. Best practices and end-to-end guidance for collecting, connecting and assessing available data to support IT and business decision-making.
• Application inventory: Manage inventory data using intuitive wizards and workflows. Business, technology, information and functional perspectives, among others, are supported. Monitors and reports ensure inventory completeness and data quality. An import/export framework supports initial load and synchronisation with other sources.
• Stakeholder support: Web, mobile portals access to information on the application landscape. Application life-cycle reports enable technology owners to align their technology support plans and to understand application road-map impacts. Ad-hoc reporting.
• Portfolio assessments: Analyse the portfolio along multiple dimensions, such as technology health, cost, risk, usage and business fit. A multitude of diagram and report types support making and communicating decisions. Adding new information attributes on the fly supports ad-hoc application assessments.
• Portfolio governance: Manageable portfolios are created with clear responsibility for capturing information, assessing portfolios and decision-making. Standard business portfolios are supported, e.g., along business capability or organisational responsibility, as well as ad-hoc portfolios. Workflows and monitors for portfolio governance. Support processes, such as approving application usage and processing of change requests, increases accountability and efficiency.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
  • Other
API sandbox or test environment
Customisation available
Description of customisation
End user interfaces - look and feel can be completely customised and branded.


Independence of resources
Scoping and on-boarding processes define the optimum specification for the customers requirements. The required amount of computer capacity is assigned to the customer. software AG technology is fully equipped to leverage via AWS scalable hosting


Service usage metrics
Metrics types
Software Cloud Operations provides SLA performance monitoring for AWS cloud resources and the applications executed by customers and publishes our most up-to-the-minute information on service availability on the Service Health Dashboard. AWS Cloudwatch provides monitoring for AWS cloud resources and the applications customers execute on AWS - Refer to for additional details
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Exporting of Data can be achieved using open standards for example CSV and SQL formats
Data export formats
  • CSV
  • Other
Other data export formats
SQL formats
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
99.99, assured by contractual commitment
Approach to resilience
Software AG’s cloud services provide 99.95% infrastructure availability (over AWS) and 99.5% availability for the solution itself
Outage reporting
Software AG’s Cloud Trust Centre website provides web-based access to
• Live data on our cloud system availability
• Current and historical information on system performance

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Authentication is required and is implemented access cloud accounts and account activities are logged using AWS Cloud Trail services. In addition, The cloud product permits the configuration of a connection to customer's Single Sign On Services through an Identity Federation Capability via SAML2. In addition, the AWS Identity and Access Management (IAM) service provides identity federation to the AWS Management Console. Multi-factor authentication is an optional feature that a customer can utilize. A certification based authentication is not required
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Compliant with customers private cloud secuity arrangements

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security testing and policies
(SOC) Type II, independent third-party auditor certification 
AICPA Trust Services 
Implement and maintain a standards based ISMS 
Comply with (IaaS) provider, Amazon Web Services security policy 
Cloud Security Alliance (CSA) 
CSA Consensus Assessment Initiative Questionnaire (CAIQ)
Security testing type
Penetration testing 
IT Health Checks 
Risk analysis 

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration management and change management approach
Behind the scenes, Software AG’s Cloud Service Operations team manages our cloud offerings so the customer doesn't have to. The standard included services are:
• Regular upgrades to latest software versions (following product release cycle)
• Seamless patching during maintenance windows to minimize vulnerabilities or bug impact
• Performance monitoring
• Service continuity and recovery procedures for high up-time
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Software AG’s Cloud Service Operations team carries out Seamless patching during maintenance windows to minimize vulnerabilities or bug impact.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our auditor’s SOC 2 Type II report certifies the operational effectiveness of our systems that keep your sensitive data secure. This provides a high level of transparency into our controls that mitigate operational and compliance risks. Because it requires an attestation by an independent and objective CPA who bears professional liability for his or her opinion, the SOC 2 is more stringent and credible than other types of reporting on information security controls.
Incident management type
Incident management approach
All Cloud Products are covered by Software AG's Standard Support Agreement. Support issues should be raised through Software AG’s customer service portal, Empower, which is available 24x7. Three levels of support are available, with standard support offering 24x7 access to the support portal, 9 to 5 telephone support for standard and critical incidents and 24x7 support service for crisis incidents

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£200 to £1500 per user per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑