PubSub+ Event Mesh and Event Messaging Starter version
Starter-grade messaging as a service, on demand in your favorite public and virtual private clouds, provided by Event brokers which are modern message brokers that support event-driven message exchange patterns across a variety of applications, devices and environments.
- Request-reply, publish-subscribe
- Queueing, streaming
- Open API support (AMQP, MQTT, REST, JMS, WebSocket)
- Legacy application integration
- Event mesh, event broker
- Message broker
- Microservices, microservice gateway
- Event driven architectures - EDA
- Internet of Things - IoT
- Hybrid-cloud, multi-cloud
- We engineer it to be secure, resilient, and cost-optimized
- We dynamically deploy, upgrade, patch, and operate
- PubSub+ Cloud provides performant, flexible, elastic and scalable event brokers
- Managed IoT messaging infrastructure
- Bi-directional event based communication between connected devices and applications
- Unifies the movement of data across core and edge
- Interoperable deployment options (software, appliances, cloud, as a service)
- Built-in high availability and disaster recovery
- Built-in centralised monitoring and management across all deployment environments
- Native multi-protocol support enabling integration of new and legacy platforms
|Software add-on or extension||No|
|Cloud deployment model||
|Email or online ticketing support||Email or online ticketing|
|Support response times||Within 1 hour|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||N/a|
|Web chat accessibility testing||N/a|
|Onsite support||Yes, at extra cost|
Silver Support option is £2,250/annum.
Solace Silver Support Plan for FREE Software Products (PubSub+ Standard). Major and minor software upgrades and maintenance releases, email support, business hour support only, next day of business response. This plan is one year in duration, renewable annually.
Solace provides a technical account manager for large customers
|Support available to third parties||Yes|
Onboarding and offboarding
The service has built in documentation and usage samples in addition to comprehensive online user documentation, quick-start guides, and free basic online training.
Solace also provide a wide range of formal training options both classroom based and online (on-premise or public) to help onboard customers.
Professional Services can also be used to supplement complex engagements.
|End-of-contract data extraction||Customers can extract any of their data in the service using open APIs.|
|End-of-contract process||The right to use the service terminates|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The service is not affected by using a mobile or desktop device.|
|Description of service interface||Solace Cloud provides both web and API interfaces which can be used to programmatically provision and manage new or existing services and to control billing and user accounts.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Browser based web UI and API interfaces without restrictions.|
|What users can and can't do using the API||A number of standards based APIs can be used to interact with the service. Solace Management APIs can be used to fully configure and manage the service.|
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||The nature of the service is that it is both ready use out of the box but can be customised to meet even the most complicated user requirements.|
|Independence of resources||Solace provides Enterprise customers with a single tenanted environment and uses elastic Cloud Native services to scale to meet traffic demands.|
|Service usage metrics||Yes|
Resource usage against quota.
Throughput and performance of the platform.
Health and status information.
Technical usage statistics such as connected devices/users, event/message rates, data volumes in/out, storage used etc.
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
Solace is a event/message distribution platform, in-flight data is sent and received using open standards based APIs. Configuration data can be extracted through management APIs (REST/HTTP based).
Organisation or user specific data used to define access roles and permissions within the service can also be extracted via REST APIs.
|Data export formats||Other|
|Other data export formats||
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||
|Other protection between networks||The platform can be deployed into any public, private or community cloud or network therefore a wide range of connectivity options are available which can include protections such as IPsec tunnels and VPNs etc.|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||99.999% uptime guarantee within an HA topology. If deployed into private or community clouds the SLA's can vary.|
|Approach to resilience||Available on request (depends on deployment environment).|
|Outage reporting||Public dashboard, APIs and email alerts provide service reports on outages.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Users must authenticate before access is granted to their Management Portal. All user accounts are unique with unique identifiers. Authenticated users only have access to their own user account and not to any other user accounts. Authenticated users can only self-manage their own service.|
|Access restriction testing frequency||Less than once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||.|
|Information security policies and processes||
We have a Corporate Security Policy which provides information, guidance, and direction on how to securely conduct work at Solace and help protect our assets.
The Director of IT and Cybersecurity, with approval from senior management, is responsible for this Policy.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We use a ticketing system (Jira Service Desk) to track all requests and changes. As these requests and changes are processed, they are evaluated against security risk.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
We use industry standard tools (e.g. Nessus) to continuously scan for vulnerabilities. Results are tracked in our ticketing / change management system.
In addition we have a SIEM system deployed, which is actively looking for threats.
Threat intel comes from a variety of sources including Email lists, advisories, and other internet sources.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||We have a SIEM system deployed which is fed information from our assets, processed, and risks are alerted on. High risks are acted on ASAP.|
|Incident management type||Supplier-defined controls|
|Incident management approach||This is currently being formalized.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£0.015 per unit per hour|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
Silver Support (optional but chargeable)
|Link to free trial||https://console.solace.cloud/login/new-account|