Solace Systems, Inc

PubSub+ Event Mesh and Event Messaging Starter version

Starter-grade messaging as a service, on demand in your favorite public and virtual private clouds, provided by Event brokers which are modern message brokers that support event-driven message exchange patterns across a variety of applications, devices and environments.


  • Request-reply, publish-subscribe
  • Queueing, streaming
  • Open API support (AMQP, MQTT, REST, JMS, WebSocket)
  • Legacy application integration
  • Event mesh, event broker
  • Message broker
  • Microservices, microservice gateway
  • Event driven architectures - EDA
  • Internet of Things - IoT
  • Hybrid-cloud, multi-cloud


  • We engineer it to be secure, resilient, and cost-optimized
  • We dynamically deploy, upgrade, patch, and operate
  • PubSub+ Cloud provides performant, flexible, elastic and scalable event brokers
  • Managed IoT messaging infrastructure
  • Bi-directional event based communication between connected devices and applications
  • Unifies the movement of data across core and edge
  • Interoperable deployment options (software, appliances, cloud, as a service)
  • Built-in high availability and disaster recovery
  • Built-in centralised monitoring and management across all deployment environments
  • Native multi-protocol support enabling integration of new and legacy platforms


£0.015 per unit per hour

Service documents


G-Cloud 11

Service ID

2 3 9 9 2 5 2 0 4 3 1 6 3 3 0


Solace Systems, Inc

Michael Hayward

07966 980009

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints N/a
System requirements N/a

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 1 hour
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible N/a
Web chat accessibility testing N/a
Onsite support Yes, at extra cost
Support levels Silver Support option is £2,250/annum.
Solace Silver Support Plan for FREE Software Products (PubSub+ Standard). Major and minor software upgrades and maintenance releases, email support, business hour support only, next day of business response. This plan is one year in duration, renewable annually.

Platinum+ -
Solace provides a technical account manager for large customers
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The service has built in documentation and usage samples in addition to comprehensive online user documentation, quick-start guides, and free basic online training.

Solace also provide a wide range of formal training options both classroom based and online (on-premise or public) to help onboard customers.

Professional Services can also be used to supplement complex engagements.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Customers can extract any of their data in the service using open APIs.
End-of-contract process The right to use the service terminates

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The service is not affected by using a mobile or desktop device.
Service interface Yes
Description of service interface Solace Cloud provides both web and API interfaces which can be used to programmatically provision and manage new or existing services and to control billing and user accounts.
Accessibility standards None or don’t know
Description of accessibility Browser based web UI and API interfaces without restrictions.
Accessibility testing N/a
What users can and can't do using the API A number of standards based APIs can be used to interact with the service. Solace Management APIs can be used to fully configure and manage the service.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The nature of the service is that it is both ready use out of the box but can be customised to meet even the most complicated user requirements.


Independence of resources Solace provides Enterprise customers with a single tenanted environment and uses elastic Cloud Native services to scale to meet traffic demands.


Service usage metrics Yes
Metrics types Resource usage against quota.
Throughput and performance of the platform.
Health and status information.

Technical usage statistics such as connected devices/users, event/message rates, data volumes in/out, storage used etc.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Solace is a event/message distribution platform, in-flight data is sent and received using open standards based APIs. Configuration data can be extracted through management APIs (REST/HTTP based).

Organisation or user specific data used to define access roles and permissions within the service can also be extracted via REST APIs.
Data export formats Other
Other data export formats
  • JSON
  • XML
  • Events/messages will be in the same format as published
Data import formats Other
Other data import formats
  • Events/messages are sent to Solace via open standards based APIs
  • Organisational and user data can be imported through REST/HTTP APIs

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks The platform can be deployed into any public, private or community cloud or network therefore a wide range of connectivity options are available which can include protections such as IPsec tunnels and VPNs etc.
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.999% uptime guarantee within an HA topology. If deployed into private or community clouds the SLA's can vary.
Approach to resilience Available on request (depends on deployment environment).
Outage reporting Public dashboard, APIs and email alerts provide service reports on outages.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Users must authenticate before access is granted to their Management Portal. All user accounts are unique with unique identifiers. Authenticated users only have access to their own user account and not to any other user accounts. Authenticated users can only self-manage their own service.
Access restriction testing frequency Less than once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards .
Information security policies and processes We have a Corporate Security Policy which provides information, guidance, and direction on how to securely conduct work at Solace and help protect our assets.
The Director of IT and Cybersecurity, with approval from senior management, is responsible for this Policy.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We use a ticketing system (Jira Service Desk) to track all requests and changes. As these requests and changes are processed, they are evaluated against security risk.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We use industry standard tools (e.g. Nessus) to continuously scan for vulnerabilities. Results are tracked in our ticketing / change management system.
In addition we have a SIEM system deployed, which is actively looking for threats.
Threat intel comes from a variety of sources including Email lists, advisories, and other internet sources.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have a SIEM system deployed which is fed information from our assets, processed, and risks are alerted on. High risks are acted on ASAP.
Incident management type Supplier-defined controls
Incident management approach This is currently being formalized.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £0.015 per unit per hour
Discount for educational organisations Yes
Free trial available Yes
Description of free trial 50 Connections
4 Mbps
Shared Infrastructure
Silver Support (optional but chargeable)
Link to free trial

Service documents

Return to top ↑