Fusion Business Solutions

BMC Client Management On Demand

Fusion GBS is a Platinum Partner of BMC, reselling BMC Client Management On Demand. BMC Client Management provides complete desktop, laptop and mobile device management helping organisations control hardware and software costs, avoid audit failure and maintain device security.

Features

  • Automated Endpoint Management
  • Asset Discovery
  • Asset Inventory
  • Patch Management
  • Software Licence Compliance
  • Remote Control Services

Benefits

  • Elimination of manual tasks and activities
  • Elimination of penalty fees for failed audits
  • Improvement in employee productivity
  • Automating processes results in improved quality over manual processes
  • Time savings for automation, data points to make better decisions
  • Increased productivity and job satisfaction
  • Ability to pass audits and prevent security breaches

Pricing

£1.26 per instance

  • Free trial available

Service documents

G-Cloud 10

264276801759083

Fusion Business Solutions

Michael Woods

0208 814 6170

michael.woods@fusion.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Planned maintenance window each month, mutually agreed with customer in advance. Although a monthly window is planned, it is used only as needed.
System requirements Supported browser version is required

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response targets based on the severity of the issue:
S1 15 Minutes
S2 30 minutes
S3 4 business hours
S4 16 business hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels BMC provides a 99.9% production availability service level agreement with service credits for breach.
Guaranteed response times for requests based on severity:
P1 - 15 mins
P2 - 30 mins
P3 - 4 business hours
P4 - 16 Business hours

Fusion provides additional support dependent on customer requirement.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started New users of the service will engage through Fusion Account Management and CTO Office to build a statement of work to deliver any required implementation service. Throughout each project roles and escalation paths are clearly defined ensuring that the customer has full visibility of the project status. Support, where required, is accessed through our in house support function and delivered by certified consultants. A full range of services are provided including Consulting, Implementation, Training, Communication Strategy, and Support.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction When the contract ends, data is returned to the customer upon request. The user needs to submit a service request through the BMC Support portal and ask for what data they want returned and in what format. Possible formats include a database backup file or a .csv file.
End-of-contract process Upon service expiration or termination, BMC will return customer data to the customer upon request. After the data is delivered, BMC will permanently remove the customer's data by destroying the database encryption keys and overwriting the data with binary zeroes.

There is no additional charge for this data extraction task.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices No
Accessibility standards WCAG 2.0 A
Accessibility testing Can be provided on request. Supplier needs to refer to BMC.
API Yes
What users can and can't do using the API BMC provides the following API solutions for the BCM platform:

REST API - the AR System server uses JavaScript Object Notation (JSON) format to transmit data between a server and a web application. The advantage of REST is having a limited number of operations for the interactions between clients and services.
Remedy AR System.

Additionally, integrations may be configured using:

Web Services: Third party applications can gather data from and exchange with the BMC database via REST (Representational State Transfer) API.

Open Database Connectivity (ODBC) Access: Third-party tools with appropriate permissions can access any information in the BMC database via ODBC.

Atrium CMDB Integration: Retrieve data from the Client Management database, transform it into data in the format required by the Atrium CMDB, and finally insert this data into the Atrium database.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available No

Scaling

Scaling
Independence of resources Each customer has its own instances of the OnDemand application(s), on dedicated virtual machines (VM) within a VLAN. Each VM is scaled to meet the needs of the individual customer, with a variety of monitoring tools used to proactively assess system performance.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold BMC Software

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The object nodes can be exported via file export in XML.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • PDF
  • HTML
Data import formats
  • CSV
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability BMC provides a 99.9% contracted availability service level agreement, with hour for hour service credits for breach.
Approach to resilience BMC Remedy OnDemand is designed from the ground up for high availability. This design starts with multiple hardened data centers,
followed by redundant hardware, and is completed with software that gracefully handles failures without impacting customers.
Our architecture ensures that most failures within the OnDemand cloud are completely transparent to users. This means that our
Disaster Recovery Plan is reserved for real disasters, not common failures.
Outage reporting Any planned outage is reported in advance. An unplanned outage is communicated by the BMC OnDemand Service Desk or Fusion Support Service via email and/or phone to the customer contact(s).

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels BMC requires individuals who access management interfaces to be registered with a valid BMC-customer email address.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 11/04/2017
CSA STAR certification level Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover None
PCI certification No
Other security certifications Yes
Any other security certifications
  • SSAE 16 SOC 2 Type II
  • Binding Corporate Rules (see http://www.bmc.com/legal/data-privacy-binding-corporate-rules.html)

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes BMC’s OnDemand offerings are designed based upon NIST (National Institute of Standards and Technology) NIST 800-53, Rev 4 controls and standards in order to provide enterprise grade security for our customers. BMC utilizes a defense in depth methodology that focuses on redundant controls to prevent and mitigate impacts to the confidentiality, availability, and integrity of customer data and services.

Adherence to BMC's security policies is governed by the BMC Information Systems Security Officer (ISSO). Policies are reviewed annually with signoff required by the ISSO and the VP of SaaS Operations. Employees are required to take online training quarterly.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach BMC's change management processes are governed by a Change Advisory Board (CAB). The CAB is a group comprised of BMC SaaS Operations representatives that advise the change management team about the risk and impact of all changes made to a customer system. Any change to the system requires a request for change (RFC) document, a formal proposal for the change that describes the details of the change, steps required to execute the change, and a backout plan.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach BMC OnDemand performs numerous checks against threat and vulnerability assessments, including monthly vulnerability scans against all internal systems, annual penetration tests from an authorized third-party, ongoing web application penetration tests, and application reviews for all major releases. Findings are reviewed by system owners as part of the monthly maintenance process.

BMC also subscribes to the IBM X-Force Threat Assessment Service (X-FTAS) and receives daily reports of all emerging threats. This report is reviewed daily by both Information Security teams and actions are taken according to the threat they pose to our environments.

Vulnerability patching is done as soon as possible.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach BMC uses specialized appliances to mitigate denial of service/distributed denial of service (DOS/DDOS) attacks. These appliances and configurations are placed based on a concise and strategic network design. Our systems are tested against DDOS resiliency by a third party. Third party perimeter, network and application penetration tests are conducted annually.

BMC responded to security incidents as soon as they are reported. Impacted customers, if any, are notified as soon as possible after the threat has been validated by BMC's Information Systems Security Officer.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach If service is disrupted in your production environment, the BMC Remedy OnDemand team restores service as quickly as possible. After service has been fully restored, BMC provides a Reason for Outage (RFO) document in the following situations:

> the disruption resulted in an outage; or
> the disruption resulted in significant service degradation.

RFO reports are provided by your Business Relationship Manager. Users may report incidents via phone, email or web (via the BMC support portal).

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1.26 per instance
Discount for educational organisations No
Free trial available Yes
Description of free trial BMC provides a proof-of-concept (POC) system for its services. This POC instance provides access to all Remedy applications from a secure data centre facility. The customer may use, configure, customise and integrate to the POC instance as required.

POCs are offered for 30 days at no cost.

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑