Automation Consultants

Service Discovery and Latency Modelling Tool

Automation Consultants’ OpsWave is a software suite of data centre migration tools created to make awkward, large-scale IT change simpler and more intuitive. Its features employ intelligent assessment of network trace data to resolve problems commonly associated with data centre migrations.


  • OpsWave shows geographical locations where applications will be most efficient
  • OpsWave removes pains of incomplete application interface documentation
  • Opswave shows application server locations, configurations and associations
  • OpsWave discovers application interdependencies, identifies network traffic between devices
  • OpsWave helps with firewall configurations
  • OpsWave enables users to predict and assess latency issues
  • OpsWave provides user identification on applications


  • OpsWave cuts IT expenditure on costly test equipment
  • OpsWave reduces time spent on application migration testing
  • OpsWave limits downtime
  • Agentless. No risks or potential operational costs associated with agents
  • OpsWave removes pains of incomplete application interface documentation
  • Latency predictions prevent disruption before it becomes an issue
  • Inbuilt automated diagnostic tool capable of anticipating issues


£10 per virtual machine per day

Service documents


G-Cloud 11

Service ID

2 9 9 1 2 1 1 5 7 0 0 0 5 9 4


Automation Consultants

Francis Miers


Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements
Web server and database server

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLAs are bespoke and can be tailored to individual customers' needs. Our highest tier of support offers a 15 minute time to response for Level 1 incidents.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Support is bespoke based on customer requirements.
Support available to third parties

Onboarding and offboarding

Getting started
TestWave has an easy to use interface that users can get the hang of almost immediately. However, if required Automation Consultants can provide further consultancy or training to make sure customers get up and running as effectively as possible.
Service documentation
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Microsoft Word
  • Microsoft Excel
End-of-contract data extraction
AC will provide a CSV file containing all customer data.
End-of-contract process
A csv file containing all customer data will be provided on request at the end of the service. Any additional activities required of Automation Consultants may be charged for.

Using the service

Web browser interface
Application to install
Designed for use on mobile devices
Service interface
Description of service interface
Custom queries can be executed on the service's SQL server or using the application API.
Accessibility standards
None or don’t know
Description of accessibility
This is not an end-user application and would not be necessarily relevant. The interface would only be accessed by individual experts.
Accessibility testing
What users can and can't do using the API
The application exposes a REST API. The documentation to the API is held by Automation Consultants and made available to suitable requestors. The API permits most operations available through the user interface.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Defects have a status to reflect the stage to which their handling has progressed, such as ‘New’, ‘Fixed’ or ‘Closed’. The available status may be customised to reflect the desired workflow. Defect fields may be also customised. New user-defined fields may be added and made compulsory as required.
A wide range of privileges can be granted to TestWave users, allowing fine control over who may do what. Privileges may be assigned, for example, to view and modify Defects and change their status; to view and modify Releases, Requirements and Tests; and to customise and perform administrative tasks.
Custom fields may be added to defects and other entities. The user may choose the type and name of any custom field created, and the custom fields may be included in reports and searches.


Independence of resources
Automation Consultants monitors resource utilisation on its servers. If resources are close to maximum utilisation, the resources are increased. Slow performance due to unmet resource requirements stemming from volume of utilisation has not been a problem to date.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Less than once a year
Penetration testing approach
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
All data stored within encrypted SAN. Access to production servers and data store limited to core team.
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
User may export any TestWave report in CSV format, which can readily be imported to a wide range of other tools. Reports may also be produced in viewer friendly formats such as HTML. On request, a CSV report of an entire TestWave instance may be produced.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Controlled access to data network

Availability and resilience

Guaranteed availability
Typical uptime is 99.9%. There are no set compensation arrangements for outages.
Approach to resilience
Twin application and database layer nodes. Virtual Machines running within a high availability virtualisation solution. Offsite backup in case of disaster.
Outage reporting
Public dashboard and client alerting available. All applications systems have monitoring in place with alerts passed automatically to AC staff.

Identity and authentication

User authentication needed
User authentication
  • Username or password
  • Other
Other user authentication
VPN or IP filtering available
Access restrictions in management interfaces and support channels
At an application level, privileged access is allowed to users who are designated as managers on particular projects. For access to infrastructure level settings, access is restricted to a small number of named individuals. Two-factor authentication is required to access these resources.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Credit card transactions are performed via Stripe

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
The Chief Technology Officer, reporting to the board, co-ordinates security. Security decisions are taken by the CTO in consultation with the board.
Information security policies and processes
A set of security policies documented internally is followed, based on industry best practice. The policy is administered day to day by the CTO. Major decisions are taken by the CTO in consultation with the board.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Major changes must be approved by the board and documented. All changes are reviewed for security among other factors. The application documentation is used to track components through their lifetime.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats are assessed by internal analysis and by monitoring user feedback. So far no vulnerabilities have been reported by users.
Patches are deployed overnight if it is considered by the board that there is a security vulnerability to be fixed.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring for potential compromises is performed through logs and alerts. On finding a potential compromise, the evidence is assessed by the CTO and other relevant staff to determine whether a compromise really occurred or not. If a potential security compromise is identified, A patch is normally put in place within 24 hours.
Incident management type
Supplier-defined controls
Incident management approach
A common process is followed for most events. Users may report incidents by email, telephone or the company's JIRA-based service desk. Incident reports are provided ad hoc and on demand.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£10 per virtual machine per day
Discount for educational organisations
Free trial available

Service documents

Return to top ↑