MICRO FOCUS SOFTWARE UK LTD

Smart Data Center Analytics - from Micro Focus

Smart Data Center Analytics: Optimization Service offers detailed discovery & reporting of DC infrastructure & application communications. The reports identify underutilized infrastructure and applications, helping to reduce costs, and automatically identify “move groups”, accelerating DC migration projects . SDCA can be deployed to various types of cloud.

Features

  • Provides up-to-date and accurate Data Center reporting
  • Identifies applications/servers that are not being used
  • Maps end-user’s location to applications
  • Maps application dependencies
  • Identifies applications/servers with many users and interfaces.
  • Automatically defines optimal move groups for cloud migration

Benefits

  • Reduce cost by eliminating under-utilized resources
  • Automate application discovery phase of transformation project
  • Reduce dependency on manual discovery
  • Reduce risk
  • Avoid service disruption
  • Accelerate data center transformation

Pricing

£60000 per unit

Service documents

Framework

G-Cloud 11

Service ID

3 1 9 0 7 1 2 7 2 0 3 9 7 9 8

Contact

MICRO FOCUS SOFTWARE UK LTD

Micro Focus Government Team

07808251681

ukgovteam@microfocus.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Universal Discovery
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints None. However, specific customer requirements may add constraints. This will be discussed as scope is agreed.
System requirements Requirements may be influenced by customer constraints. Please discuss.

User support

User support
Email or online ticketing support No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard support: cost depends on product and service mix
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Documentation is available Online.

Training, consultancy, tailored documentation, knowledge transfer and after-care are available and priced depending on requirements.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats Discuss format requirements at agreement discussion
End-of-contract data extraction Upon expiration or termination of the SaaS Order Term, Micro Focus may disable all Customer access to your solution.
All customer data may be downloaded directly from the SaaS solution before the expiration or can be made available to the customer on request after the contract term.
End-of-contract process The Customer Success Manager will work with the client to negotiate a new contract period when the initial term is coming to a conclusion.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Different deployment options within the offering have different mobile options. Please discuss.
Service interface Yes
Description of service interface This service is delivered as-a-service. In other words, you do not need to buy any software licenses or hardware. We have flexible options to suit your needs: • Provisioning model You can use our cloud-based platform and access dashboards and reports online, or we can deploy them on your premises.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing Discuss requirement at agreement discussion.
API No
Customisation available Yes
Description of customisation Different elements of the service can be customised/configured depending on your requirements. Please discuss specific needs with us.

Scaling

Scaling
Independence of resources Different provision and licencing models are available depending on customer requirements. Solution and service will be agreed to meet your service requirements.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach This service is provided by the chosen hosting partner.
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Arrangements differ depending on specific customer requirements (eg security constraints) - please discuss with us.
Data export formats
  • CSV
  • Other
Other data export formats Other formats may be available as additional modules.
Data import formats
  • CSV
  • Other
Other data import formats Other formats may be available as additional module.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks Transport Layer Security (TLS) protocol is used to protect data when it’s traveling between cloud services and customer environment. TLS provides strong authentication, message privacy, and integrity (enabling detection of message tampering, interception, and forgery), interoperability, algorithm flexibility, and ease of deployment and use.
On-premise deployment within the customer environment is also an option.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network Transparent Data Encryption
TDE is used to encrypt SQL Server and SQL Database files in real time, using a Database Encryption Key (DEK), which is stored in the database boot record for availability during recovery.

Availability and resilience

Availability and resilience
Guaranteed availability Availability guarantees will be negotiated to meet the needs of the customer.
Approach to resilience This information is available on request.
Outage reporting Outage reporting may be provided to meet customer requirements.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels These facilities will be provided by the chosen hosting partner.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Corporate policies are designed after ISO 27001

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All non routine changes go through change control requiring approval and verification post implementation
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability management will be provided by the chosen hosting partner.
Protective monitoring type Supplier-defined controls
Protective monitoring approach These facilities will be provided by the chosen hosting partner.
Incident management type Supplier-defined controls
Incident management approach The incident management process will be provided by the chosen hosting partner.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £60000 per unit
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑