Application Integration Suite delivers a fully managed application integration environment that helps businesses start projects quickly and easily by enabling you to deploy integration solutions on the cloud without the need to acquire and maintain an IT infrastructure. Application Integration Suite enables digital transformation and API strategies to be fulfilled.
- Securely connect cloud and on-premise applications for seamless integration.
- Rapidly create integrations, using rich connectors and integration templates
- Create microservices and exposing them as APIs in minutes.
- Reduce IT complexity and cost savings from simplifying IT infrastructure.
- Innovate faster by taking advantage of the API economy
- Create, assemble, manage, secure, scale and socialize your APIs.
- Power digital innovation and transformation using integration technology
- Unlocks the Potential business benefits of multiple applications and data.
- Lowers the cost of maintenance over point to point interfaces.
- Allows department/business to deliver new composite applications and solutions faster
- Provides a base loosely couple architecture for SOA solutions
- Delivers faster time to value for multiple hybrid integrations
£2198.00 per instance per month
- Free trial available
IBM United Kingdom Ltd
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||Service Level Agreement for IBM Integration Bus on Cloud is 99.5% availability|
|System requirements||Please see full list:https://ibm.biz/Bdii87|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Responses depends on severity: 24/7 for severity 1, Monday-Friday business hours for severity 4|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
IBM has a very comprehensive set of support offering full details can be found in the IBM web site.
|Support available to third parties||Yes|
Onboarding and offboarding
1. Online tutorials - https://developer.ibm.com/integration/docs/ibm-application-integration-suite/
2. Knowledge Center - https://www.ibm.com/support/knowledgecenter/SSSRJA_1.0.0/com.ibm.app.integration.suite.doc/welcome.htm
3. Proof of Technology – A free one day session with lectures & Labs on IBM Application Integration Suite
4. Formal Training – Paid for week long training courses for developers and administrators on IBM Integration Bus
Bespoke Training – Tailored training courses that meet the educational needs of the customer for the specific use cases that are needed.
|End-of-contract data extraction||
Configuration data for API definitions and analytics can be exported from the Application Integration Suite on Cloud offering.
IBM will return the Data within a reasonable period in a reasonable and common format upon receiving written instructions from the Client prior to termination or expiration.
|End-of-contract process||It is the responsibility of the customer to terminate the service in writing to IBM. This policy is set at the time of contracting. IBM will continue providing the service until either a product support ends creating a need to recontract for the service, or the client ceases payment.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||IBM Integration Bus on Cloud is accessible through modern web browsers|
|Accessibility testing||We have not completed any interface testing with users of assistive technology|
|What users can and can't do using the API||IBM Application Integration Suite on Cloud can expose both Restful and SOAP based APIs as part of the integrations deployed. Command line access to configure the connectivity between systems is also available.|
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Independence of resources||The architecture of IBM cloud services maintains logical separation of client data. Internal rules and measures separate data processing, such as inserting, modifying, deleting, and transferring data, according to the contracted purposes.|
|Service usage metrics||Yes|
|Metrics types||API Usage|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Users can export their configuration through the web user interface on IBM Application Integration Suite on Cloud.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Other protection between networks||IBM will encrypt content not intended for public or unauthenticated viewing when transferring content over public networks. Further, unless excluded by a TD, IBM will enable use of a cryptographic protocol, such as HTTPS, SFTP, and FTPS, for Client’s secure transfer of content to and from the Cloud Service over public networks.|
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||SLA < 99.5% compensation is 2% of monthly subscription fee. SLA < 99.0% compensation is 5% of monthly subscription fee.|
|Approach to resilience||Available at request.|
|Outage reporting||Email alerts are provided, should there be any downtime.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||IBM maintains individual role-based authorization of privileged accounts that is subject to regular validation. A privileged account is a duly authorized IBM user identity with administrative access to a Cloud Service, including associated infrastructure, networks, systems, applications, databases and file systems.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||2-factor authentication|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Coalfire ISO|
|ISO/IEC 27001 accreditation date||15/04/2016|
|What the ISO/IEC 27001 doesn’t cover||The infrastructure and platform this offering is run on is ISO/IEC 27001 compliant. The current SaaS application is not compliant|
|ISO 28000:2007 certification||No|
|CSA STAR certification||Yes|
|CSA STAR accreditation date||20/04/2016|
|CSA STAR certification level||Level 1: CSA STAR Self-Assessment|
|What the CSA STAR doesn’t cover||The infrastructure and platform this offering is run on has a CSA STAR Self-Assessment certificate. The SaaS side of this offering currently does not have this. The IBM CSA Star Self-Assessment can be viewed here https://cloudsecurityalliance.org/star-registrant/softlayer/|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
IBM has an Information Technology (IT) Security policy that establishes the requirements for the protection of IBM's worldwide IT systems and the information assets they contain, including networks and computing devices such as servers, workstations, host computers, application programs, web services, and telephone systems within the IBM infrastructure. IBM’s IT Security policy is supplemented by standards and guidelines, such as the Security Standards for IBM's Infrastructure, the Security and Use Standards for IBM Employees and the Security Guidelines for Outsourced Business Services. Such are reviewed by a cross-company team led by the IT Risk organization every six months.
IBM has a dedicated Vice President of IT Security who leads a team responsible for IBM's own enterprise data security standards and practices. Responsibility and accountability for executing internal security programs is established through formal documented policies. IBM Services teams also have dedicated executives and teams who are responsible for information and physical security in the delivery of our client services.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||IBM maintains policies and procedures to manage risks associated with the application of changes to its Cloud Services. Prior to implementation, all changes to a Cloud Service, including its systems, networks and underlying components, will be documented in a registered change request that includes a description and reason for the change, implementation details and schedule, a risk statement addressing impact to the Cloud Service and its clients, expected outcome, rollback plan, and documented approval by IBM management or its authorized delegate.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||With each Cloud Service, as applicable and commercially reasonable, IBM will a) perform penetration testing and vulnerability assessments before production release and routinely thereafter, b) enlist a qualified and reputable independent third-party to perform penetration testing and ethical hacking at least annually, c) perform automated management and routine verification of underlying components’ compliance with security configuration requirements, and d) remediate any identified vulnerability or noncompliance with its security configuration requirements based on associated risk, exploitability, and impact. IBM takes reasonable care to avoid Cloud Service disruption when performing its tests, assessments, scans, and execution of remediation activities.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||IBM maintains and follows policies requiring administrative access and activity in its Cloud Services’ computing environments to be logged and monitored, and the logs to be archived and retained in compliance with IBM’s worldwide records management plan. IBM monitors privileged account use and maintain security information and event management policies and measures designed to a) identify unauthorized administrative access and activity, b) facilitate a timely and appropriate response, and c) enable internal and independent third party audits of compliance with such policies. IBM systematically monitors the health and availability of production Cloud Service systems and infrastructure at all times.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
-maintains and follows incident response policies aligned with NIST guidelines for computer security incident handling, and will comply with data breach notification requirements under applicable law.
-investigates security incidents, including unauthorised access or use of content or the Cloud Service, of which IBM becomes aware, and, if warranted, define and execute an appropriate response plan.
-promptly notifies Client upon determining that a security incident known or reasonably suspected by IBM to affect Client has occurred.
-provides Client with reasonably requested information about such security incident and status of applicable remediation and restoration activities performed or directed by IBM.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£2198.00 per instance per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||30 days free trial of 1 integration deployed running for 2 hours continuously.|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|