Innovative IT

OMx Insight

A mobile dashboard for monitoring the status of business applications.

OMX Insight aggregates data from underlying IT monitoring tool-sets and delivers the current service status and recent history to authorised users via a mobile app.

Features

  • Subscribers select which business services they want to track
  • Delivers near real time view of overall business service status
  • Drill down capability to see support activities underway
  • Scroll function to look back at recent history
  • Easy subscribe unsubscribe function view only services that matter
  • Each subscriber only selects from list of authorised services
  • Leverages your existing monitoring and ITSM toolsets
  • Integrates with most monitoring and ITSM platforms via APIs
  • Cloud service delivered to users via a mobile app

Benefits

  • Dashboard shows the current status of Business Services
  • Available anywhere any time via the mobile app
  • Deliver real time service status to key stakeholders
  • Allows review of recent history and actions on the service
  • Improves awareness of service issues
  • Allows tracking of specific services at critical times
  • Enables checks on the performance of services following scheduled maintenance

Pricing

£3000 per instance per year

Service documents

G-Cloud 10

371735831971806

Innovative IT

Dave Walmsley

07826859526

davidwalmsley_innov@tiveit.co.uk

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Extends and enhances core IT management tool sets. You will have infrastructure (or cloud) monitoring as well as a Help Desk. You may also have application monitoring and Application Performance Monitoring (APM). To get full benefit from this service you will need some form of service mapping (topology) as well.
Cloud deployment model Private cloud
Service constraints Relies on underlying monitoring tool sets. Please talk to the supplier about your particular use case
System requirements
  • Events and metrics feed from monitoring systems (via https)
  • Ticket update feed from help desk system (optional)
  • (free) mobile app for subscribers

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 9x5 support included with (worst case) next day response
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels The supplier can provide full 7 x 24 support if required but this service is typically not business critical so the default service is Monday to Friday, 8 am till 6pm with 8 hour response times.
Please discuss any additional support requirements with the supplier
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started The supplier will provide and onboarding service and administrator training. Use of the mobile app is very intuitive but if enablement is required the supplier recommends this is delivered via youtube type channels.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction The service takes data that already exists in the customer's environment and manipulates it to provide real time value. There is no requirement for data transfer back to the customer at contract end
End-of-contract process When the subscription ends data feeds to the service are stopped and the information quickly becomes stale. If the customer has not renewed after 90 days, all customer data is deleted from the supplier systems and any configuration information and customisation is removed

Using the service

Using the service
Web browser interface No
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The mobile app has been optimised for the smaller screen size.
Accessibility standards None or don’t know
Description of accessibility The service has not yet been tested against accessibility standards. The supplier will be happy to work with a customer to deliver this requirement
Accessibility testing No testing completed
API Yes
What users can and can't do using the API API's are used to feed data into the service. There are no extensibility API's for further use of the data ingested.
API documentation Yes
API documentation formats
  • HTML
  • ODF
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Default delivery is via our private cloud platform. The solution can also be hosted in the public cloud or the customers own internal cloud. The service itself is customisable in terms of who sees what service information, how much drill down capability there is, what authentication is used, security and encryption levels and so on.
Depending on the customisation this will be delivered by the supplier or the customers administrator.
Please talk to the supplier about particular requirements.

Scaling

Scaling
Independence of resources Each customer runs on their own service instance to ensure data separation

Analytics

Analytics
Service usage metrics Yes
Metrics types Detail of registered subscribers for management purposes
Detail of customer's service topology loaded into the service
Reporting types Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Data export is not relevant for this service
Data export formats Other
Other data export formats Not applicable
Data import formats Other
Other data import formats Various

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability The supplier offers 99.9% availability of the core service. Availability of the end to end service depends on other components including feeds from the customer's onitoring and help desk systems and communication across the mobile network to the subscribers devices. For this reason no end to SLA's are offered.
Approach to resilience Please contact the supplier to discuss your resilience requirements.
Outage reporting Reporting method for service outages is configurable and is set up as part of the onboarding service.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels Various authentication, access and security options are available depending on the customers own requirements. Authentication and access controls are agreed and set up as part of the onboarding process
Access restriction testing frequency At least once a year
Management access authentication Identity federation with existing provider (for example Google Apps)

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 The British Assessment Bureau
ISO/IEC 27001 accreditation date 11/12/2017
What the ISO/IEC 27001 doesn’t cover Complete coverage
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The suppliers ISMS is certified to ISO27001. The Information Security Manager carries out spot checks as well as formal internal audits to ensure compliance with policies. The IMS reports on performance (at least) quarterly to the Board

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Once configured, components of a particular service are fairly static. When any change is planned the supplier will work closely with the client to introduce that change and will typically have a period of parallel running or fallback capability in case of problems.
Please note: The nature of the service means there is no risk to customer systems or data resulting from a change.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability assessment and management is conducted with the customer as part of the onboarding service.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We monitor our cloud platform for vulnerabilities and attacks and respond accordingly.
Incident management type Supplier-defined controls
Incident management approach Customers can report incidents via phone or online. Support processes are in place to enable L1 / L2 support personnel to perform quick diagnostic and recovery actions. If L1 / L2 cannot resolve the problem escalation paths are in place to invoke L3 deep technical support) and L4 (Product Developers). Incidents on the platform are rare. Reporting back to the customer is handled by senior management.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £3000 per instance per year
Discount for educational organisations No
Free trial available Yes
Description of free trial A free trial version of OMx Insight is available for download on the mobile app stores (iTunes and Google Playstore).
After downloading the app, users can apply for an account that provides a dummy data feed so that they can familiarise themselves with the look and feel and functionality
Link to free trial Just search for "OMx Insight" in the App stores

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑